{"id":256,"date":"2021-09-28T15:05:58","date_gmt":"2021-09-28T15:05:58","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=256"},"modified":"2023-05-11T17:58:31","modified_gmt":"2023-05-11T17:58:31","slug":"cybersecurity-programs-in-delaware","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/delaware\/","title":{"rendered":"Cybersecurity Programs in Delaware"},"content":{"rendered":"<p>The first state to ratify the U.S. Constitution, Delaware hosts a thriving business community. Studying cybersecurity in Delaware can open doors to opportunities in this increasingly essential field. Popular careers include ethical hacking, cybersecurity analysis, and incident response management.<\/p>\r\n<p>Career prospects are abundant, with over 66% of Fortune 500 companies incorporated in Delaware. The state's cybersecurity degree programs include associate, bachelor's, and postgraduate offerings.<\/p>\r\n<p>This article explores educational and professional prospects for cybersecurity students in Delaware. Discover top schools and programs that can propel your career in this evolving field.<\/p>\r\n\r\n<div class=\"bg-primary-50 px-5 py-1\">\r\n<h2>Delaware at a Glance<\/h2>\r\n<ul>\r\n<li><strong>Average Wage for Computer and Mathematical Occupations:<\/strong> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes_de.htm\" target=\"_blank\" rel=\"noopener\">$102,060<\/a><\/li>\r\n<li><strong>% of Workforce in Tech:<\/strong> <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=10__delaware\" target=\"_blank\" rel=\"noopener\">5.2%<\/a><\/li>\r\n<li><strong>Economic Impact of Tech Industry:<\/strong> <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=10__delaware\" target=\"_blank\" rel=\"noopener\">$4 billion<\/a><\/li>\r\n<li><strong>Number of Higher Learning Institutions:<\/strong> <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_317.20.asp\" target=\"_blank\" rel=\"noopener\">8<\/a><\/li>\r\n<\/ul>\r\n<p class=\"text-sm\">Sources: <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=0__usa\" target=\"_blank\" rel=\"noopener\">Cyberstates&trade;<\/a>, <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d20\/tables\/dt20_317.20.asp\" target=\"_blank\" rel=\"noopener\">NCES<\/a>, <a href=\"https:\/\/www.bls.gov\/oes\/current\/oessrcst.htm\" target=\"_blank\" rel=\"noopener\">OEWS<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"why-delaware\" id=\"why-delaware\"><\/a>\n\n\r\n<h2>Why Go to College for Cybersecurity in Delaware?<\/h2>\r\n<p>Students in Delaware enjoy access to <a href=\"https:\/\/www.cyberdegrees.org\/listings\/most-diverse-cybersecurity-schools\/\">diverse educational institutions<\/a> and strong connections to the local business community. The state's small size fosters a close-knit community, allowing students to interact with faculty, peers, and industry professionals.<\/p>\r\n<p>According to the National Center for Education Statistics (NCES), 59,983 students attended all degree-granting institutions in Delaware as of fall 2019.<\/p>\r\n<p>In-state tuition in the First State is generally more affordable than out-of-state rates, making education more accessible for Delaware residents. Located in both urban and rural settings, Delaware's colleges and universities cater to various student preferences.<\/p>\r\n<p>Delaware learners can also access flexible online programs. However, some online programs require occasional on-campus attendance, making proximity to campus an important factor to consider.<\/p>\r\n<p>Historically, Delaware has been a hub for business and innovation. This tradition translates into an environment that encourages growth in the cybersecurity sector. With abundant in-state networking opportunities, earning a degree from a Delaware-based institution can open doors to local <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">cybersecurity jobs<\/a>.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/states\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find cybersecurity programs in other states<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h3>Education Statistics for Delaware<\/h3>\r\n<p>Delaware's higher education institutions include seven four-year colleges and one two-year college. Nearly two-thirds of all Delaware students are enrolled in distance education.<\/p>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Delaware vs. National Education Statistics<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Higher Education Statistics<\/th>\r\n<th scope=\"col\">Delaware Data<\/th>\r\n<th scope=\"col\">National Data<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">Four-Year Colleges<\/th>\r\n<td data-title=\"Delaware\">7<\/td>\r\n<td data-title=\"National\">2,679<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Two-Year Colleges<\/th>\r\n<td data-title=\"Delaware\">1<\/td>\r\n<td data-title=\"National\">1,303<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Students Enrolled in Distance Education<\/th>\r\n<td data-title=\"Delaware\">65.2%<\/td>\r\n<td data-title=\"National\">72.8%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Sources: <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_317.20.asp\" target=\"_blank\" rel=\"noopener\">NCES<\/a><\/p>\r\n\r\n<h3>Accreditation for Delaware Schools<\/h3>\r\n<p>Attending an accredited school in Delaware ensures that the education you receive meets specific quality standards and that other institutions and employers recognize your program.