{"id":355,"date":"2021-09-28T15:04:44","date_gmt":"2021-09-28T15:04:44","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=355"},"modified":"2022-12-07T15:53:13","modified_gmt":"2022-12-07T15:53:13","slug":"cybersecurity-programs-in-oklahoma","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/oklahoma\/","title":{"rendered":"Cybersecurity Programs in Oklahoma"},"content":{"rendered":"<p>Oklahoma has a growing cyber security scene,&nbsp;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.burning-glass.comhttps\/\/res.cloudinary.com\/highereducation\/image\/upload\/f_auto,fl_lossy,q_auto\/v1\/CyberDegrees.org\/Cybersecurity_Jobs_Report_2015.pdf\" target=\"_blank\">doubling job opportunities<\/a>&nbsp;in the field between 2010 and 2014. To get in on the growth, you\u2019ll need a college education. Feel free to skip straight to our&nbsp;<a href=\"\/listings\/oklahoma\/#school-listings-start\">list<\/a>&nbsp;of Oklahoma cyber security programs, or keep reading for the lowdown on scholarships, tech communities and career paths within the Sooner State.<\/p>\r\n\r\n\r\n\r\n<h2>Studying Cybersecurity in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<p>For bachelor\u2019s and master\u2019s degrees in cyber security, Oklahomans have five in-state options: Cameron University, Northeastern State University, Oklahoma State University Institute of Technology, Oklahoma State University in Stillwater, and University of Tulsa. The National Security Agency (NSA) and the Department of Homeland Security (DHS) designated the latter two as National Centers of Academic Excellence in Cyber Defense Education and Research. Associate degrees and certifications are numerous as well, with Oklahoma City Community College and Rose State College also receiving NSA\/DHS recognition. That\u2019s in addition to the credential opportunities offered by the state\u2019s tech centers.<\/p>\r\n\r\n\r\n\r\n<p>Here are some highlights of the state\u2019s academic scene for cyber security:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n      <li>University of Tulsa operates an MS in Cyber Security program out of its <a href=\"https:\/\/engineering.utulsa.edu\/centers-institutes\/isec\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Institute for Information Security (iSec)<\/a>. But University of Tulsa faculty train more than just their own graduate students. The university is the principal trainer for the <a href=\"https:\/\/atecenters.org\/st\/csec\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security Education Consortium<\/a>, which spans two- and four-year institutions across Oklahoma and seven other states.<\/li>\r\n      <li>Oklahoma State University houses the <a href=\"http:\/\/ctans.okstate.edu\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Center for Telecommunications and Network Security<\/a> and, as of 2017, was the sole distance learning provider in the state for cyber security.<\/li>\r\n      <li>High schoolers and nontraditional students can benefit from the state\u2019s <a href=\"https:\/\/www.okcareertech.org\/technology-centers\" target=\"_blank\" rel=\"noopener noreferrer\">CareerTech system<\/a>. Francis Tuttle Technology Center, Oklahoma CareerTech, Tulsa Tech and Great Plains Technology Center all offer cyber security coursework that can transfer to a state college associate degree in the subject.<\/li>\r\n      <li>The Committee on National Security Systems (CNSS) maintains six certifications, which cover everything from information systems security to risk analysis. Rose State College became the first two-year college in the country to offer all six.<\/li>\r\n    <\/ul>\r\n\r\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Cybersecurity Bachelor's<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\r\n\r\n<h2>Online Cybersecurity Programs in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<p>There\u2019s not a lot online for cyber security learners in Oklahoma, with just two programs available. Keep an eye out for new additions at the&nbsp;<a href=\"http:\/\/www.okelectroniccampus.org\/Programs\/ProgramTerm.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Online College of Oklahoma<\/a>, which is a catalog of distance learning programs from participating schools.