{"id":332,"date":"2022-03-02T23:51:44","date_gmt":"2022-03-02T23:51:44","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=332"},"modified":"2023-10-18T19:48:25","modified_gmt":"2023-10-18T19:48:25","slug":"cybersecurity-programs-in-north-dakota","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/north-dakota\/","title":{"rendered":"Cybersecurity Degree Overview for North Dakota"},"content":{"rendered":"<p>In March of 2023,<a href=\"https:\/\/www.governor.nd.gov\/news\/burgum-baesler-applaud-landmark-north-dakota-computer-science-cybersecurity-measure\" target=\"_blank\" rel=\"noopener\">North Dakota made headlines<\/a> for being the first state in the country to require cybersecurity education as a part of its grade school curriculum. With multiple educational programs, job opportunities, and a growing tech industry, earning a cybersecurity degree in North Dakota can accommodate learners seeking more-affordable-than-average tuition and a more rural lifestyle. State-funded services like <a href=\"https:\/\/findthegoodlife.com\/\" target=\"_blank\" rel=\"noopener\">Find The Good Life in North Dakota<\/a> help newcomers relocate and find careers.<\/p>\r\n\r\n<div class=\"bg-accent-50 px-5 py-1 rounded-lg\">\r\n<h2>North Dakota at a Glance<\/h2>\r\n<ul>\r\n<li><strong>Average Wage for Computer and Mathematical Occupations, 2021:<\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes_nd.htm#15-0000\" target=\"_blank\" rel=\"noopener\"> $76,900<\/a><\/li>\r\n<li><strong>Percentage of Workforce in Tech: <\/strong><a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=38__north-dakota\" target=\"_blank\" rel=\"noopener\">3%<\/a><\/li>\r\n<li><strong>Economic Impact of Tech Industry: <\/strong><a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=38__north-dakota\" target=\"_blank\" rel=\"noopener\">$2 billion<\/a><\/li>\r\n<li><strong>Number of Higher Learning Institutions: <\/strong><a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_317.20.asp\" target=\"_blank\" rel=\"noopener\">20<\/a><\/li>\r\n<\/ul>\r\n<p class=\"text-sm\">Sources: <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=0__usa\" target=\"_blank\" rel=\"noopener\">Cyberstates&trade;<\/a>, <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_317.20.asp\" target=\"_blank\" rel=\"noopener\">NCES<\/a>, <a href=\"https:\/\/www.bls.gov\/oes\/current\/oessrcst.htm\" target=\"_blank\" rel=\"noopener\">OEWS<\/a><\/p>\r\n<\/div>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"why-study-in-north-dakota\" id=\"why-study-in-north-dakota\"><\/a>\n\n\r\n<h2>Why Go to College for Cybersecurity in North Dakota?<\/h2>\r\n\r\n<p>Even though North Dakota is one of the lesser-populated states &mdash; ranking 47th overall for population &mdash; the state's economy is flourishing in part thanks to the<a href=\"https:\/\/eros.usgs.gov\/media-gallery\/earthshot\/bakken-oil-boom-north-dakota-usa\" target=\"_blank\" rel=\"noopener\">Bakken oil boom<\/a>, which began around 2008. North Dakota now has one of the <a href=\"https:\/\/www.usnews.com\/news\/best-states\/rankings\/economy\/employment\/unemployment-rate\" target=\"_blank\" rel=\"noopener\">lowest unemployment rates<\/a> in the country.<\/p>\r\n\r\n<p>In addition to a robust job market, the state is home to several colleges and universities that offer cybersecurity programs. For example, the <a href=\"https:\/\/und.edu\/programs\/cyber-security-bs\/\" target=\"_blank\" rel=\"nofollow noopener\">University of North Dakota<\/a> offers a cybersecurity bachelor's program, while <a href=\"https:\/\/catalog.ndsu.edu\/programs-study\/graduate\/cybersecurity\/\" target=\"_blank\" rel=\"nofollow noopener\">North Dakota State University<\/a> offers a graduate-level cybersecurity certificate. Median tech wages in North Dakota are also 56% higher than national median wage, according to <a href=\"https:\/\/www.cyberstates.org\/#interactiveMap?geoid=38__north-dakota\" target=\"_blank\" rel=\"noopener\">CompTIA's 2023 Cyberstates report<\/a>. Because the state maintains a <a href=\"https:\/\/worldpopulationreview.com\/state-rankings\/cost-of-living-index-by-state\" target=\"_blank\" rel=\"noopener\">lower-than-average cost of living<\/a>, these higher-than-average salaries carry stronger purchasing power than they do in more expensive states.