<\/p>\r\n<p>Institutionally accredited schools undergo a rigorous evaluation process. In this process, an accrediting agency evaluates the institution's educational offerings and operations.<\/p>\r\n<p>When <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-cyber-security-bachelors-degrees\/\">choosing an online school<\/a> in Delaware, look for institutional accreditation from agencies such as the Middle States Commission on Higher Education, the New England Commission of Higher Education, or the Higher Learning Commission.<\/p>\r\n<p>Some cybersecurity programs also earn programmatic accreditation. ABET's computing accreditation commission accredits computing-related programs in the U.S.<\/p>\r\n\r\n\r\n<h2>Considerations for a Cybersecurity Degree in Delaware<\/h2>\r\n<p>Choosing a college and program can be a complex process for many learners. Key factors to consider include desired degree level and delivery method.<\/p>\r\n<p>When it comes to <a href=\"https:\/\/www.cyberdegrees.org\/resources\/degree-required-for-cybersecurity-career\/\">degree level<\/a>, students can pursue associate, bachelor's, master's, or doctoral degrees, depending on their career goals and educational backgrounds.<\/p>\r\n<p>Delivery methods include online, in-person, and hybrid options. Online programs offer flexibility and convenience, while in-person programs provide hands-on learning and face-to-face interaction with instructors and peers. Hybrid programs combine online and in-person components.<\/p>\r\n<p>Degree-seekers in Delaware pursue online education at a higher rate than the national average. According to the NCES, 65.2% of all Delaware college students took at least one online course in the fall of 2021, compared to 59% across the United States.<\/p>\r\n\r\n<div id=\"everviz-XhT14kyoT\" class=\"everviz-XhT14kyoT\"><script src=\"https:\/\/app.everviz.com\/inject\/XhT14kyoT\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent\">\n    <div class=\"container content\">\n        \r\n<h3 class=\"text-center\">Explore rankings for top cybersecurity programs around the country:<\/h3>\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375211\/CyberDegrees.org\/Man-Typing-Tablet-Network-Wiring_552834369\/Man-Typing-Tablet-Network-Wiring_552834369.jpg?_i=AA\"\n        alt=\"Bachelor's Programs in Information Assurance\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Bachelor's Programs in Information Assurance<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-information-assurance-bachelors\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-589090389-425x230-c-default.jpg\"\n        alt=\"Best Online Master's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Best Online Master's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-cyber-security-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664377167\/CyberDegrees.org\/Cyber_Listings_HBCU_441690b71\/Cyber_Listings_HBCU_441690b71.jpg?_i=AA\"\n        alt=\"HBCUs With the Best Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">HBCUs With the Best Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-hbcu-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-619503664-425x230-c-default.jpg\"\n        alt=\"Top Doctoral Degree Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Top Doctoral Degree Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cybersecurity Concentrations and Similar Degrees<\/h3>\r\n<p>People studying cybersecurity in Delaware can choose from various concentrations and related degrees. However, some options may be more valuable for career opportunities in the state.<\/p>\r\n<p>For example, a concentration in network security or a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-information-systems-security-degrees\/\">degree in information security<\/a> could benefit cybersecurity job-seekers in Delaware.<\/p>\r\n<p>These areas of study provide a strong foundation in the technical skills and knowledge necessary to succeed in the field. Graduates can apply what they learn to various career opportunities in the state.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n<div class=\"bg-tertiary-50 px-5 rounded\">\r\n<h4>Network Security<\/h4>\r\n<p>A concentration in network security provides in-depth understanding of designing, implementing, and maintaining secure networks.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-tertiary-50 px-5 rounded\">\r\n<h4>Information Security<\/h4>\r\n<p>A degree in information security teaches students to secure and protect sensitive information in organizations.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-tertiary-50 px-5 rounded\">\r\n<h4>Cybercrime Investigation<\/h4>\r\n<p>A concentration in cybercrime investigation focuses on investigating and preventing cybercrime.<\/p>\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Popular Online Programs<\/h2>\r\n<p>Learn about start dates, transferring credits, availability of financial aid, and more by contacting the universities below.