{"id":5152,"date":"2020-07-10T20:13:15","date_gmt":"2020-07-11T03:13:15","guid":{"rendered":"https:\/\/www.ewu.edu\/cstem\/?page_id=5152"},"modified":"2026-03-26T09:24:46","modified_gmt":"2026-03-26T16:24:46","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":517,"featured_media":12856,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5152","page","type-page","status-publish","has-post-thumbnail","hentry","page_tags-computer-science","page_tags-cybersecurity-center"],"acf":{"background_image_type":"custom","background":{"ID":2271,"id":2271,"title":"computerScience","filename":"computerScience.jpg","filesize":151029,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","link":"https:\/\/www.ewu.edu\/cstem\/csee\/computerscience\/","alt":"Abstract computer code","author":"411","description":"","caption":"","name":"computerscience","status":"inherit","uploaded_to":561,"date":"2025-11-15 23:26:43","modified":"2025-11-15 23:29:43","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1600,"height":900,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-1536x864.jpg","1536x1536-width":1536,"1536x1536-height":864,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","2048x2048-width":1600,"2048x2048-height":900,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"background_vertical_alignment":"center","title":"","bold_title":"Cybersecurity","content":"","component_options_toggle":false,"component_options":{"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},"primary_content_copy":"<h2>Protect the Digital Frontier<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"img-fluid alignright wp-image-12145 \" src=\"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643-300x286.png\" alt=\"seal graphic: centers of academic excellence in cybersecurity - community\" width=\"310\" height=\"296\" srcset=\"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643-300x286.png 300w, https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/02\/CAE-TRANSPARENT-1-e1710865979643.png 355w\" sizes=\"auto, (max-width: 310px) 100vw, 310px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">New cybersecurity threats are emerging every day, and the demand for cybersecurity experts is rising just as fast. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The EWU cybersecurity program will help you develop the skills, real-world experience, and tech know-how to outsmart malicious hackers, protect sensitive data, and make the internet safer.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ll also go beyond the classroom with hands-on training, real-world simulations, and research opportunities that give you the confidence to thrive in a dynamic and fast-growing field.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With a focus on applied learning, cybersecurity students participate in the Cybersecurity Club, compete\u2014and win\u2014in national contests like the NCAE Cyber Games, and land internships and jobs at top companies such as Amazon Web Services.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whether you\u2019re interested in ethical hacking, digital forensics, or encryption, you\u2019ll find the tools, mentorship, and community to succeed. Join a network of innovative students and faculty and graduate ready to defend the digital world. <\/span><\/p>\n<p><a class=\"btn red\" href=\"https:\/\/www.ewu.edu\/apply\/?ref=cybersecurity-home\">Apply<\/a><a class=\"btn btn-secondary\" href=\"https:\/\/www.ewu.edu\/information-request\/?ref=cybersecurity-home\">Request Info<\/a><\/p>\n<p>&nbsp;<\/p>\n","blocks":[{"acf_fc_layout":"destination-eastern","module_background_color":"white","title":"Degrees in Cybersecurity","subtitle":"We offer two bachelor's degrees and one minor, with a focus on collaboration and hands-on learning to help you grow and thrive.","features":[{"icon":"","image":{"ID":12823,"id":12823,"title":"20220927-CatalystEvent-029","filename":"20220927-CatalystEvent-029.jpg","filesize":662129,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/20220927-catalystevent-029\/","alt":"","author":"462","description":"","caption":"","name":"20220927-catalystevent-029","status":"inherit","uploaded_to":5152,"date":"2024-07-26 21:59:01","modified":"2025-04-15 