{"id":459,"date":"2021-09-28T15:00:58","date_gmt":"2021-09-28T15:00:58","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=459"},"modified":"2022-10-06T13:41:50","modified_gmt":"2022-10-06T13:41:50","slug":"cybersecurity-programs-in-wisconsin","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/wisconsin\/","title":{"rendered":"Cybersecurity Programs in Wisconsin"},"content":{"rendered":"<p>Badger State schools are slowly rolling out cyber security programs, with plenty of certificates and a handful of degrees available. See our <a href=\"\/listings\/wisconsin\/#school-listings-start\">list<\/a> of Wisconsin cyber security programs, or peruse the research projects, scholarships, communities and careers that attract cyber security specialists to Milwaukee, Madison, Green Bay and beyond.<\/p>\r\n\r\n\r\n\r\n<h2>Studying Cyber Security in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<p>Several of Wisconsin\u2019s two-year technical colleges provide a strong foundation in cyber security. The standout is Waukesha County Technical College, the state\u2019s only Center of Academic Excellence in Cyber Defense Education. It earned the distinction from the National Security Agency (NSA) and the Department of Homeland Security (DHS) in 2017. After earning an associate, you have a few possible destinations. Here are some of the big players:<\/p>\r\n\r\n\r\n\r\n<ul><li>Researchers within the University of Wisconsin system have data from top-tier academic institutions (e.g.,&nbsp;University of Southern California) and federal agencies&nbsp;(e.g.,&nbsp;the Defense Advanced Research Projects Agency), thanks to its participation in the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.impactcybertrust.org\/\" target=\"_blank\">Information Marketplace for Policy and Analysis of Cyber-risk &amp; Trust<\/a>, a database of figures covering everything from traffic flow to blackhole addresses. That should come in particularly handy for students in UW-Stout\u2019s bachelor\u2019s program.<\/li><li>Marquette University formed the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.marquette.edu\/cyber-security\/index.php\" target=\"_blank\">Center for Cyber Security Awareness and Cyber Defense<\/a> in 2016 to support its master\u2019s degree. The center hosts an annual Ethics of Big Data symposium, which explores the intersection of analytics and privacy.<\/li><li>Going to Marquette or UW-Milwaukee may soon work to students\u2019&nbsp;advantage for internships and research opportunities.&nbsp;The&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/astronautics.com\/\" target=\"_blank\">Astronautics Corporation of America<\/a>&nbsp;in Milwaukee has brought both schools on board to create the&nbsp;Center of Excellence for Integrated Aerospace and Defense Technologies. Industry partners and academic researchers will use the proposed&nbsp;facility to test aerospace cyber security systems.<\/li><li>The National Science Foundation (NSF) gave $5 million in 2016 toward the establishment of the <a rel=\"noreferrer noopener\" href=\"https:\/\/trustedci.org\/\" target=\"_blank\">Center for Trustworthy Scientific Cyberinfrastructure<\/a>, a joint effort between&nbsp;University of Wisconsin-Madison, Indiana University, the University of Illinois and the Pittsburgh Supercomputing Center. In essence, these are the researchers that protect the NSF\u2019s data from hacks.&nbsp;Professor Barton Miller of UW-Madison is part of the center\u2019s leadership team and heads&nbsp;the DHS-funded <a rel=\"noreferrer noopener\" href=\"https:\/\/continuousassurance.org\/\" target=\"_blank\">Software Assurance Marketplace<\/a>, which distributes open-source security testing tools to businesses.&nbsp;So, even though UW-Madison doesn\u2019t have a standalone cyber security program, you can feel comfortable attending for graduate studies.<\/li><li>Speaking of UW-Madison, the <a rel=\"noreferrer noopener\" href=\"https:\/\/wisecurity.org\/\" target=\"_blank\">Wisconsin Security Research Consortium<\/a> announced in 2015 its plan to form the Wisconsin Information Security Research Center (WISC) at UW-Madison\u2019s research park. It aims to attract security companies and develop a cyber security workforce through R&amp;D projects. Stay tuned.