<\/p>\r\n<sonic-editorial-listings limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Paying for Your Cybersecurity Degree<\/h3>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/how-to-pay-for-a-degree\/\">Financing options<\/a> for a cybersecurity degree in Delaware vary, but students should consider the cost of tuition and fees. As of the 2020-2021 school year, four-year public institutions in Delaware charged $11,343 per year in in-state tuition and fees and $31,809 for out-of-state enrollees.<\/p>\r\n<p>Options for financing a cybersecurity degree in Delaware include scholarships, fellowships, grants, and loans. These opportunities can help offset tuition costs. Some students can also access less-common financing options like employer tuition reimbursement and <a href=\"https:\/\/www.cyberdegrees.org\/resources\/scholarships-military-veterans\/\">military benefits<\/a>.<\/p>\r\n\r\n<div id=\"everviz-7IsNwkPSl\" class=\"everviz-7IsNwkPSl\"><script src=\"https:\/\/app.everviz.com\/inject\/7IsNwkPSl\/?v=5\" defer=\"defer\"><\/script><\/div>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"tuition\" id=\"tuition\"><\/a>\n\n\r\n<h4>In-State Versus Out-of-State Tuition<\/h4>\r\n<p>In general, in-state tuition at public schools is less expensive than out-of-state tuition, since state residents support these schools through paying state taxes. Private institutions typically charge the same tuition rates regardless of student residency.<\/p>\r\n<h4>Delaware's Cost of Living<\/h4>\r\n<p>Cost of living is an important consideration when budgeting for your education in Delaware. At 107.9, Delaware's <a href=\"https:\/\/worldpopulationreview.com\/states\/cost-of-living-index-by-state\/\" target=\"_blank\" rel=\"noopener\">cost of living index<\/a> score exceeds the national average of 100.<\/p>\r\n<p>This score means that the overall cost of living in Delaware is nearly 8% higher than the national average. Factors such as housing, food, transportation, and healthcare can all affect the cost of living in a given area.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/scholarships-military-veterans\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore cybersecurity scholarships for military and veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/cybersecurity-resources-for-underrepresented-populations\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find resources and organizations for underrepresented populations<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/lgbtq-scholarships\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover scholarships for LGBTQIA+ students<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n\r\n<h2>Careers for Cybersecurity Graduates in Delaware<\/h2>\r\n<p>The cybersecurity industry is growing rapidly in Delaware and nationally. Many important industries in the state, including finance, technology, <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-healthcare\/\">and healthcare<\/a>, need workers with cybersecurity-related degrees.<\/p>\r\n<p><a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=10__delaware\" target=\"_blank\" rel=\"noopener\">According to CompTIA<\/a>, cybersecurity and systems engineering positions employed 3,017 Delaware residents as of 2022, making these the second-most-popular tech occupations in the state. The job outlook for cybersecurity careers in Delaware is strong, with the finance industry and information security analyst jobs expected to grow in the coming years.<\/p>\r\n<p>Delaware is known for its thriving <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-financial-services\/\">financial sector<\/a>, with many large corporations and financial institutions in the state. This sector needs workers with cybersecurity skills to protect sensitive financial information and prevent cyberattacks. Major cities in the state, such as Wilmington and Newark, provide a vibrant job market for workers in the field.<\/p>\r\n<p>Below, we explore cybersecurity careers, employment trends, cybersecurity employers, and professional cybersecurity organizations in Delaware.<\/p>\r\n\r\n<h3>Select Cybersecurity Careers in Delaware<\/h3>\r\n\r\n<h4><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/computer-forensics\/\">Computer Forensics Analyst<\/a> <sonic-icon icon=\"search-circle\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n<p>Also called digital forensics analysts, these professionals investigate and solve cybercrimes such as hacking, identity theft, and fraud. Computer forensics analysts gather and analyze digital evidence, interview witnesses, and work with law enforcement to bring criminals to justice.<\/p>\r\n<p>These analysts typically need a bachelor's degree in cybersecurity, computer science, or a related field. Certifications such as certified computer examiner may be preferred.<\/p>\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Salary<\/a>:<\/strong> $75,525<\/li>\r\n<li><strong><a href=\"https:\/\/projectionscentral.org\" target=\"_blank\" rel=\"noopener\">Job Outlook in Delaware<\/a>:<\/strong> Projections Central includes computer forensics analysts in its entry for information security analysts. The site projects +25.7% job growth for these professionals in Delaware between 2020 and 2030.<\/li>\r\n<\/ul>\r\n\r\n<h4><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/\">Penetration Tester<\/a> <sonic-icon icon=\"exclamation\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n<p>Penetration testers simulate attacks on computer systems to identify vulnerabilities and assess overall system security. These professionals use their knowledge of hacking techniques to identify weaknesses and recommend system improvements.