22:33:47","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1200,"height":800,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029-300x200.jpg","medium-width":300,"medium-height":200,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029-768x512.jpg","medium_large-width":768,"medium_large-height":512,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029-1024x683.jpg","large-width":1024,"large-height":683,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029.jpg","1536x1536-width":1200,"1536x1536-height":800,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029.jpg","2048x2048-width":1200,"2048x2048-height":800,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":200,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":267,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/20220927-CatalystEvent-029.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":400}},"feature_title":"Computer Science Cyber Operations <br> Bachelor of Science ","feature_content":"CAE-C Program of Study builds a deep understanding of hands-on computer science, cybersecurity, needed for cyber operations.","link":{"title":"Get the Details","url":"https:\/\/www.ewu.edu\/cstem\/csee\/computer-science-cyber-operations-bs\/","target":""}},{"icon":"","image":{"ID":12856,"id":12856,"title":"Cyber hero","filename":"shutterstock_2324952183.jpg","filesize":267202,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cyber\/shutterstock_2324952183\/","alt":"Person looking at a large screen with code","author":"462","description":"","caption":"","name":"shutterstock_2324952183","status":"inherit","uploaded_to":12744,"date":"2024-08-07 16:42:43","modified":"2024-08-07 16:43:05","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1843,"height":972,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183-300x158.jpg","medium-width":300,"medium-height":158,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183-768x405.jpg","medium_large-width":768,"medium_large-height":405,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183-1024x540.jpg","large-width":1024,"large-height":540,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183-1536x810.jpg","1536x1536-width":1536,"1536x1536-height":810,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183.jpg","2048x2048-width":1843,"2048x2048-height":972,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":158,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":211,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/shutterstock_2324952183.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":316}},"feature_title":"Cyber Operations <br> Bachelor of Science","feature_content":"Explore the full spectrum of cyberspace operations while developing both technical and non-technical skills.","link":{"title":"Get the Details","url":"https:\/\/www.ewu.edu\/cstem\/csee\/cyber-operations-bs\/","target":""}},{"icon":"","image":{"ID":12840,"id":12840,"title":"shutterstock_2102451436","filename":"shutterstock_2102451436.jpg","filesize":182598,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","link":"https:\/\/www.ewu.edu\/cstem\/?attachment_id=12840","alt":"","author":"462","description":"","caption":"","name":"shutterstock_2102451436","status":"inherit","uploaded_to":12837,"date":"2024-07-31 16:52:30","modified":"2024-07-31 16:53:58","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1229,"height":691,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","1536x1536-width":1229,"1536x1536-height":691,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","2048x2048-width":1229,"2048x2048-height":691,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/shutterstock_2102451436.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":337}},"feature_title":"CyberSecurity <br> Master of Science","feature_content":"Level up your cybersecurity skills and learn how to protect critical information from evolving threats.","link":{"title":"Get the Details","url":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/minor\/","target":""}}],"show_details":false,"details_title":"National Certification","copy":"<p>The U.S. Department of Homeland Security and the National Security Agency have designated EWU as a <a href=\"https:\/\/inside.ewu.edu\/news\/eastern-named-national-cyber-defense-center\/\" target=\"_blank\" rel=\"noopener\">National Center of Academic Excellence in Cyber Defense (NCAE-C)<\/a>. Eastern is the only four-year institution in eastern Washington to earn this classification.