<\/li><\/ul>\r\n\r\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\r\n\r\n<h2>Online Cyber Security Programs in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<p>Distance learning degrees in cyber security can be hard to come by. Thus far, Wisconsinites have just one in-state option: a graduate credential from a private institution, Marquette University.<\/p>\r\n\r\n\r\n\r\n<h3>Online Master\u2019s Degrees in Cyber Security<\/h3>\r\n\r\n\r\n\r\n<p>Marquette\u2019s MS in Computing is a top-25 program, according US News &amp; World Report. Enrollees in the Information Assurance and Cyber Defense specialization need undergraduate coursework or work experience in programming and data structures to be admitted. Other than that, students&nbsp;don\u2019t need a strong computer science background \u2013 they\u2019ll&nbsp;get it in the program alongside an&nbsp;introduction to tactics needed to work as a security specialist. Second-year students&nbsp;conduct&nbsp;a final research project in the discipline or complete&nbsp;extra coursework with an internship.<\/p>\r\n\r\n\r\n\r\n<h2>Cyber Security Scholarships in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<p>We found cyber security scholarships from two junior colleges and one state university. If your chosen school isn\u2019t on this list, check back on its foundation scholarships page throughout the year, as awards are added annually.<\/p>\r\n\r\n\r\n\r\n<h3>Fox Valley Technical College<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/fvtc.academicworks.com\/\" target=\"_blank\">Information Technology Team Scholarship<\/a>: With a year as an IT major under their belt and a 3.25 GPA, Fox Valley students in the Information Systems Security Specialist program can apply for&nbsp;$300.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>Madison Area Technical College<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/madisoncollege.academicworks.com\/opportunities\/12898\" target=\"_blank\">Henry Walski IT Scholarship<\/a>: Second-year IT students with a 3.0 GPA can apply for this award. Those with a solid resume of extracurriculars typically claim it.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/madisoncollege.academicworks.com\/\" target=\"_blank\">IT New Student Scholarship<\/a>: Freshmen enrollees in three IT associate programs, including Network Security Specialist, can get $1,000.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/madisoncollege.academicworks.com\/opportunities\/8405\" target=\"_blank\">IT Program Scholarship<\/a>: Students with one semester of a Madison College Information Technology degree behind them can apply for this $400 to $800 award.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/madisoncollege.academicworks.com\/opportunities\/12423\" target=\"_blank\">IT Student Assistance Scholarship<\/a>: Members of either the WolfPack Techies Group or Madison Information Technology Association can apply for funding toward professional development activities.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/madisoncollege.academicworks.com\/opportunities\/12533\" target=\"_blank\">Mel Seamans Memorial Scholarship<\/a>: Full- and part-timers in the IT department are eligible for $800 in tuition funding.<\/li><\/ul>\r\n\r\n\r\n\r\n<h3>University of Wisconsin-Stout<\/h3>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.uwstout.edu\/about-us\/stout-university-foundation\/foundation-scholarships\/scholarships-listing\" target=\"_blank\">Bruce Family Scholarship<\/a>: Upperclassmen in the Applied Mathematics and Computer Science program, which features a Cyber Security concentration, are eligible for the Bruce Family Scholarship. It goes to students with financial need.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.uwstout.edu\/about-us\/stout-university-foundation\/foundation-scholarships\/scholarships-listing\" target=\"_blank\">Eino Maki Scholarship<\/a>: Any Applied Mathematics and Computer Science student with a 3.0 is eligible for the Eino Maki award.<\/li><li><a rel=\"noreferrer noopener\" href=\"http:\/\/upperclassmen%20in%20the%20applied%20mathematics%20and%20computer%20science%20program%2C\/\" target=\"_blank\">Hill-Johnson-Crislip Family Scholarship<\/a>: Upperclassmen in the Applied Mathematics and Computer Science program are also eligible for this award. It\u2019s given to student leaders with a 3.0 GPA.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.uwstout.edu\/about-us\/stout-university-foundation\/foundation-scholarships\/scholarships-listing\" target=\"_blank\">John Neuenfeldt Scholarship<\/a>: Any Applied Mathematics and Computer Science student with a 3.0 is eligible for the Neuenfeldt prize.