<\/p>\r\n<p>Pen testers usually hold bachelor's degrees in cybersecurity, computer science, or a related field. Many earn certifications such as certified ethical hacker. Penetration testers help ensure the security of Delaware&rsquo;s industries and government systems.<\/p>\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Penetration_Tester\/Salary\" target=\"_blank\" rel=\"noopener\">Salary<\/a>:<\/strong> $90,820<\/li>\r\n<li><strong><a href=\"https:\/\/projectionscentral.org\" target=\"_blank\" rel=\"noopener\">Job Outlook in Delaware<\/a>:<\/strong> Projections Central includes penetration testers in its entry for information security analysts. The site projects +25.7% job growth for these professionals in Delaware between 2020 and 2030.<\/li>\r\n<\/ul>\r\n\r\n<h4><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-engineer\/\">Information Security Manager<\/a> <sonic-icon icon=\"lock-closed\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n<p>Information security managers oversee an organization's security measures and implement policies and procedures to protect sensitive information. These managers collaborate with other IT team members to ensure the security of systems, networks, and data.<\/p>\r\n<p>Information security managers usually need a bachelor's degree in cybersecurity, computer science, or a related field. Many employers prefer candidates with master's degrees or certifications such as certified information systems security professional.<\/p>\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Information_Security_Manager\/Salary\" target=\"_blank\" rel=\"noopener\">Salary<\/a>:<\/strong> $122,640<\/li>\r\n<li><strong><a href=\"https:\/\/projectionscentral.org\" target=\"_blank\" rel=\"noopener\">Job Outlook in Delaware<\/a>:<\/strong> Projections Central includes information security managers in its entry for information security analysts. The site projects +25.7% job growth for these professionals in Delaware between 2020 and 2030.<\/li>\r\n<\/ul>\r\n\r\n<p>Along with these careers, other in-demand cybersecurity and tech positions in Delaware include information security analysts, <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-architect\/\">cybersecurity network architects<\/a>, and software developers.<\/p>\r\n\r\n<h3>Delaware Employment Trends<\/h3>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Projected Job Growth for Information Security Analysts, Computer Network Architects, and Software Developers and Software Quality Assurance Analysts and Testers<\/caption>\r\n<thead>\r\n<tr>\r\n<th col>Year<\/th>\r\n<th col>State<\/th>\r\n<th col>National<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Information Security Analysts<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2020 Employment<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1212.00?st=DE\" target=\"_blank\" rel=\"noopener\">740<\/a><\/td>\r\n<td data-title=\"National\">66, 200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1212.00?st=DE\" target=\"_blank\" rel=\"noopener\">930<\/a><\/td>\r\n<td data-title=\"National\">67,300<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2020-2030<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1212.00?st=DE\" target=\"_blank\" rel=\"noopener\">+26%<\/a><\/td>\r\n<td data-title=\"National\">+1.7%<\/td>\r\n<\/tr>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Computer Network Architects<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2020 Employment<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1241.00?st=DE\" target=\"_blank\" rel=\"noopener\">580<\/a><\/td>\r\n<td data-title=\"National\">165,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1241.00?st=DE\" target=\"_blank\" rel=\"noopener\">580<\/a><\/td>\r\n<td data-title=\"National\">174,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2020-2030<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1241.00?st=DE\" target=\"_blank\" rel=\"noopener\">0%<\/a><\/td>\r\n<td data-title=\"National\">+5.4%<\/td>\r\n<\/tr>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Software Developers and Software Quality Assurance Analysts and Testers<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2020 Employment<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1253.00?st=DE\" target=\"_blank\" rel=\"noopener\">6,000<\/a><\/td>\r\n<td data-title=\"National\">1,847,900<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1253.00?st=DE\" target=\"_blank\" rel=\"noopener\">7,240<\/a><\/td>\r\n<td data-title=\"National\">2,257,400<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2020-2030<\/td>\r\n<td data-title=\"State\"><a href=\"https:\/\/www.onetonline.org\/link\/localtrends\/15-1253.00?st=DE\" target=\"_blank\" rel=\"noopener\">+21%<\/a><\/td>\r\n<td data-title=\"National\">+22%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Source: <a href=\"https:\/\/projectionscentral.com\/Projections\/LongTerm\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a><\/p>\r\n\r\n\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Salaries for Cybersecurity and Related Careers, May 2021<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Career<\/th>\r\n<th scope=\"col\">Delaware Employment<\/th>\r\n<th scope=\"col\">Delaware