<\/p>\n","second_column_type":"quote","copy_2":"","quote":"The only four-year institution in eastern Washington to earn a NCAE-C classification.\r\n","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Degrees in Cybersecurity","identifier":"degrees","navigable":true}},{"acf_fc_layout":"copy-with-image","layout":"youtube","show_left":false,"module_background_color":"off-white","title":"Student Story","copy":"<p>\u201cI was part of the team that won the NCAE [Cyber Games] competition, and that was an amazing experience. \u2026 I am more than confident with the skills that I\u2019ve gained. The cybersecurity department here is top of the line. If I had to do it all over again, I would still pick Eastern.\u201d \u2014 Alex Moomaw &#8217;25<\/p>\n<p style=\"text-align: left;\"><a class=\"btn\" href=\"https:\/\/www.youtube.com\/@EWUCybersecurity\">More Student Stories<\/a><\/p>\n","image":false,"youtube_video_id":"KCqGP5WrBzo","video_orientation":"horizontal","image_alt":"","secondary_image":"Geo-texture-Red.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Student Stories","identifier":"stories","navigable":true}},{"acf_fc_layout":"destination-eastern","module_background_color":"white","title":"Why Study Cybersecurity at the Region's Polytechnic?","subtitle":"Get a hands-on education, real-world experience, and personalized support from faculty so you can launch your career with confidence.","features":[{"icon":"grad-cap","image":false,"feature_title":"Career Preparation","feature_content":"Gain valuable insights from faculty, collaborate with peers, and receive expert advice from industry pros. Our <a href=\"http:\/\/ecn.ewu.edu\/\" target=\"_blank\" rel=\"noopener\">Eagle Career Network<\/a> and Career Center advisors can help you stay on track and successfully launch your cybersecurity career.","link":""},{"icon":"hand-heart","image":false,"feature_title":"Personalized Support &amp; Mentorship","feature_content":"At EWU, you won\u2019t be just another face in the classroom. Get mentorship and personalized guidance that fits your learning style so you can master complex concepts, build confidence, and be prepared to tackle real-world cybersecurity challenges.","link":""},{"icon":"trophy","image":false,"feature_title":"National Competitions","feature_content":"Join the <a href=\"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/club\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Club<\/a> and represent EWU in competitions like the National Cyber League and National Security Club Challenge. Level up your skills, get hands-on experience, strengthen your resume, and grow your network in the field of cybersecurity.","link":""}],"show_details":true,"details_title":"National Designations","copy":"<p>2026: The National Security Agency (NSA) has named EWU as a <a href=\"https:\/\/www.ewu.edu\/news\/cybersecurity-program-lands-prestigious-nsa-designation\/\">National Center of Academic Excellence in Cyber Operations (CAE-CO)<\/a>, making Eastern the 22<sup>nd<\/sup>\u00a0university nationwide to attain this prestigious designation and <strong>the only one in the Pacific Northwest<\/strong> to do so.<\/p>\n<p><span style=\"font-weight: 400;\">2021: The National Security Agency designated EWU as a <a href=\"https:\/\/www.ewu.edu\/cstem\/news\/eastern-named-cyber-defense-center\/\">National Center of Academic Excellence in Cyber Defense (NCAE-C)<\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n","second_column_type":"quote","copy_2":"","quote":"EWU is the only four-year institution in the pacific north west to earn the prestigious NCAE-CO classification.","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Why EWU","identifier":"why","navigable":true}},{"acf_fc_layout":"stats","background_color":"red","include_link":false,"include_header":false,"title":"","subtitle":"","statistic":[{"icon":"eagle","title":"EWU Acceptance Rate","link":null,"statistic":"89%"},{"icon":"washington-state","title":"Tuition Per Quarter","link":null,"statistic":"$2,431"},{"icon":"management","title":"Student to Faculty Ratio","link":null,"statistic":"20:1"}],"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},{"acf_fc_layout":"copy-with-image","layout":"small-image","show_left":false,"module_background_color":"white","title":"The EWU Advantage","copy":"<p><span style=\"font-weight: 400;\">At the region\u2019s polytechnic university, you\u2019ll get hands-on experience with hardware and industrial control systems\u2014key parts of today\u2019s cyber landscape. In a connected world, it\u2019s important to understand how both software and hardware can be vulnerable. You\u2019ll learn how to spot and stop threats across digital and physical systems, giving you the skills to protect critical infrastructure and sensitive data.