{"id":5660,"date":"2020-10-13T12:57:00","date_gmt":"2020-10-13T19:57:00","guid":{"rendered":"https:\/\/www.ewu.edu\/cstem\/?page_id=5660"},"modified":"2024-06-05T09:05:13","modified_gmt":"2024-06-05T16:05:13","slug":"minor","status":"publish","type":"page","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/minor\/","title":{"rendered":"Cybersecurity (Minor)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":411,"featured_media":0,"parent":5152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5660","page","type-page","status-publish","hentry","page_tags-degree"],"acf":{"background_image_type":"custom","background":{"ID":2271,"id":2271,"title":"computerScience","filename":"computerScience.jpg","filesize":151029,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","link":"https:\/\/www.ewu.edu\/cstem\/csee\/computerscience\/","alt":"Abstract computer code","author":"411","description":"","caption":"","name":"computerscience","status":"inherit","uploaded_to":561,"date":"2025-11-15 23:26:43","modified":"2025-11-15 23:29:43","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1600,"height":900,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience-1536x864.jpg","1536x1536-width":1536,"1536x1536-height":864,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","2048x2048-width":1600,"2048x2048-height":900,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2019\/06\/computerScience.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"background_vertical_alignment":"center","title":"Minor in","bold_title":"Cybersecurity","content":"","component_options_toggle":false,"component_options":{"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},"primary_content_copy":"<h2>About<\/h2>\n<p>The cybersecurity minor provides the skills necessary to meet the increasing demand for cybersecurity professionals. The concepts you will learn range from computer security, software security, penetration testing, understanding malware\/ransomware, and much more.<\/p>\n<p><a class=\"btn btn-primary\" href=\"#curriculum\">Curriculum &amp; Requirements<\/a><\/p>\n","blocks":[{"acf_fc_layout":"catalog-degree","module_background_color":"white","degree_url":"https:\/\/catalog.ewu.edu\/stem\/cs-ee\/cyber-security-minor\/","show_curriculum_and_requirements":true,"replace_curriculum_and_requirements_text":false,"curriculum_and_requirements_replacement_text":"","show_general_education":false,"show_plan_of_study":true,"show_student_learning_outcomes":false,"additional_sections":false,"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Curriculum & Requirements","identifier":"curriculum","navigable":false}}],"secondary_nav_menu_type":"parent","page_hide_sidebar":false,"page_enable_page_nav":false,"text_style":"regular","readability_aid":"overlay"},"_links":{"self":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/users\/411"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/comments?post=5660"}],"version-history":[{"count":7,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5660\/revisions"}],"predecessor-version":[{"id":12314,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5660\/revisions\/12314"}],"up":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152"}],"wp:attachment":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media?parent=5660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}