Man writing in class

Next Gen Scholarship

CrowdStrike has established a scholarship program for students pursuing Cyber Security or AI.

Applications Open - Deadline April 27, 2026 3:00 PM CT

Apply

Next Gen Scholarship

The program is administered by Scholarship America®, the nation’s largest designer and manager of scholarships and other education support programs for corporations, foundations, associations, and individuals. Eligibility for individual programs is determined at the sole discretion of the sponsor and eligible applications are reviewed by Scholarship America’s evaluation team.

Eligibility

Applicants to the Next Gen Scholarship must:

  • Be high school seniors/students in their final year of upper or higher secondary school, graduates, current technical or college/university undergraduate students
  • Plan to enroll in full-time undergraduate study at an accredited two- or four-year college, university or vocational-technical school for the entire upcoming academic year
  • Be pursuing Cyber Security or an AI degree/credentials
  • Have a minimum grade point average of 3.0 on a 4.0 scale (or its equivalent)

Children of CrowdStrike Employees are ineligible.

Awards

If selected as a recipient, the student will receive an award ranging from $2,500 to $10,000. If the applicant pool allows, awards will be distributed as follows:

  • Up to 10 awards of $10,000 for U.S. and Canadian four-year University students
  • Up to 10 awards of $2,500 for U.S. and Canadian vocational-technical/Community College students
  • Up to 10 awards of $2,500 for India students

Awards are not renewable, but students may reapply to the program each year they meet eligibility requirements.

Awards are for undergraduate study only.

Recipients may be invited to apply for CrowdStrike Internships.

Notification

All applicants will be notified in July.

Notifications are sent via email. When setting up your account, avoid using a school or work email. Instead, use an active, personal email address that you will continue to have access to.

Payment of Scholarships

Scholarship America processes scholarship payments on behalf of CrowdStrike. Payment is made in August.

Selection of Recipients

Scholarship finalists are selected on the basis of:

  • Academic performance
  • Demonstrated leadership and participation in school and community activities
  • Work experience
  • A statement of educational and career goals and objectives
  • Unusual personal or family circumstances

Financial need is not considered.

Additionally, two essays* will be required and reviewed by CrowdStrike during recipient selection.

Selection of finalists is made by Scholarship America. CrowdStrike will select recipients. All applicants agree to accept the decision as final.

The number of applications received will be capped and applications received after the cap has been reached may not be considered.

*Essay topics

  1. As generative AI becomes increasingly embedded across enterprise environments, security teams face both new risks and new opportunities.
     
    Propose a novel security application that leverages generative AI, which may be either defensive or offensive in nature. In your response, clearly explain:

    • The specific security problem your application addresses
    • How generative AI enables capabilities that traditional security tools cannot
    • The primary goals of the use case (e.g., reducing analyst workload, improving detection speed, optimizing data collection, disrupting adversary operations)
    • Potential risks or limitations of your approach and how they might be mitigated

     
    Your answer should demonstrate original thinking and an understanding of how generative AI can meaningfully reshape modern cybersecurity operations. (750 word maximum)

  2. Recent threat intelligence reporting, including the CrowdStrike Global Threat Report 2025, highlights a shift in adversary tactics toward voice-based phishing, social engineering, and exploitation of unmanaged or poorly monitored devices.
     
    Analyze how these evolving adversary techniques challenge traditional security models. Then, describe how a modern security vendor could adapt its technology, intelligence, and operational approach to counter these threats. In your response, consider:

    • Why voice-based phishing and unmanaged devices are effective for adversaries
    • Gaps in current enterprise security postures that these tactics exploit
    • How emerging technologies (such as AI, behavioral analytics, or identity protection) could be applied to detect or prevent these attacks
    • The role of threat intelligence, user awareness, and platform integration in addressing these challenges

     
    Your answer should reflect strategic thinking about both adversary behavior and defender innovation. (750 word maximum)

Requirements

As part of your application, you must upload the following:

  • A current, complete transcript of grades. Grade reports are not accepted. Transcripts must display:
    • Student name
    • School name
    • Grades
    • Credit hours for each course and term in which each course was taken.

     
    NOTE: (U.S. applicants only) If you are providing SAT or ACT test scores, and those scores are not listed on your high school transcript, you will need to upload a copy of your test score report(s) separately. If you are uploading a college transcript, those scores are not required.
     

  • Upper/higher secondary school diploma or certificate, if earned (International applicants only)
  • Results of examinations (International applicants only)
  • English translations for any non-English documents

Your application is not complete unless all required materials are submitted electronically.

Scholarship America
Browse More Scholarships
Scholarship America offers a safe and trusted resource to help you find scholarships and answer important questions along the way.

This website uses cookies to improve your experience. By clicking “Accept”, you agree to our Privacy Policy and Cookie Policy