<\/p>\r\n\r\n\r\n\r\n<h3>Online Master\u2019s Degrees In Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>Oklahoma State University\u2019s on-campus <a data-wpil=\"url\" href=\"https:\/\/www.cyberdegrees.org\/listings\/top-masters-in-information-assurance-programs\">Master of Science in Information Assurance is also offered online<\/a>. The MSIA is administered by the Spears School of Business, so you can expect a curriculum packed with technical security courses (e.g. applied information systems security, secure information systems administration, etc.)&nbsp;<em>and<\/em>&nbsp;classes that tackle major leadership concerns such as legality and ethics, risk assessment, and defensive practices. OSU is an NSA-CAE school and Spears is accredited by the Association to Advance Collegiate Schools of Business (AACSB).<\/p>\r\n\r\n\r\n\r\n<h3>Online Certificate Programs In Cybersecurity<\/h3>\r\n\r\n\r\n\r\n<p>Oklahoma State University offers a 15-credit online Graduate Certificate in Information Assurance through the Center for Telecommunications and Network Security. To get in, you\u2019ll need to have a baccalaureate in an IT field. That\u2019s because the certificate tackles advanced technical concepts specific to telecommunications along with management coursework.<\/p>\r\n\r\n\r\n\r\n<h2>Cybersecurity Scholarships in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<h3>Oklahoma State University-Main Campus<\/h3>\r\n\r\n\r\n\r\n<ul>\r\n      <li>\r\n<a href=\"https:\/\/business.okstate.edu\/msis\/scholarships.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Chesapeake MIS Scholarship<\/a>: Returning students in the Management Information Systems (MIS) program, including those pursing the Information Assurance option, are eligible for this award when they notch a 3.0 GPA.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/business.okstate.edu\/msis\/scholarships.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ConocoPhillips Freshman Incentive Scholarship<\/a>: An ACT score of 27 and a high school GPA of 3.2 is enough for incoming students in the Department of Management Science and Information Systems, including MIS students, to qualify for one of ConocoPhillips awards. To renew past your first year, keep a 3.0 GPA.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/business.okstate.edu\/msis\/scholarships.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ONEOK MSIS Scholarship<\/a>: This scholarship for returning undergrads with a 3.0 GPA includes not only a financial award but also mentoring opportunities for the recipient.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/business.okstate.edu\/msis\/scholarships.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Additional Management Science and Information Systems Scholarships<\/a>: More awards are available for MIS students of all levels. Several take financial need and\/or leadership capabilities into account.<\/li>\r\n    <\/ul>\r\n\r\n\r\n\r\n<h3>Rose State College<\/h3>\r\n\r\n\r\n\r\n<ul>\r\n      <li>\r\n<a href=\"https:\/\/www.rose.edu\/content\/admissions-aid\/financial-aid-scholarships\/scholarships\/division-specific-foundation-and-college-funded-scholarships\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Business and Information Technology Scholarships<\/a>: The Business and Information Technology Division, which includes the Cyber Security\/Digital Forensics program, offers scholarships ranging all the way to a full tuition waiver. Students qualify by submitting the General Scholarship Application between January and March.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/www.rose.edu\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Rose State College Cyber Security Scholarship<\/a>: Full-time students accepted into the Cyber Security program may qualify for this award by maintaining a 3.0 GPA and first taking prerequisites in math, English and reading. Financial need is a factor.<\/li>\r\n    <\/ul>\r\n\r\n\r\n\r\n<h3>University Of Tulsa<\/h3>\r\n\r\n\r\n\r\n<ul><li><a href=\"https:\/\/engineering.utulsa.edu\/cyber-corps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Corps Scholarship for Service<\/a>: The benefits of this award for undergraduate upperclassmen and graduate students pursuing a cyber security degree are obvious: a generous living stipend along with free tuition and books and a paid summer internship. In exchange, recipients agree to work with a federal agency for two years upon graduation.<\/li><\/ul>\r\n\r\n\n<section>\n\t<div class=\"text-center mb-8\">\n\t\t<sonic-tooltip class=\"block text-xs text-center mb-4\" label=\"Learn More About Our Partners\">\n\t\t\t<span>CyberDegrees.org is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.