<\/span><\/p>\n","image":{"ID":12805,"id":12805,"title":"STEM-Red-Stills-15_42-(1)","filename":"STEM-Red-Stills-15_42-1.jpg","filesize":688921,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cyber\/stem-red-stills-15_42-1\/","alt":"students working in a group with a lap top","author":"462","description":"","caption":"","name":"stem-red-stills-15_42-1","status":"inherit","uploaded_to":12744,"date":"2024-07-26 21:13:51","modified":"2024-07-26 21:14:13","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":2000,"height":1125,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1-1536x864.jpg","1536x1536-width":1536,"1536x1536-height":864,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1.jpg","2048x2048-width":2000,"2048x2048-height":1125,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/STEM-Red-Stills-15_42-1.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"youtube_video_id":"","video_orientation":"horizontal","image_alt":"","secondary_image":"Geo-texture-blk.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"The EWU Advantage","identifier":"advantage","navigable":false}},{"acf_fc_layout":"destination-eastern","module_background_color":"off-white","title":"Cybersecurity Careers ","subtitle":"With a cybersecurity skillset, you can work in virtually any industry, from finance and healthcare to government and tech.","features":[{"icon":"computer","image":false,"feature_title":"Security Analyst","feature_content":"Monitor networks for security breaches, investigate incidents, and implement security measures.","link":""},{"icon":"website","image":false,"feature_title":"Cloud Security Specialist","feature_content":"Ensure cloud environments\u2014such as Amazon Web Services and Azure\u2014are secure and compliant.","link":""},{"icon":"programming","image":false,"feature_title":"Ethical Hacker","feature_content":"Simulate cyberattacks to identify and fix vulnerabilities before malicious hackers can exploit them.","link":""},{"icon":"magnifying-glass","image":false,"feature_title":"Digital Forensics Analyst","feature_content":"Investigate cybercrimes by retrieving data from computers and digital devices.","link":""},{"icon":"briefcase","image":false,"feature_title":"Security Consultant","feature_content":"Advise organizations on how to protect their systems and comply with regulations.","link":""},{"icon":"warning","image":false,"feature_title":"Malware Analyst","feature_content":"Analyze malicious software to understand how it works and how to defend against it.","link":""}],"show_details":false,"details_title":"Opportunities","copy":"<p>In addition to the students earning a Bachelor of Science in Computer Science with a Cybersecurity minor, there are opportunities to participate in a myriad of cybersecurity events, including membership in the EWU&#8217;s <a href=\"https:\/\/inside.ewu.edu\/cscyber\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Club<\/a>.<\/p>\n","second_column_type":"quote","copy_2":"","quote":"EWU Cyber students are on their way to the 2024 National Cyber League, a collegiate cybersecurity competition. ","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Cybersecurity Careers ","identifier":"careers","navigable":true}},{"acf_fc_layout":"feature-grid","module_background_color":"white","title":"News","subtitle":"","grid_size":"medium","grid_items":false,"display_type":"multisite_tag","tag":"featured","category":"","multisite_tag":"Cybersecurity","num_items":"6","buttons":[{"button_link":{"title":"All Cybersecurity News","url":"https:\/\/www.ewu.edu\/news-search\/?q=cybersecurity","target":""}}],"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"News","identifier":"news","navigable":true}},{"acf_fc_layout":"section-footer","contact":"<p><strong>Contact EWU Cybersecurity\u00a0<\/strong><\/p>\n<p>Dr. Stu Steiner<br \/>\nCenter Point of Contact<br \/>\ne: <a title=\"mailto:cybersecurity@ewu.edu\" href=\"mailto:cybersecurity@ewu.edu\" data-linkindex=\"2\">cybersecurity@ewu.edu<\/a><br \/>\np: <a href=\"tel:509.730.5788\">509.730.5788<\/a><\/p>\n","icons":[{"icon":"youtube","link":{"title":"Youtube","url":"https:\/\/www.youtube.com\/@EWUCybersecurity","target":"_blank"}}],"message":"<p><strong>We prepare students to excel in the dynamic field of cybersecurity, blending essential knowledge with practical, in-demand skills.