<\/li><\/ul>\r\n\r\n\r\n\r\n<h2>Cyber Security Events in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<h3>Cyber Security Meetups &amp; Communities in Wisconsin<\/h3>\r\n\r\n\r\n\r\n<p>Madison, Milwaukee and Green Bay all support chapters of professional associations as well as local Meetups.<\/p>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/920_Sec\/\" target=\"_blank\">920 Sec<\/a>: Monthly meetings of 920 Sec start around 5:30 near Lambeau Field in Green Bay. Sometimes the assembled hackers and InfoSec junkies discuss a predetermined topic and sometimes they just chat about whatever comes up. What they never do is charge dues or push people to present. It\u2019s a pretty chill way to network, and beer is always on tap.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.dc414.org\/\" target=\"_blank\">DC 414<\/a>: Milwaukee\u2019s DEFCON group, DC 414, convenes in a similarly low-key manner every first Friday of the month. Get recaps of this hacking group\u2019s casual conversations on their website; a typical meeting might meander from a discussion of Russian hacking to a demo of a new script. Double-check <a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/dc414group\/\" target=\"_blank\">DC 414\u2019s Meetup page<\/a> to make sure next month\u2019s event is a go. (FYI: The closest thing to DC 414 in Madison is its <a rel=\"noreferrer noopener\" href=\"https:\/\/www.2600.com\/meetings\/\" target=\"_blank\">2600<\/a> group, which meets at the Fair Trade Coffee House the first Friday of the month at 5:00 pm.)<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/Madsec\/\" target=\"_blank\">Madison Information Security Group<\/a>: Apparently, Wisconsinites loathe agendas, because you won\u2019t find them at this group either (although sometimes members present what they\u2019re working on). Just show up to the chosen pub on the appointed evening and network with information security professionals and those who aspire to become one. The group meets monthly.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/milsec\/\" target=\"_blank\">MilSec<\/a>: MilSec is just like the Madison Information Security Group, only in Milwaukee. Its monthly meetings are held the last Thursday of the month. It also folded the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.owasp.org\/index.php\/Milwaukee\" target=\"_blank\">Milwaukee chapter of the Open Web Application Security Project (OWASP)<\/a> into its membership in 2016.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.meetup.com\/MilwaukeeIAM\/\" target=\"_blank\">Milwaukee\/Madison Identity &amp; Access Management User Group<\/a>: The IAM User Group meets quarterly for member presentations and guest speakers, but avoids sales pitches in favor of networking and discussion.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/www.owasp.org\/index.php\/Madison\" target=\"_blank\">OWASP Madison<\/a>: This chapter of the Open Web Application Security Project reactivated in spring 2017 with the intention of convening monthly. Recent member-led presentations have covered buffer overflows and the Zed Attack Proxy (ZAP), a free OWASP security tool.<\/li><\/ul>\r\n\r\n\r\n\r\n<p>Yearn to pay dues, get CPEs, and do some advanced networking? Two organizations can help. The <a href=\"http:\/\/www.isaca-km.org\" target=\"_blank\" rel=\"noreferrer noopener\">Kettle Moraine Chapter of ISACA<\/a> (n\u00e9e Information Systems Audit and Control Association) meets in Milwaukee monthly and livestreams its guest speaker presentations so viewers can watch remotely. And (ISC)2 \u2013 the International Information System Security Certification Consortium \u2013&nbsp;lists chapters in Northeast Wisconsin (Appleton) and Lake Country (Waukesha\/New Berlin), but neither chapter has an up-to-date website. Use the contact information on the <a href=\"https:\/\/www.isc2.org\/Chapters\" target=\"_blank\" rel=\"noreferrer noopener\">ISC(2) chapter page<\/a> to get in touch with local leaders.<\/p>\r\n\r\n\r\n\r\n<h3>Cyber Security Conferences &amp; Workshops in Wisconsin<\/h3>\r\n\r\n\r\n\r\n<p>Wisconsin also promotes&nbsp;a healthy assortment&nbsp;of hacker and InfoSec conferences divided between Milwaukee and Madison.