<\/span>\n\t\t<\/sonic-tooltip>\n\t<\/div>\n\t<div class=\"bootcamp-widget rounded bg-white box-border pb-10\">\n\t\t<img decoding=\"async\" loading=\"lazy\" class=\"m-auto -mt-8\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/w_120,h_82,c_fill,f_auto,fl_lossy,q_auto\/v1622734180\/BestColleges.com\/sonic\/icon-click.svg\" width=\"120\" height=\"82\" alt=\"\"\/>\n\t\t<h3 class=\"text-center text-2xl md:text-3xl font-bold mt-8 md:mt-12 mb-2 md:mb-3 px-4\">Match me with a bootcamp.<\/h3>\n\t\t<p class=\"text-center text-base mb-8 px-3\">Find programs with your skills, schedule, and goals in mind.<\/p>\n\t\t<div class=\"text-center w-full\">\n\t\t\t<a href=\"\/discover\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"sonic-btn bg-primary-800 hover:bg-primary-900 focus:bg-primary-900 uppercase mx-auto w-64 font-heading\" data-tracking=\"&#x7B;&quot;log&quot;&#x3A;true,&quot;event&quot;&#x3A;&quot;click&quot;,&quot;beam&quot;&#x3A;&quot;ElementClicked&quot;,&quot;data&quot;&#x3A;&#x7B;&quot;position&quot;&#x3A;&quot;PRIMARY&quot;,&quot;location&quot;&#x3A;&quot;BOOTCAMP&#x20;MATCH&#x20;WIDGET&quot;,&quot;elementType&quot;&#x3A;&quot;LINK&quot;,&quot;text&quot;&#x3A;&quot;MATCH&#x20;ME&#x20;TO&#x20;A&#x20;BOOTCAMP&quot;&#x7D;,&quot;actionOutcome&quot;&#x3A;&quot;INTERNALLINK&quot;&#x7D;\">Match me to a bootcamp<\/a>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\r\n\r\n<h2>Cybersecurity Events in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<h3>Cybersecurity Meetups &amp; Communities In Oklahoma<\/h3>\r\n\r\n\r\n\r\n<p>Membership organizations and informal gatherings of cyber security professionals are mainly confined to the state\u2019s two main population centers, Oklahoma City and Tulsa. We\u2019ve rounded up a few that welcome students:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n      <li>\r\n<a href=\"https:\/\/www.meetup.com\/Oklahoma-City-ISSA\/\" target=\"_blank\" rel=\"noopener noreferrer\">Information Systems Security Association (ISSA)<\/a>: ISSA is the primary membership organization for InfoSec professionals. Student members who join either the <a href=\"https:\/\/www.meetup.com\/Oklahoma-City-ISSA\/\" target=\"_blank\" rel=\"noopener noreferrer\">Oklahoma City<\/a> or <a href=\"http:\/\/oklahoma.issa.org\" target=\"_blank\" rel=\"noopener noreferrer\">Tulsa<\/a> group can attend monthly meetings to take care of chapter business and listen to outside speakers.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/www.isaca.org\/pages\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ISACA<\/a>: ISACA used to be called the Information Systems Audit and Control Association. Annual student memberships and dues are cheap and allow you to attend monthly chapter meetings, where you can network with IT governance professionals in either the <a href=\"https:\/\/engage.isaca.org\/tulsachapter\/home\" target=\"_blank\" rel=\"noopener noreferrer\">Tulsa<\/a> or <a href=\"https:\/\/www.isaca.org\/chapters3\/Central-Oklahoma\/Pages\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Central Oklahoma<\/a> (OKC) chapter.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/www.meetup.com\/TheIrregulars405\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Irregulars<\/a>: OKC\u2019s ethical hackers unite for a monthly meeting where they can socialize and listen to presentations. The group also maintains a virtual lab, which it uses to play hacking games with other members.<\/li>\r\n    <\/ul>\r\n\r\n\r\n\r\n<h3>Cybersecurity Conferences &amp; Workshops In Oklahoma<\/h3>\r\n\r\n\r\n\r\n<p>By joining any of the organizations above, you should be among the first to hear about upcoming cyber security events, including the following:<\/p>\r\n\r\n\r\n\r\n<ul>\r\n      <li>\r\n<a href=\"https:\/\/www.bsidesok.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BSides Oklahoma<\/a>: Put on by ISSA and <a href=\"https:\/\/www.techlahoma.org\" target=\"_blank\" rel=\"noopener noreferrer\">Techlahoma<\/a>, the annual BSides Oklahoma event is part of a national movement of local conferences designed to showcase the best of a community\u2019s cyber security scene. Spend the entire first day of BSides Oklahoma in a paid training of your choice, learning about anything from social engineering to AWS logs. Or skip the training and come for the free presentations on Day 2.