<\/strong><\/p>\n","association_badges":[{"image":{"ID":13003,"id":13003,"title":"CAE_seal","filename":"CAE_seal-1.png","filesize":221768,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/institute\/cae_seal-2\/","alt":"seal","author":"462","description":"","caption":"","name":"cae_seal-2","status":"inherit","uploaded_to":12983,"date":"2024-08-21 23:14:21","modified":"2024-08-21 23:14:34","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":600,"height":600,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1-300x300.png","medium-width":300,"medium-height":300,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","medium_large-width":600,"medium_large-height":600,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","large-width":600,"large-height":600,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","1536x1536-width":600,"1536x1536-height":600,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","2048x2048-width":600,"2048x2048-height":600,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":300,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","gform-image-choice-md-width":400,"gform-image-choice-md-height":400,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/08\/CAE_seal-1.png","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":600}},"image_alt":"National Center Badge","link":""}],"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"footer","identifier":"contact","navigable":false}},{"acf_fc_layout":"destination-eastern","module_background_color":"white","title":"Our Mission","subtitle":"","features":[{"icon":"global-supply","image":false,"feature_title":"Promote","feature_content":"Promote cybersecurity and cyber awareness curriculum that is based on current industry needs, challenges and situations.","link":""},{"icon":"head-gear","image":false,"feature_title":"Learn","feature_content":"Create opportunities for cybersecurity students to expand their knowledge and collaborate on team-based projects.","link":""},{"icon":"management","image":false,"feature_title":"Network","feature_content":"Connect cybersecurity professionals with students for networking that provides insight into the industry.","link":""}],"show_details":true,"details_title":"Opportunities","copy":"<p>In addition to the students earning a Bachelor of Science in Computer Science with a Cybersecurity minor, there are opportunities to participate in a myriad of cybersecurity events, including membership in the EWU&#8217;s <a href=\"https:\/\/inside.ewu.edu\/cscyber\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Club<\/a>.<\/p>\n","second_column_type":"quote","copy_2":"","quote":"EWU Cyber students are on their way to the 2024 National Cyber League, a collegiate cybersecurity competition. ","component_options_toggle":true,"component_options":{"disable_component":true,"nickname":"Our Mission","identifier":"mission","navigable":true}},{"acf_fc_layout":"accordion-with-notes","module_background_color":"off-white","accordion_position":"bottom","title":"About the Center for Network Computing and Cybersecurity","notes":"<p>The Center for Network Computing and Cybersecurity (CNCC) supports and coordinates research and education in information assurance and cyber defense in support of Eastern Washington University&#8217;s teaching, learning, scholarly, and creative activity goals.<\/p>\n<p>The Center also works to promote all things cybersecurity-related. Our goal is to bring students and businesses together to learn more about cybersecurity, volunteer with the local community, and network with industry professionals.<\/p>\n","include_spacing":true,"expanded":false,"sections":[{"label":"EWU","copy":"<h4>EWU IT Security<\/h4>\n<p>The mission of <a href=\"https:\/\/inside.ewu.edu\/it\/information-security\/\" target=\"_blank\" rel=\"noopener\">EWU&#8217;s Office of Information Security<\/a>\u00a0is to protect EWU&#8217;s computer networks and the information that flows over it.