<\/p>\r\n\r\n\r\n\r\n<ul><li><a rel=\"noreferrer noopener\" href=\"https:\/\/cyphercon.com\/\" target=\"_blank\">CypherCon<\/a>: Launched as a two-day hacker conference in 2016, CypherCon has become an annual Milwaukee event. Multiple tracks let attendees choose between speakers presenting on&nbsp;topics as diverse as cryptography and IoT. Attendees can also meander into any of the dozen \u201cvillages\u201d \u2013 areas where they can hone their skills at everything from car hacking to espionage.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/wigcot.eventsair.com\/QuickEventWebsitePortal\/cybersecurity\/2016summit\/Portal\/Closed\" target=\"_blank\">Governor\u2019s Cybersecurity Summit<\/a>: A one-day affair in Madison, the Governor\u2019s Cybersecurity Summit puts private and public sector thinkers in one room so they can understand and respond to threats to Wisconsin\u2019s infrastructure. Speakers include government and business leaders.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/lockdown.it.wisc.edu\/\" target=\"_blank\">Lockdown Technology &amp; Cybersecurity Conference<\/a>: University of Wisconsin-Madison has been hosting this event since 2001. Recent iterations have had multiple tracks so that technically oriented security pros and strategy-minded managers can attend sessions relevant to them. The one-day event is open to everyone, but students get a discount.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/dataconnectors.com\/attend\/\" target=\"_blank\">Milwaukee Tech-Security Conference<\/a>: This annual exposition is a free chance to see what\u2019s new. Stop by and chat with exhibitors about recent software releases in between sponsored presentations.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/events.govtech.com\/Wisconsin-Digital-Government-Summit.html\" target=\"_blank\">Wisconsin Digital Government Summit<\/a>: The Wisconsin Digital Government Summit seeks to unite public sector employees to adopt best practices in cyber security and technology usage. The two-day event includes a mix of networking and breakout sessions.<\/li><\/ul>\r\n\r\n\r\n\r\n<h2>Cyber Security Jobs in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<p>Based on its population, Wisconsin should have about 2.5 times the number of cyber security job openings it currently does, <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noreferrer noopener\">according to Cyber Seek<\/a>. But it\u2019s still got thousands of open positions. To maximize your chances of snagging one,&nbsp;notch a CISSP, CISA or CISM certification \u2013 all of which are in high demand in the state.<\/p>\r\n\r\n\r\n\r\n<p>Which companies are&nbsp;doing good work? According to the Cybersecurity 500, a catalog of hotshot firms, <a href=\"https:\/\/www.pkware.com\" target=\"_blank\" rel=\"noreferrer noopener\">PKWARE<\/a> in Milwaukee is developing&nbsp;new&nbsp;ways to encrypt&nbsp;data. Over in the capital, SimplifIDe is working on replacing passwords with biometric entry on all sorts of devices. Others not on the list but worth considering include <a href=\"http:\/\/redsky-consulting.com\" target=\"_blank\" rel=\"noreferrer noopener\">Red Sky Consulting<\/a>, a Minneapolis IT firm with an office in Green Bay, and <a href=\"https:\/\/www.synercomm.com\" target=\"_blank\" rel=\"noreferrer noopener\">SynerComm<\/a>, a group of professional pen testers and security auditors in suburban Milwaukee.<\/p>\r\n\r\n\r\n\r\n<p>Several big Fortune 500 companies also call the state home, all of whom need cyber security pros regardless of their industry. One of the biggest is automotive parts manufacturer Johnson Controls in Milwaukee. Expect Milwaukee-based Northwestern Mutual Life Insurance Company and Madison\u2019s American Family Insurance Group to have openings at headquarters as well.<\/p>\r\n\r\n\r\n\r\n<h2>Cyber Security Salaries in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<p>Some Wisconsin graduates may opt to move to Chicago or Minneapolis after graduation to take advantage of those cities\u2019&nbsp;high salaries for information security specialists. But <em>you<\/em> don\u2019t have to. The Badger State boasts rising salaries, with 2016\u2019s information security analysts making over 10 percent more than their 2012 versions did. The <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Bureau of Labor Statistics<\/a> and <a rel=\"noreferrer noopener\" href=\"https:\/\/www.indeed.com\/salaries\/Cyber-Security-Salaries,-Wisconsin\" target=\"_blank\">Indeed.com<\/a> both report wages in the $75-80K range for that title. <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-engineer\/career-and-salary\/\">Security engineers<\/a>, meanwhile take in more than $80K annually and IT security specialists command upwards of $100,000.