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/www.infragardok.org\" target=\"_blank\" rel=\"noopener noreferrer\">Information Warfare Summit (IWS)<\/a>: Infragard is a professional organization for government officials and cyber security stakeholders to work together to secure the nation\u2019s infrastructure. The Oklahoma chapter has hosted the daylong, multi-track IWS since 2008.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/business.okstate.edu\/cepd\/open-enrollment\/conferences\/cyber-security\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Oklahoma State University Cyber Security Conference<\/a>: A newer entrant to the conference circuit, this one-day event in OKC targets business managers and IT professionals.<\/li>\r\n      <li>\r\n<a href=\"https:\/\/www.innotechok.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Root66 Information Security Conference<\/a>: Held as part of the InnoTech Oklahoma conference in 2017, the Root66 conference is a full-day event for regional IT professionals and managers to learn more about security compliance and emerging threats.<\/li>\r\n    <\/ul>\r\n\r\n\r\n\r\n<h2>Cybersecurity Jobs in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<p>Oklahoma is home to five Fortune 500 companies, all of which are in the energy business. None of them hire more than a few thousand Oklahomans total, but if scholarships are any indication, several are looking to build their cyber security workforce to help protect their pipelines and energy grids. Chesapeake, Devon Energy and ONEOK all put their names on information systems awards at Oklahoma State University, as does Houston-based Phillips66. A quick scan through <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"job\" data-wpil-keyword-link=\"linked\">job<\/a> sites like Indeed.com and Glassdoor.com confirms that the main avenue for employment in the cyber security field is in the energy sector, although Atlanta-based SecureWorks (Dell\u2019s InfoSec services wing) maintains a large presence in Oklahoma City.<\/p>\r\n\r\n\r\n\r\n<h2>Cybersecurity Salaries in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<p>Oklahoma\u2019s cyber security workforce sits at the lower end of the salary spectrum. According to the U.S. Bureau of Labor Statistics, information security analysts make $60,000 a year on average compared to a national figure of $90,000. Other jobs in the field, such as IT <a href=\"\/jobs\/security-specialist\/\">security specialist<\/a>, show a similar divergence, although there simply aren\u2019t enough cyber professionals in the state yet to take statistical averages as gospel.<\/p>\r\n\r\n\r\n\r\n<p>When comparing salary potential, keep in mind that Oklahoma maintains the fifth-lowest cost of living of any state in the Union, handily beating tech hotspots in California, New York and DC in every spending category.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"school-listings-start\">All Cybersecurity Programs in Oklahoma<\/h2>\r\n\r\n\r\n\r\n<p>Below are all the matching programs we found in our directory, from&nbsp;8&nbsp;Oklahoma schools.<\/p>\r\n\r\n\r\n\r\n<table class=\"sonic-table\"><thead><tr><th>SCHOOL NAME<\/th><th>PROGRAMS<\/th><th>NSA<\/th><\/tr><\/thead><tbody><tr><td>Cameron University<\/td><td>Lawton, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.cameron.edu\/cybersecurity\/degrees\">Associate in Applied Science in IT \u2013 Information Assurance\/Security<\/a><br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.cameron.edu\/cybersecurity\/degrees\">Bachelor of Science in IT \u2013 Information Assurance\/Security<\/a><\/td><td><\/td><\/tr><tr><td>Northeastern State University<\/td><td>Tahlequah, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/academics.nsuok.edu\/criminaljustice\/Degree-Programs\/Cyber-Security\">Bachelor of Science in Cyber Security<\/a><\/td><td><\/td><\/tr><tr><td>Oklahoma City Community College<\/td><td>Oklahoma City, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/occc.edu\/academics\/programs\/cyber-information-security.html\">Cyber\/Information Security Certificate of Mastry<\/a><br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.occc.edu\/catalog\/2015-2016\/degree-programs\/information-technology\/computer-science-cyberinformation-security-aas.html\">OCCC Associate Degree in Applied Science in Cyber Information