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/states\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find cybersecurity programs in other states<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h3>Education Statistics for North Dakota<\/h3>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>North Dakota vs. National Education Statistics<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Higher Education Statistics<\/th>\r\n<th scope=\"col\">North Dakota Data<\/th>\r\n<th scope=\"col\">National Data<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">Four-Year Colleges<\/th>\r\n<td data-title=\"North-Dakota\">15<\/td>\r\n<td data-title=\"National\">2,520<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Two-Year Colleges<\/th>\r\n<td data-title=\"North-Dakota\">5<\/td>\r\n<td data-title=\"National\">1,216<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">Students Enrolled in Distance Education<\/th>\r\n<td data-title=\"North-Dakota\"><a href=\"https:\/\/nces.ed.gov\/ipeds\/TrendGenerator\/app\/build-table\/2\/42?rid=6&amp;cid=85\" target=\"_blank\" rel=\"noopener\">55.9%<\/a><\/td>\r\n<td data-title=\"National\">59%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Sources: <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d21\/tables\/dt21_317.20.asp\" target=\"_blank\" rel=\"noopener\">NCES<\/a><\/p>\r\n\r\n<p>North Dakota's higher learning institutions vary in size from large to small. Learners can pursue their degree in city and rural settings. Schools in this state offer classes in person or online.<\/p>\r\n\r\n<h3>Accreditation for North Dakota Schools<\/h3>\r\n\r\n<p>Institutional accreditation is crucial for colleges and universities to certify their adherence to academic quality standards. Accrediting agencies maintain these standards and periodically review institutions to ensure they continue fulfilling these criteria. Many schools in North Dakota hold institutional accreditation from the <a href=\"https:\/\/www.hlcommission.org\/\" target=\"_blank\" rel=\"noopener\">Higher Learning Commission<\/a>.<\/p>\r\n\r\n<p>Specific programs within institutions can also pursue optional programmatic accreditation, which verifies how well a program's curriculum prepares graduates for careers in their field. Cybersecurity programs in North Dakota may hold accreditation from agencies like <a href=\"https:\/\/www.abet.org\/\" target=\"_blank\" rel=\"noopener\">ABET<\/a>.<\/p>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Popular Online Programs<\/h2>\r\n<p>Learn about start dates, transferring credits, availability of financial aid, and more by contacting the universities below.<\/p>\r\n<sonic-editorial-listings limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>Considerations for Cybersecurity Programs in North Dakota<\/h2>\r\n\r\n<p>Selecting the <a href=\"\/resources\/degree-required-for-cybersecurity-career\/\">right cybersecurity program<\/a> requires prospective students to consider several factors. First, figure out which degree level you need. Many cybersecurity jobs require at least a bachelor's degree, while some entry-level positions accept an associate degree. You can explore the field without immediately committing to a full program by pursuing a free massively online open <a href=\"\/resources\/free-online-courses\/\">course in cybersecurity<\/a>. Another factor to consider is whether you prefer in-person or online learning. Though online programs &mdash; especially asynchronous ones &mdash; use more flexible schedules, they also require self-sufficiency and may not offer as much interaction with faculty and peers. Some degrees offer hybrid learning models, which combine online and in-person requirements and can provide benefits from both styles of learning.<\/p>\r\n\r\n<p>You should also investigate important statistics from each school like student-to-faculty ratios as well as graduation and job placement rates. Graduation rates can indicate how well a school supports its students, while job placement rates can reveal how marketable the degree is for graduates beginning their careers. Institutions with lower student-to-faculty ratios often have more opportunities for personalized instruction.<\/p>\r\n\r\n<p>The table below explores the proportion of students taking online classes in North Dakota in 2021. Note that these enrollment trends may reflect the COVID-19 pandemic.<\/p>\r\n\r\n<div id=\"everviz-hs7YaWTo0\" class=\"everviz-hs7YaWTo0\"><script src=\"https:\/\/app.everviz.com\/inject\/hs7YaWTo0\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent\">\n    <div class=\"container content\">\n        \r\n<h3 class=\"text-center\">Explore rankings for top cybersecurity programs around the country:<\/h3>\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1187635203-425x230-c-default.jpg\"\n        alt=\"Associate Degree Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Associate Degree Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/associate-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-961044020-425x230-c-default.jpg\"\n        alt=\"Best Online Bachelor's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Best