{"id":13206,"date":"2024-10-28T16:28:39","date_gmt":"2024-10-28T23:28:39","guid":{"rendered":"https:\/\/www.ewu.edu\/cstem\/?page_id=13206"},"modified":"2025-04-15T12:00:48","modified_gmt":"2025-04-15T19:00:48","slug":"cyber-defense-ms","status":"publish","type":"page","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/cyber-defense-ms\/","title":{"rendered":"Cyber Defense (MS)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":462,"featured_media":12840,"parent":5152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13206","page","type-page","status-publish","has-post-thumbnail","hentry","page_tags-degree"],"acf":{"background_image_type":"custom","background":{"ID":12840,"id":12840,"title":"shutterstock_2102451436","filename":"shutterstock_2102451436.jpg","filesize":182598,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","link":"https:\/\/www.ewu.edu\/cstem\/?attachment_id=12840","alt":"","author":"462","description":"","caption":"","name":"shutterstock_2102451436","status":"inherit","uploaded_to":12837,"date":"2024-07-31 16:52:30","modified":"2024-07-31 16:53:58","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1229,"height":691,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","1536x1536-width":1229,"1536x1536-height":691,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","2048x2048-width":1229,"2048x2048-height":691,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":337}},"background_vertical_alignment":"top","text_style":"allcaps","readability_aid":"overlay","title":"Master of Science","bold_title":"Cyber Defense","content":"","component_options_toggle":false,"component_options":{"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},"primary_content_copy":"<h2>About<\/h2>\n<p>The Master of Science in Cyber Defense prepares you to expand your cybersecurity hygiene and toolkit to better protect organization&#8217;s invaluable data.<\/p>\n<p>You will gain the expertise to identify and mitigate risk and vulnerabilities within an organization\u2019s computer systems. EWU&#8217;s hands-on real-world curriculum provides is aligned to the NSA Center of Academic Excellence guidelines and the NICE Framework. These guidelines and frameworks allow you to gain a deep knowledge concerning software and hardware security, a deep understanding of computer systems and network security, forensics and incident response, and cyber physical systems.<br \/>\nMany different organizations across a variety of sectors, including federal and local government agencies, tech companies, and many other organizations need to hire cybersecurity professionals.<\/p>\n<p>Earn your M.S. in Cyber Defense to progress in your career and make an impact.<\/p>\n","blocks":[{"acf_fc_layout":"catalog-degree","module_background_color":"white","degree_url":"https:\/\/catalog.ewu.edu\/stem\/cs-ee\/cyber-defense-ms\/","show_curriculum_and_requirements":true,"replace_curriculum_and_requirements_text":false,"curriculum_and_requirements_replacement_text":"","show_general_education":true,"show_plan_of_study":true,"show_student_learning_outcomes":true,"additional_sections":false,"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}}],"secondary_nav_menu_type":"parent","page_override_title":"","page_hide_sidebar":false,"page_enable_page_nav":false},"_links":{"self":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/13206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/users\/462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/comments?post=13206"}],"version-history":[{"count":4,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/13206\/revisions"}],"predecessor-version":[{"id":86336,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/13206\/revisions\/86336"}],"up":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media\/12840"}],"wp:attachment":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media?parent=13206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}