Security<\/a><br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.occc.edu\/catalog\/2015-2016\/degree-programs\/information-technology\/computer-science-cyberinformation-security-option-transferring-to-osu-it-and-colleges-with-similar-patterns-as.html\">OCCC Associate Degree in Science in Cyber Information Security<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Oklahoma State University Institute of Technology-Okmulgee<\/td><td>Okmulgee, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/osuit.edu\/it\/cybersecurity.php\">Bachelor of Technology in Information Technologies \u2013 Cybersecurity and Digital Forensics<\/a><\/td><td><\/td><\/tr><tr><td>Oklahoma State University-Main Campus<\/td><td>Stillwater, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/business.okstate.edu\/online\/graduate\/programs\/certificates.html\">Graduate Certificate in Information Assurance<\/a><br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/go.okstate.edu\/undergraduate-academics\/majors\/management-information-systems.html\">Management Information Systems bachelor\u2019s degree \u2013 Information Assurance Emphasis<\/a><br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/business.okstate.edu\/watson\/msia\/\">Master of Science in Information Assurance<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>Oklahoma State University-Oklahoma City<\/td><td>Oklahoma City, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/osuokc.edu\/infotech\">Associate in Applied Science in Information Technology \u2013 Computer Forensics Option<\/a><\/td><td><\/td><\/tr><tr><td>Rose State College<\/td><td>Midwest City, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.rose.edu\/content\/academics\/academic-divisions\/business-information-technology\/cyber-securitydigital-forensics\/information-security-certificate-program\/\">Information Security Certificate Program<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><tr><td>University of Tulsa<\/td><td>Tulsa, Oklahoma<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/engineering.utulsa.edu\/computer-science\/cyber-security-programs\/\">Master of Science in Cyber Security<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><\/tbody><\/table>\r\n\r\n\r\n\r\n<h4>School Rankings<\/h4>\r\n\r\n\r\n\r\n<ul><li><a href=\"\/listings\/top-schools\/\">Top Schools<\/a><\/li><li><a href=\"\/listings\/best-online-cyber-security-bachelors-degrees\/\">Top 18 Online Cybersecurity Bachelors Degrees<\/a><\/li><li><a href=\"\/listings\/best-online-cyber-security-bachelors-degrees\/\">Top 20 Online Bachelors in IT Degrees<\/a><\/li><li><a href=\"\/listings\/best-online-cyber-security-certificate-programs\/\">Top 30 Online Certificate Programs<\/a><\/li><li><a href=\"\/listings\/best-online-computer-forensics-programs\/\">Top 17 Online Computer Forensics Programs<\/a><\/li><li><a href=\"\/listings\/top-online-masters-in-cyber-security-programs\/\">Top 25 Online Masters Degrees<\/a><\/li><\/ul>\r\n\r\n\r\n\r\n<h4>Useful Resources<\/h4>\r\n\r\n\r\n\r\n<ul><li><a href=\"\/resources\/transitioning-from-general-it\/\">Moving From General IT Jobs Into Cyber<\/a><\/li><li><a href=\"\/resources\/free-online-courses\/\">Free Online Cyber Security Courses (MOOCs)<\/a><\/li><li><a href=\"\/resources\/security-clearances\/\">A Quick Guide to Security Clearances<\/a><\/li><li><a href=\"\/resources\/certifications\/\">A Guide to Cyber Security Certifications<\/a><\/li><li><a href=\"\/resources\/government-cyber-security-careers\/\">Government Cyber Security Careers<\/a><\/li><li><a href=\"\/resources\/internet-safety-for-college-students\/\">Internet Safety for College Students<\/a><\/li><li><a href=\"\/resources\/the-big-list\/\">The Big List of Cyber Security Resources<\/a><\/li><\/ul>","protected":false},"excerpt":{"rendered":"Ready to study cybersecurity in Oklahoma? Start with our list of campus and online programs, and learn about cybersecurity in OK.","protected":false},"author":5,"featured_media":2099,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[20],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-o"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/355\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2099"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=355"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=355"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=355"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=355"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=355"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}