Online Bachelor's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-cyber-security-bachelors-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-589090389-425x230-c-default.jpg\"\n        alt=\"Best Online Master's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Best Online Master's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-cyber-security-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-619503664-425x230-c-default.jpg\"\n        alt=\"Top Doctoral Degree Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Top Doctoral Degree Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cybersecurity Concentrations and Similar Degrees<\/h3>\r\n\r\n<p>There are multiple options for cybersecurity education in North Dakota. Below, we explore three programs at different levels to survey the diversity of academic credentials in the state.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n<div class=\"bg-accent-50 px-5 py-1 rounded-lg\">\r\n<h4>Cybersecurity graduate certificate<\/h4>\r\n<p><a href=\"https:\/\/www.minotstateu.edu\/business\/pages\/grad_programs\/cm-cert.shtml\" target=\"_blank\" rel=\"nofollow noopener\">Minot State University<\/a> offers a graduate-level certificate in cybersecurity management. This three-course credential runs fully online and helps train enrollees for advanced roles in cybersecurity. Students can transfer these credits to the school's master's in information systems program.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-accent-50 px-5 py-1 rounded-lg\">\r\n<h4>Online cybersecurity master's degree<\/h4>\r\n<p>The online master's degree in cybersecurity from the <a href=\"https:\/\/onlinedegrees.und.edu\/masters-cyber-security\/\" target=\"_blank\" rel=\"nofollow noopener\">University of North Dakota<\/a> requires 36 credits. Students can complete the program in two years of full-time study. Curriculum tracks include ethical hacking, computer forensics, and secure networks.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-accent-50 px-5 py-1 rounded-lg\">\r\n<h4>Cybersecurity and computer networks associate degree<\/h4>\r\n<p>The two-year associate degree in cybersecurity and computer networks from <a href=\"https:\/\/bismarckstate.edu\/academics\/programs\/computersupport\/\" target=\"_blank\" rel=\"nofollow noopener\">Bismarck College<\/a> runs on campus and online. The program can help learners qualify for entry-level jobs in tech and IT. Courses explore topics like networking, Windows infrastructures, and Linux.<\/p>\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<h3>Paying for Your Cybersecurity Degree in North Dakota<\/h3>\r\n\r\n<p>Pursuing a college degree can be expensive. Across almost every degree type, North Dakota offers lower-than-average tuition, including out-of-state tuition that comes in below some states' in-state prices.<\/p>\r\n\r\n<p>Research financial aid options to <a href=\"\/resources\/how-to-pay-for-a-degree\/\">help pay for your degree<\/a>, including scholarships, fellowships, grants, and student loans.<\/p>\r\n\r\n<div id=\"everviz-2sKZ-7kpU\" class=\"everviz-2sKZ-7kpU\"><script src=\"https:\/\/app.everviz.com\/inject\/2sKZ-7kpU\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"in-state-vs-out-of-state-tuition\" id=\"in-state-vs-out-of-state-tuition\"><\/a>\n\n\r\n<h4>In-State Versus Out-of-State Tuition<\/h4>\r\n\r\n<p>Since public universities receive funding from residents' taxes, they typically charge learners from within the state a lower tuition rate compared to students from other states. In North Dakota, the average tuition for out-of-state learners at public institutions is roughly $4,500 higher than for in-state learners. Note that some online programs may charge distance education enrollees in-state or otherwise lower tuition, which can help learners save money.<\/p>\r\n\r\n<p>North Dakota is also a member of two reciprocity programs: the <a href=\"https:\/\/www.mhec.org\/\" target=\"_blank\" rel=\"noopener\">Midwestern Higher Education Compact<\/a> and the <a href=\"https:\/\/www.wiche.edu\/our-region\/\" target=\"_blank\" rel=\"noopener\">Western Interstate Commission for Higher Education<\/a>. Participating institutions offer lower tuition to students from other states with membership in these pacts.<\/p>\r\n\r\n<h4>North Dakota's Cost of Living<\/h4>\r\n\r\n<p>In addition to tuition, learners should budget for expenses like rent and groceries. According to <a href=\"https:\/\/worldpopulationreview.com\/state-rankings\/cost-of-living-index-by-state\" target=\"_blank\" rel=\"noopener\">World Population Review<\/a>, which scores each state against a national index of 100, North Dakota has a lower-than-average cost of living with a 94.6 score.