<\/p>\n<p>To fulfill this mission, our office provides a wide variety of services to the EWU community that help minimize the occurrence and risk of security incidents. We work closely with other higher education institutions, outside security organizations and researchers to stay informed.<\/p>\n"},{"label":"Regional","copy":"<h4>Cyberwatch West<\/h4>\n<p><a href=\"https:\/\/cyberwatchwest.org\/\" target=\"_blank\" rel=\"external noopener\">Cyberwatch West<\/a> is a center for cybersecurity education based out of Whatcom Community College in Bellingham, Wash. Spokane Falls Community College is a member school. They have a large resource pool for colleges and high schools.<\/p>\n<h4>Spokane Stem<\/h4>\n<p><a href=\"http:\/\/spokanestem.org\/\" target=\"_blank\" rel=\"external noopener\">The Spokane STEM Network<\/a> fills a niche in our community that no other organization fills by working to transform the way we think, learn, work, and live through STEM by enhancing STEM education opportunities for all youth in the region.<\/p>\n<h4>Cybersecurity Guide &#8211; Washington State<\/h4>\n<p><a href=\"https:\/\/cybersecurityguide.org\/states\/washington\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Guide<\/a> is focused on providing information for students seeking a career in cybersecurity.<\/p>\n"},{"label":"National","copy":"<h4>The National Cybersecurity and Communications Integration Center<\/h4>\n<p>The mission of <a href=\"https:\/\/www.us-cert.gov\/\" target=\"_blank\" rel=\"external noopener\">The National Cybersecurity and Communications Integration Center<\/a> is to reduce the risk of systemic cybersecurity and communications challenges in their role as the nation\u2019s flagship cyber defense, incident response and operational integration center.<\/p>\n<h4>Women in Cybersecurity WiCys<\/h4>\n<p><a href=\"https:\/\/www.wicys.org\/\" target=\"_blank\" rel=\"noopener\">WiCyS<\/a> is a global community of women and men, we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity.<\/p>\n<h4>National Cyberwatch<\/h4>\n<p><a href=\"https:\/\/www.nationalcyberwatch.org\/\" target=\"_blank\" rel=\"external noopener\">National Cyberwatch Center<\/a> consists of a group of higher education institutions, businesses, and government agencies focused on collaborative efforts to advance information security education and strengthen the national cybersecurity workforce.<\/p>\n<h4>IT Career Finder<\/h4>\n<p><a href=\"https:\/\/www.itcareerfinder.com\/it-careers.html\" target=\"_blank\" rel=\"external noopener\">IT Career Finder<\/a> helps individuals interested in\u00a0information technology\u00a0identify potential careers in the field.<\/p>\n<p><a href=\"https:\/\/www.sjvc.edu\/guides\/information-technology-career-guide\/\" target=\"_blank\" rel=\"noopener\">Information Technology Career Guide<\/a> covers in-depth information regarding information technology career paths, traits and skills for I.T. workers, as well as education and certification requirements for these positions.<\/p>\n<h4>Cybersecurity Guide<\/h4>\n<p><a href=\"https:\/\/cybersecurityguide.org\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Guide<\/a> is focused on providing information for students seeking a career in cybersecurity.<\/p>\n<h4 class=\"meta__heading\">Cyber Crime Investigation<\/h4>\n<p>Criminal activity taking place in the digital world, known as cyber crime, comes in various forms. Like in the physical world, cyber crime is investigated by trained professionals who gather and secure evidence to confront cyber criminal activity and prosecute crimes. This type of investigation is known as a cyber crime investigation. The information from Marysville University can be found <a href=\"https:\/\/online.maryville.edu\/blog\/cyber-crime-investigation\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<h4 class=\"meta__heading\">Cybersecurity National Jobs<\/h4>\n<p>Open national cybersecurity jobs can be found <a href=\"http:\/\/CyberSecurityJobs.com\">here<\/a>.<\/p>\n"},{"label":"National Competitions","copy":"<h4>DOE CyberForce Competition<\/h4>\n<p>The <a href=\"https:\/\/cyberforcecompetition.com\/\" target=\"_blank\" rel=\"noopener\">DOE CyberForce competition<\/a> encourages unique defense strategies and techniques in safeguarding cyber assets.