Annual Mean Wage<\/th>\r\n<th scope=\"col\">National Median Annual Wage<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td data-title=\"Career\">Computer and Information Systems Managers<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes113021.htm#st\" target=\"_blank\" rel=\"noopener\">1,460<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes113021.htm#st\" target=\"_blank\" rel=\"noopener\">$166,970<\/a><\/td>\r\n<td data-title=\"National Wage\">$159,010<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Network Architects<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151241.htm\" target=\"_blank\" rel=\"noopener\">620<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151241.htm\" target=\"_blank\" rel=\"noopener\">$137,040<\/a><\/td>\r\n<td data-title=\"National Wage\">$120,520<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Network Support Specialists<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151231.htm\" target=\"_blank\" rel=\"noopener\">530<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151231.htm\" target=\"_blank\" rel=\"noopener\">$62,310<\/a><\/td>\r\n<td data-title=\"National Wage\">$62,760<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Programmers<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151251.htm#st\" target=\"_blank\" rel=\"noopener\">550<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151251.htm#st\" target=\"_blank\" rel=\"noopener\">$93,330<\/a><\/td>\r\n<td data-title=\"National Wage\">$93,000<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Systems Analysts<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151211.htm#st\" target=\"_blank\" rel=\"noopener\">2,120<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151211.htm#st\" target=\"_blank\" rel=\"noopener\">$99,410<\/a><\/td>\r\n<td data-title=\"National Wage\">$99,270<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Information Security Analysts<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">950<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">$119,420<\/a><\/td>\r\n<td data-title=\"National Wage\">$102,600<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Network and Computer Systems Administrators<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151244.htm#st\" target=\"_blank\" rel=\"noopener\">1,030<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151244.htm#st\" target=\"_blank\" rel=\"noopener\">$83,520<\/a><\/td>\r\n<td data-title=\"National Wage\">$80,600<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Software Developers<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151252.htm\" target=\"_blank\" rel=\"noopener\">5,550<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151252.htm\" target=\"_blank\" rel=\"noopener\">$115,330<\/a><\/td>\r\n<td data-title=\"National Wage\">$109,020<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Web Developers<\/td>\r\n<td data-title=\"DE Employment\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151254.htm\" target=\"_blank\" rel=\"noopener\">110<\/a><\/td>\r\n<td data-title=\"DE Wage\"><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151254.htm\" target=\"_blank\" rel=\"noopener\">$83,100<\/a><\/td>\r\n<td data-title=\"National Wage\">$78,300<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Source: <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes_stru.htm\" target=\"_blank\" rel=\"noopener\">BLS OEWS<\/a><\/p>\r\n\r\n<p>Among the above occupations, computer and information systems managers command the highest annual mean wage in Delaware. With 5,550 workers, software developers boast the highest employment.<\/p>\r\n<p>Given these findings, someone planning to stay in Delaware and pursue a career in technology and information systems may want to consider these professions. A <a href=\"https:\/\/www.cyberdegrees.org\/listings\/computer-science\/best-programs\/\">degree in computer science<\/a>, <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-bachelors-in-information-technology-programs\/\">information technology<\/a>, or a related field focusing on management can help you land these jobs.<\/p>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent\">\n    <div class=\"container content\">\n        \r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover more cybersecurity jobs<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/government-cyber-security-careers\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Consider a cybersecurity career in government<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/careers-for-vets\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Which cybersecurity careers are best for veterans?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/transitioning-from-general-it\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Transition From IT into cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cybersecurity Employers in Delaware<\/h3>\r\n<p>Home to several top companies that employ cybersecurity experts, Delaware is an excellent place for professionals in this field to launch and grow their careers. National organizations like those below maintain corporate offices in Delaware.<\/p>\r\n<ul>\r\n<li><strong>JPMorgan Chase:<\/strong> One of the largest financial institutions in the world, JPMorgan Chase employs cybersecurity experts to help secure its systems.