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/scholarships-military-veterans\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore cybersecurity scholarships for military and veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/cybersecurity-resources-for-underrepresented-populations\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find resources and organizations for underrepresented populations<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/lgbtq-scholarships\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover scholarships for LGBTQIA+ students<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Popular Online Programs<\/h2>\r\n<p>Learn about start dates, transferring credits, availability of financial aid, and more by contacting the universities below.<\/p>\r\n<sonic-editorial-listings limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n\r\n<h2>North Dakota Jobs for Cybersecurity Graduates<\/h2>\r\n\r\n<p>Our growing dependence on technology means an increased demand for professionals with tech skills, including cybersecurity knowledge. Consequently, jobs in this field are in demand across the globe, including in North Dakota. Because almost every industry uses technology and has secure information that needs protection, professionals can find <a href=\"\/jobs\/\">cybersecurity job opportunities<\/a> across sectors.<\/p>\r\n\r\n<h3>Select Cybersecurity Careers in North Dakota<\/h3>\r\n\r\n<h4><a href=\"\/jobs\/security-analyst\/\">Information Security Analysts<\/a><sonic-icon icon=\"exclamation\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n\r\n<p>Information security analysts protect organizations' computer networks and systems from security breaches and cyberthreats. They monitor for suspicious activities, implement security measures, and respond to incidents to ensure data remains secure.<\/p>\r\n\r\n<ul>\r\n<li><strong>2022 Average Wage in North Dakota: <\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noopener\">$90,130<\/a><\/li>\r\n<li><strong>Job Outlook in North Dakota (2020-30): <\/strong><a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=38&amp;Name=information+security+analyst&amp;NameSelect%5B%5D=402&amp;items_per_page=10\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a> projects 23.1% job growth between 2020 and 2030 for this career in North Dakota.<\/li>\r\n<\/ul>\r\n\r\n<h4><a href=\"\/jobs\/penetration-tester\/\">Penetration Tester<\/a><sonic-icon icon=\"cursor-click\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n\r\n<p>A penetration tester, also called an ethical hacker, is a cybersecurity professional responsible for assessing the security of computer systems, networks, and applications. These workers simulate cyberattacks to identify vulnerabilities and weaknesses that malicious hackers can exploit. Typically, a penetration tester needs a background in computer science, information security, or a related field, and may need certifications such as <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-v12\/\" target=\"_blank\" rel=\"noopener\">certified ethical hacker<\/a> or <a href=\"https:\/\/www.offsec.com\/courses\/pen-200\/\" target=\"_blank\" rel=\"noopener\">offensive security certified professional<\/a>.<\/p>\r\n\r\n<ul>\r\n<li><strong>2022 Average Wage in North Dakota: <\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noopener\">$90,130<\/a><\/li>\r\n<li><strong>Job Outlook in North Dakota (2020-30): <\/strong><a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=38&amp;Name=information&amp;items_per_page=10\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a> includes penetration testers in the broad career category of information security analysts. The organization projects 23.1% job growth between 2020 and 2030 for this career in North Dakota.<\/li>\r\n<\/ul>\r\n\r\n<h4><a href=\"\/jobs\/security-engineer\/\">Security Engineer<\/a><sonic-icon icon=\"lock-closed\" size=\"small\" type=\"solid\" color=\"#1222B6\"><\/sonic-icon><\/h4>\r\n\r\n<p>Security engineers design and implement secure IT infrastructures, manage security solutions, and respond to incidents. They need a background in computer science or information security, along with practical experience in security technologies. Credentials like <a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\" target=\"_blank\" rel=\"noopener\">certified information systems security professional<\/a> or <a href=\"https:\/\/www.isaca.org\/credentialing\/cism\" target=\"_blank\" rel=\"noopener\">certified information security manager<\/a> can help boost career prospects.