<\/p>\n<h4>National Cyber League<\/h4>\n<p class=\"\"><a href=\"https:\/\/nationalcyberleague.org\/\" target=\"_blank\" rel=\"noopener\">The National Cyber League (NCL)<\/a> is the most inclusive, performance-based, learning-centered collegiate cybersecurity competition today!<\/p>\n<p class=\"\">The NCL, powered by Cyber Skyline, enables students to prepare and test themselves against practical cybersecurity challenges that they will likely face in the workforce, such as identifying hackers from forensic data, pen-testing and auditing vulnerable websites, recovering from ransomware attacks and much more!<\/p>\n<p>&nbsp;<\/p>\n"},{"label":"Advisory Board","copy":"<p>The external board of advisors contains local and national industry professionals and faculty from other institutions, to provide programmatic guidance over the activities of the center and the program as a whole. This board provides a connection between the program, Center for Network Computing and Cybersecurity, College of Science Technology Engineering and Mathematics, the Computer Science Department, and the local community.<\/p>\n<h3>Board Leadership<\/h3>\n<ul>\n<li>Rebecca Long, Future Ada &amp; Engie Impact \u2014 <em>Board Chair<\/em><\/li>\n<li>Joe Dumoulin, Aon \u2014 <em>Board Vice Chair<\/em><\/li>\n<li>Brian Schmidt, Engie Impact \u2014 <em>Board Secretary<\/em><\/li>\n<\/ul>\n"},{"label":"Remaining Board Membership Industrial Partnerships","copy":"<p><em>Individual names have been removed for privacy.<\/em><\/p>\n<ul>\n<li>Internet Archives<\/li>\n<li>LabCorp<\/li>\n<li>F5 Networks<\/li>\n<li>RiskLens<\/li>\n<li>Surge<\/li>\n<li>Identity Mind<\/li>\n<li>Fast Enterprises<\/li>\n<li>Itron<\/li>\n<li>Commerce Architects<\/li>\n<li>Maplewood Software<\/li>\n<li>Intrinium<\/li>\n<li>Intellitect<\/li>\n<li>Schweitzer Engineering<\/li>\n<li>Inland Northwest Health Services<\/li>\n<\/ul>\n"}],"component_options_toggle":true,"component_options":{"disable_component":true,"nickname":"Resources","identifier":"resources","navigable":true}},{"acf_fc_layout":"two-column-explicit","module_background_color":"off-white","include_header":true,"include_images":false,"intro_title":"Student Voices","intro_title_style":"h2","sub_heading":"Cybersecurity students talk about their EWU journey, what they've learned, and why the program stands out.","intro_title_position":"","include_intro_copy":false,"intro_copy":"","columns":[{"image":false,"title":"","heading_tag":"h3","show-hr":true,"copy":"    <div style=\"margin-top: 30px; margin-bottom: 30px;\">\n        <lite-youtube\n    style=\"position: relative; padding-bottom: 177.78%; height: 0; overflow: hidden; max-width: 100%;\"\n    videoid=\"JqYf1Z1-KfA\" playlabel=\"Play video\"><\/lite-youtube>\n    <\/div>\n    \n"},{"image":false,"title":"","heading_tag":"h3","show-hr":true,"copy":"    <div style=\"margin-top: 30px; margin-bottom: 30px;\">\n        <lite-youtube\n    style=\"position: relative; padding-bottom: 177.78%; height: 0; overflow: hidden; max-width: 100%;\"\n    videoid=\"sek2CAdbWL4\" playlabel=\"Play video\"><\/lite-youtube>\n    <\/div>\n    \n"},{"image":false,"title":"","heading_tag":"h3","show-hr":true,"copy":"    <div style=\"margin-top: 30px; margin-bottom: 30px;\">\n        <lite-youtube\n    style=\"position: relative; padding-bottom: 177.78%; height: 0; overflow: hidden; max-width: 100%;\"\n    videoid=\"S2jFkko11EA\" playlabel=\"Play video\"><\/lite-youtube>\n    <\/div>\n    \n"}],"component_options_toggle":true,"component_options":{"disable_component":true,"nickname":"Student Voices","identifier":"voices","navigable":false}}],"page_hide_sidebar":false,"secondary_nav_menu_type":"menu","secondary_nav_menu":"cybersecurity","page_enable_page_nav":true,"text_style":"allcaps","readability_aid":"overlay","page_override_title":"","intro_title":"","page_persona_bar_default_tab":""},"_links":{"self":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/users\/517"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/comments?post=5152"}],"version-history":[{"count":173,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152\/revisions"}],"predecessor-version":[{"id":88114,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152\/revisions\/88114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media\/12856"}],"wp:attachment":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media?parent=5152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}