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"school-listings-start\">All Cyber Security Programs in Wisconsin<\/h2>\r\n\r\n\r\n\r\n<p>Below are all the matching programs we found in our directory, from 8 Wisconsin schools.<\/p>\r\n\r\n\r\n\r\n<table class=\"sonic-table\"><thead><tr><th>School Name<\/th><th>Programs<\/th><th>NSA<\/th><\/tr><\/thead><tbody><tr><td>Fox Valley Technical College<\/td><td>Appleton, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.fvtc.edu\/program\/information-technology\/network-computer-support\/10-151-3\/information-systems-security-specialist\">Associate of Applied Science \u2013 Information Systems Security Specialist<\/a><\/td><td><\/td><\/tr><tr><td>Madison Area Technical College<\/td><td>Madison, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/madisoncollege.edu\/program\/network-security-specialist\">Associate in Applied Science \u2013 IT Network Security Specialist<\/a><\/td><td><\/td><\/tr><tr><td>Marquette University<\/td><td>Milwaukee, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.marquette.edu\/mscs\/grad-computing.shtml\">Master of Science in Computing: Information Assurance and Cyber Defense<\/a><\/td><td><\/td><\/tr><tr><td>Milwaukee Area Technical College<\/td><td>Milwaukee, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"http:\/\/www.matc.edu\/business\/degrees\/it-information-systems-security-specialist.cfm\">Associate in Applied Science \u2013 IT Information Systems Security Specialist<\/a><\/td><td><\/td><\/tr><tr><td>Moraine Park Technical College<\/td><td>Fond du Lac, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.morainepark.edu\/programs\/information+technology+-+information+security+certificate\/\">Information Technology \u2013 Information Security Certificate<\/a><\/td><td><\/td><\/tr><tr><td>University of Wisconsin-Parkside<\/td><td>Kenosha, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.uwp.edu\/learn\/programs\/cybersecurity.cfm\">Cyber Security Certificate<\/a><\/td><td><\/td><\/tr><tr><td>University of Wisconsin-Stout<\/td><td>Menomonie, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.uwstout.edu\/cyber-security-concentration\">Bachelor of Science in Applied Mathematics and Computer Science \u2013 Cyber Security Concentration<\/a><\/td><td><\/td><\/tr><tr><td>Waukesha County Technical College<\/td><td>Pewaukee, Wisconsin <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wctc.edu\/academics\/programs-courses\/programs\/it-network-security-specialist\/index.php\">Associate of Applied Science \u2013 IT Network Security Specialist<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wctc.edu\/academics\/programs-courses\/programs\/cybersecurity-specialist\/index.php\">Cyber Security Specialist Certificate<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wctc.edu\/academics\/programs-courses\/programs\/it-security-administrator\/index.php\">Security Administrator Certificate<\/a> <br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wctc.edu\/academics\/programs-courses\/programs\/cybersecurity-specialist\/index.php\">Technical Certificate in Cybersecurity<\/a><\/td><td>NSA<br>CAE<\/td><\/tr><\/tbody><\/table>","protected":false},"excerpt":{"rendered":"Ready to study cybersecurity in Wisconsin? Start with our list of campus and online programs, and learn about cybersecurity jobs and scholarships in WI.","protected":false},"author":5,"featured_media":2101,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[27],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","states-w"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=459"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/459\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2101"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=459"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=459"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=459"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=459"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=459"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}