<\/p>\r\n\r\n<ul>\r\n<li><strong>2022 Average Wage in North Dakota: <\/strong><a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noopener\">$90,130<\/a><\/li>\r\n<li><strong>Job Outlook in North Dakota (2020-30): <\/strong><a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B%5D=38&amp;Name=information&amp;items_per_page=10\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a> includes security engineers in the broad career category of information security analysts. The organization projects 23.1% job growth between 2020 and 2030 for this career in North Dakota.<\/li>\r\n<\/ul>\r\n\r\n<h3>North Dakota Employment Trends<\/h3>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Projected Job Growth for Information Security Analysts, Computer Network Architects, and Software Developers and Software Quality Assurance Analysts and Testers<\/caption>\r\n<thead>\r\n<tr>\r\n<th col>Year<\/th>\r\n<th col>State<\/th>\r\n<th col>National<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Information Security Analysts<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2018 Employment<\/td>\r\n<td data-title=\"State\">130<\/td>\r\n<td data-title=\"National\">66,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2028 Projected Employment<\/td>\r\n<td data-title=\"State\">160<\/td>\r\n<td data-title=\"National\">67,300<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2018-28<\/td>\r\n<td data-title=\"State\">+23.1%<\/td>\r\n<td data-title=\"National\">+1.7%<\/td>\r\n<\/tr>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Computer Network Architects<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2018 Employment<\/td>\r\n<td data-title=\"State\">140<\/td>\r\n<td data-title=\"National\">165,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2028 Projected Employment<\/td>\r\n<td data-title=\"State\">170<\/td>\r\n<td data-title=\"National\">174,200<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2018-2028<\/td>\r\n<td data-title=\"State\">+21.4%<\/td>\r\n<td data-title=\"National\">+5.4%<\/td>\r\n<\/tr>\r\n<tr class=\"bg-accent\">\r\n<td colspan=\"3\">Software Developers and Software Quality Assurance Analysts and Testers<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2020 Employment<\/td>\r\n<td data-title=\"State\">1,640<\/td>\r\n<td data-title=\"National\">1,847,900<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">2030 Projected Employment<\/td>\r\n<td data-title=\"State\">2,100<\/td>\r\n<td data-title=\"National\">2,257,400<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Year\">Projected Job Growth, 2020-2030<\/td>\r\n<td data-title=\"State\">+28%<\/td>\r\n<td data-title=\"National\">+22%<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Source: <a href=\"https:\/\/projectionscentral.com\/Projections\/LongTerm\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a><\/p>\r\n\r\n<table class=\"sonic-table rounded shadow\">\r\n<caption>Salaries for Cybersecurity and Related Careers, 2022<\/caption>\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">Career<\/th>\r\n<th scope=\"col\">North Dakota Employment<\/th>\r\n<th scope=\"col\">North Dakota Annual Mean Wage<\/th>\r\n<th scope=\"col\">National Median Annual Wage<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td data-title=\"Career\">Computer and Information Systems Managers<\/td>\r\n<td data-title=\"ND Employment\">540<\/td>\r\n<td data-title=\"ND Wage\">$138,830<\/td>\r\n<td data-title=\"National Wage\">$173,670<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Hardware Engineers<\/td>\r\n<td data-title=\"ND Employment\">150<\/td>\r\n<td data-title=\"ND Wage\">$112,930<\/td>\r\n<td data-title=\"National Wage\">$140,830<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Network Architects<\/td>\r\n<td data-title=\"ND Employment\">170<\/td>\r\n<td data-title=\"ND Wage\">$103,230<\/td>\r\n<td data-title=\"National Wage\">$129,490<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Network Support Specialists<\/td>\r\n<td data-title=\"ND Employment\">800<\/td>\r\n<td data-title=\"ND Wage\">$68,180<\/td>\r\n<td data-title=\"National Wage\">$76,060<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Programmers<\/td>\r\n<td data-title=\"ND Employment\">310<\/td>\r\n<td data-title=\"ND Wage\">$89,220<\/td>\r\n<td data-title=\"National Wage\">$102,790<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Computer Systems Analysts<\/td>\r\n<td data-title=\"ND Employment\">200<\/td>\r\n<td data-title=\"ND Wage\">$95,540<\/td>\r\n<td data-title=\"National Wage\">$107,530<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Information Security Analysts<\/td>\r\n<td data-title=\"ND Employment\">250<\/td>\r\n<td data-title=\"ND Wage\">$90,130<\/td>\r\n<td data-title=\"National Wage\">$119,860<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Network and Computer Systems Administrators<\/td>\r\n<td