<\/li>\r\n<li><strong>Capital One:<\/strong> A large financial services company, Capital One hires cybersecurity professionals to protect its customers' financial information.<\/li>\r\n<\/ul>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"professional-organizations\" id=\"professional-organizations\"><\/a>\n\n\r\n<h3>Professional Cybersecurity Organizations in Delaware<\/h3>\r\n<p>Delaware boasts many organizations and resources that support students, recent graduates, and new cybersecurity professionals. These resources can provide valuable networking opportunities, professional development, and support as you launch and grow your cybersecurity career.<\/p>\r\n\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<h4><a href=\"https:\/\/digiknow.dti.delaware.gov\/\" target=\"_blank\" rel=\"noopener\">Delaware Department of Technology and Information<\/a><\/h4>\r\n<p>DTI oversees cybersecurity for the state's three branches of government and its K-12 public and charter schools. DTI offers education and support to these institutions, ensuring that their extensive and complex networks remain secure.<\/p>\r\n<\/div>\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<h4><a href=\"https:\/\/deinfragard.org\/infra\/\" target=\"_blank\" rel=\"noopener\">InfraGard Delaware Members Alliance<\/a><\/h4>\r\n<p>InfraGard is a public-private partnership between the FBI and private sector members. The Delaware chapter provides opportunities for members to network, share information and intelligence, and take part in training and exercises.<\/p>\r\n<\/div>\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<h4><a href=\"https:\/\/ccap.udel.edu\/\" target=\"_blank\" rel=\"noopener\">Center for Cybersecurity, Assurance and Privacy<\/a><\/h4>\r\n<p>The University of Delaware's CCAP promotes cybersecurity research and education. The organization's focus areas include privacy and security in healthcare, finance and national infrastructure.<\/p>\r\n<\/div>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"where-to-study\" id=\"where-to-study\"><\/a>\n\n\r\n<h2>Where to Study Cybersecurity in Delaware<\/h2>\r\n<ul>\r\n<li><a href=\"https:\/\/www.udel.edu\/apply\/undergraduate-admissions\/major-finder\/cybersecurity-engineering\/\" target=\"_blank\" rel=\"noopener\">University of Delaware<\/a><\/li>\r\n<li><a href=\"https:\/\/www.wilmu.edu\/technology\/computer-network-security.aspx\" target=\"_blank\" rel=\"noopener\">Wilmington University<\/a><\/li>\r\n<\/ul>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>Questions About Cybersecurity in Delaware<\/h2>\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Can I get a cybersecurity degree in Delaware?<\/h3>\r\n<p>Delaware hosts several colleges and universities with programs in cybersecurity and related fields. These programs include certificates and <a href=\"https:\/\/www.cyberdegrees.org\/listings\/associate-degrees\/\">associate degrees<\/a> along with bachelor's, master's, and doctoral degrees.<\/p>\r\n<\/div>\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Does the University of Delaware have a cybersecurity program?<\/h3>\r\n<p>The University of Delaware offers several cybersecurity programs, including <a href=\"https:\/\/www.cyberdegrees.org\/listings\/certificate-programs\/\">certificate programs<\/a> and undergraduate and graduate degrees. The university's cybersecurity programs provide students with a strong foundation in the field through hands-on learning experiences and industry partnerships.<\/p>\r\n<\/div>\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Is cybersecurity a good career in Delaware?<\/h3>\r\n<p>Cybersecurity is a growing field with high demand for skilled professionals, making it a good career choice in Delaware. Professionals with cybersecurity degrees can work in several industries that drive the state's economy, such as finance, healthcare, and technology.<\/p>\r\n<\/div>\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Where can I work in Delaware after getting a cybersecurity degree?<\/h3>\r\n<p>Cybersecurity graduates can find jobs in Delaware industries like finance, healthcare, technology, and government. Major cities in the state, such as Wilmington and Newark, boast many cybersecurity employers, including large corporations, financial institutions, and government agencies.<\/p>\r\n<\/div>","protected":false},"excerpt":{"rendered":"Employers in Delaware are looking for talented computer science graduates. Learn more about earning a computer science degree in Delaware.","protected":false},"author":5,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[11],"resources-overview":[],"degrees":[28,29],"jobs-overview":[],"rankings":[],"class_list":["post-256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-d","degrees-in-person","degrees-online"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/256\/revisions"}],"predecessor-version":[{"id":7680,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/256\/revisions\/7680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=256"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=256"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=256"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=256"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=256"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}