data-title=\"ND Employment\">630<\/td>\r\n<td data-title=\"ND Wage\">$83,360<\/td>\r\n<td data-title=\"National Wage\">$97,160<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Software Developers<\/td>\r\n<td data-title=\"ND Employment\">2,070<\/td>\r\n<td data-title=\"ND Wage\">$85,220<\/td>\r\n<td data-title=\"National Wage\">$132,930<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">Web Developers<\/td>\r\n<td data-title=\"ND Employment\">80<\/td>\r\n<td data-title=\"ND Wage\">$75,980<\/td>\r\n<td data-title=\"National Wage\">$87,580<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align:right\" class=\"text-sm\">Source: <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes_stru.htm\" target=\"_blank\" rel=\"noopener\">BLS OEWS<\/a><\/p>\r\n\r\n<p>While average tech wages in North Dakota are lower than average, this corresponds to the state's lower-than-average cost of living, which means that cybersecurity workers' salaries may have higher purchasing power than their counterparts with higher wages in more expensive states. Additionally, even careers like <a href=\"\/jobs\/security-software-developer\/\">software developer<\/a> &mdash; with an average salary almost $50,000 below the national average &mdash; earn higher average wages than the state's average wage for all workers, which was <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes_nd.htm\" target=\"_blank\" rel=\"noopener\">$55,800 as of 2022<\/a>.<\/p>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent\">\n    <div class=\"container content\">\n        \r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover more cybersecurity jobs<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/government-cyber-security-careers\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Consider a cybersecurity career in government<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/careers-for-vets\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Which cybersecurity careers are best for veterans?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/transitioning-from-general-it\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Transition From IT into cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Cybersecurity Employers in North Dakota<\/h3>\r\n\r\n<p><strong><a href=\"https:\/\/www.cisa.gov\/about\/divisions-offices\/infrastructure-security-division\" target=\"_blank\" rel=\"noopener\">U.S. Cybersecurity &amp; Infrastructure Security Agency<\/a>: <\/strong>The U.S. Cybersecurity &amp; Infrastructure Security Agency has a branch in Bismarck that hires security professionals. This division handles issues like chemical and infrastructure sector security.<\/p>\r\n\r\n<p><strong><a href=\"https:\/\/careers.leidos.com\/\" target=\"_blank\" rel=\"noopener\">Leidos<\/a>: <\/strong>Leidos is an American defense, aviation, information technology, and biomedical research company with operations in North Dakota cities like Bismarck and Grand Forks. The organization provides services to government agencies, national security organizations, and businesses.<\/p>\r\n\r\n<p><strong><a href=\"https:\/\/und.edu\/\" target=\"_blank\" rel=\"nofollow noopener\">University of North Dakota<\/a> and <a href=\"https:\/\/www.ndsu.edu\/\" target=\"_blank\" rel=\"nofollow noopener\">North Dakota State University:<\/a> <\/strong>Institutions like North Dakota State University and the University of North Dakota both hire IT professionals to help run digital operations and protect sensitive data like student information.<\/p>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"professional-organizations\" id=\"professional-organizations\"><\/a>\n\n\r\n<h3>Cybersecurity Organizations in North Dakota<\/h3>\r\n\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<p><a href=\"https:\/\/www.ndit.nd.gov\/\" target=\"_blank\" rel=\"noopener\">The North Dakota Information Technology Department<\/a> offers educational resources and training opportunities for students and professionals to enhance cybersecurity knowledge and skills.<\/p>\r\n<\/div>\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<p><a href=\"https:\/\/cyberconbsc.com\/\" target=\"_blank\" rel=\"noopener\">Cybercon<\/a> at Bismarck State College is an annual conference in Bismarck that brings together industry experts, professionals, and enthusiasts to discuss cybersecurity trends, challenges, and solutions.<\/p>\r\n<\/div>\r\n<div class=\"pl-4\" style=\"border-left:3px solid #1271E4\">\r\n<p>The <a href=\"https:\/\/engineering.und.edu\/research\/cyber-security\/symposium.html\" target=\"_blank\" rel=\"nofollow noopener\">Cyber Awareness and Research Symposium<\/a> at the University of North Dakota provides networking opportunities for industry professionals, academics, and the community. The symposium is divided into two tracks: The awareness track focuses on educating attendees about topics like cyber hygiene and asset protection. The research track focuses on research about new cybersecurity methods.<\/p>\r\n<\/div>\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"top-schools\" id=\"top-schools\"><\/a>\n\n\r\n<h2>Schools With Cybersecurity Degrees in North Dakota<\/h2>\r\n\r\n<ul>\r\n<li><a href=\"https:\/\/und-public.courseleaf.com\/graduateacademicinformation\/departmentalcoursesprograms\/engineering\/electricalengineering\/ee-ms-cs\/\" target=\"_blank\" rel=\"noopener\">North Dakota State University<\/a>: NDSU offers an MS in cybersecurity. This degree builds advanced knowledge in cybersecurity, digital forensics, and secure software development.<\/li>\r\n<li><a href=\"https:\/\/www.umary.edu\/academics\/undergraduate-programs\/cyber-security-administration#:~:text=The%20cyber%20security%20administration%20program,than%20some%20of%20your%20peers.\" target=\"_blank\" rel=\"nofollow noopener\">University of Mary<\/a>: The University of Mary's BS in cybersecurity administration is designed to equip enrollees with skills in cybersecurity tools, digital forensics, and ethical hacking. The curriculum combines theory with hands-on training to prepare students for cybersecurity challenges in various industries.<\/li>\r\n<li><a href=\"https:\/\/und.edu\/programs\/cyber-security-bs\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">University of North Dakota<\/a>: UND's BS in cybersecurity focuses on preparing students with practical skills and real-world cybersecurity experience. The program emphasizes hands-on opportunities, including a two-semester course sequence that requires learners to design and test a project.<\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Popular Online Programs<\/h2>\r\n<p>Learn about start dates, transferring credits, availability of financial aid, and more by contacting the universities below.<\/p>\r\n<sonic-editorial-listings limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n        \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>Questions About Cybersecurity in North Dakota<\/h2>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Can I get a cybersecurity degree in North Dakota?<\/h3>\r\n\r\n<p>Yes, numerous public and private institutions in North Dakota offer cybersecurity programs at multiple degree levels. Some programs specifically focus on cybersecurity, while others have a broader information security focus.<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Are the best cybersecurity schools in North Dakota expensive?<\/h3>\r\n\r\n<p>Average tuition in North Dakota is lower than the national averages at four-year schools and for out-of-state learners at two-year schools. Even with this lower-than-average tuition, prospective students should research financial aid options to help reduce the cost of their degree.<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Are cybersecurity programs in North Dakota competitive?<\/h3>\r\n\r\n<p>Generally, as the demand for cybersecurity professionals increases, programs may become more competitive due to a growing number of applicants seeking to enter the field.<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Is cybersecurity a good career in North Dakota?<\/h3>\r\n\r\n<p>Cybersecurity careers are in demand in North Dakota. Many tech roles in the state pay average wages that exceed the state's average wage for all workers. Because digital security is necessary across many industries, cybersecurity professionals can find work with many businesses and <a href=\"\/resources\/government-cyber-security-careers\/\">government agencies<\/a>.<\/p>\r\n<\/div>\r\n\r\n<p><em>Last reviewed August 14, 2023.<\/em><\/p>","protected":false},"excerpt":{"rendered":"In March of 2023, for being the first state in the country to require cybersecurity education as a part of its grade school curriculum. With multiple educational programs, job opportunities,&#8230;","protected":false},"author":5,"featured_media":6645,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[19],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-n"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":8041,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/332\/revisions\/8041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/6645"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=332"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=332"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=332"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=332"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}