{"id":5,"date":"2022-02-03T17:19:22","date_gmt":"2022-02-03T17:19:22","guid":{"rendered":"https:\/\/www.eou.edu\/cybersecurity\/?page_id=5"},"modified":"2025-09-26T20:00:05","modified_gmt":"2025-09-26T20:00:05","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.eou.edu\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<div class=\"wp-block-cover is-light\" style=\"min-height:350px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-40 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"520\" class=\"wp-block-cover__image-background wp-image-10\" alt=\"\" src=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_hero.jpg\" style=\"object-position:42% 52%\" data-object-fit=\"cover\" data-object-position=\"42% 52%\" srcset=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_hero.jpg 1600w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_hero-800x260.jpg 800w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_hero-1024x333.jpg 1024w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_hero-768x250.jpg 768w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_hero-1536x499.jpg 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h1 class=\"wp-block-heading has-text-align-center has-white-color has-text-color has-link-color wp-elements-e8f259dcb2b629ba3b3943e41bf65028\">Cybersecurity<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Prepare for IT Security Careers With Specialized Knowledge<\/h2>\n\n\n\n<p>Protect data and networks with EOU\u2019s <strong>Bachelor&#8217;s<\/strong> in Cybersecurity degree, an <strong>NSA CAE-CD-accredited program in Cyber Defense<\/strong>. In this practical, hands-on program, you\u2019ll gain foundational technical cybersecurity skills necessary for success in both Windows and Linux environments.<\/p>\n\n\n\n<p>Under the direction of expert faculty currently working in the field to combat cyber threats, you\u2019ll study operational cybersecurity, offensive security, defensive security, application security, and incident response.<\/p>\n\n\n\n<p>The cybersecurity degree at EOU provides a core of computer science knowledge in data structures, C++ programming, networking, and architecture, preparing you to become a well-prepared IT professional with specialized skills for preventing threats in various security roles.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">What You\u2019ll Learn<\/h2>\n\n\n\n<p>Gain a practical education in cybersecurity that\u2019s aligned with industry certifications and standards. You\u2019ll gain experience through labs, hands-on assignments, and coursework that focuses on operational aspects.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Program Outcomes<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understand the different areas of specialization in information security, such as forensics, incident response, application security, and more!<\/li>\n\n\n\n<li>Explain the foundational concepts of information security, such as authorization, accessibility, privacy, data security, and least privilege.<\/li>\n\n\n\n<li>Demonstrate the core technical skills used across the field, such as proficiency in scripting, system administration, vulnerability analysis, and networking.<\/li>\n\n\n\n<li>Organize and communicate deliverables from information security projects and activities to both technical and non-technical audiences.<\/li>\n\n\n\n<li>Explain and demonstrate entry-level proficiency in defensive areas such as secure architecture, incident response, and forensics.<\/li>\n\n\n\n<li>Define and demonstrate proficiency in offensive areas, including application and network security assessments, attacker tactics and techniques, and the mitigating actions to take.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Advisory Board<\/h3>\n\n\n\n<p>The mission of the Advisory Board is to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assist EOU in developing cutting-edge academic programs in the field of cybersecurity for our students. <\/li>\n\n\n\n<li>Serve as a reliable industry resource for innovative cybersecurity solutions.<\/li>\n\n\n\n<li>Foster the development of the next generation of future leaders in cybersecurity. <\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Members<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Chiradeep Chhaya<\/strong>, Executive Director, JPMorgan Chase &amp; Co.<\/li>\n\n\n\n<li><strong>Jean-Michel Amblat<\/strong>, Executive Director, Jane Street<\/li>\n\n\n\n<li><strong>Jared Schaefer<\/strong>, Senior Incident Response Analyst, Anduril Industries<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-white-color has-eastern-navy-background-color has-text-color has-background no-border-radius wp-element-button\" href=\"http:\/\/catalog.eou.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\">EOU Academic Catalog<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-white-color has-eastern-red-background-color has-text-color has-background no-border-radius wp-element-button\" href=\"https:\/\/www.eou.edu\/admissions\/apply\/\" target=\"_blank\" rel=\"noreferrer noopener\">Apply to EOU<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-eastern-navy-color has-eastern-gold-background-color has-text-color has-background no-border-radius wp-element-button\" href=\"https:\/\/slate.eou.edu\/register\/request-information\" target=\"_blank\" rel=\"noreferrer noopener\">Request Info<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-white-color has-eastern-navy-background-color has-text-color has-background no-border-radius wp-element-button\" href=\"https:\/\/online.eou.edu\/programs\/bachelors-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Online Program<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-block\"><a class=\"wp-block-button__link has-white-color has-eastern-navy-background-color has-text-color has-background no-border-radius wp-element-button\" href=\"https:\/\/www.eou.edu\/computer-science\/faculty\/\">Faculty<\/a><\/div>\n<\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dr. Brian Scavotto &#8211; <a href=\"mailto:bscavotto@eou.edu\">bscavotto@eou.edu<\/a><br>Senior Instructor<\/li>\n\n\n\n<li>Khaled Sabha &#8211; <a href=\"mailto:ksabha@eou.edu\">ksabha@eou.edu<\/a><br>Adjunct Instructor<\/li>\n\n\n\n<li>Josh Moulin &#8211; <a href=\"mailto:moulinj@eou.edu\">moulinj@eou.edu<\/a><br>Adjunct Instructor<br><br><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column well is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Practical Curriculum<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity blue\" \/>\n\n\n\n<p>Cybersecurity courses in this program focus more on scripting and variable solutions versus algorithm development, so you\u2019re ready to solve the daily challenges you\u2019ll encounter in a security role. This also means there\u2019s minimal math coursework required.<\/p>\n\n\n\n<p><strong>Course topics include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber Threat Analysis<\/li>\n\n\n\n<li>Malware Analysis<\/li>\n\n\n\n<li>Cyber Incident Response<\/li>\n\n\n\n<li>Computer Forensics<\/li>\n\n\n\n<li>Penetration Testing &amp; Red Teaming<\/li>\n\n\n\n<li>Network Defense<\/li>\n\n\n\n<li>Identity &amp; Access Management<\/li>\n\n\n\n<li>Cybersecurity Program Management<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column well is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Career Outlook<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity blue\" \/>\n\n\n\n<p>As companies focus on including more roles dedicated to cybersecurity in a proactive approach in strategy, skills like threat intelligence, risk management, data privacy, and more are skyrocketing in demand, anywhere from 32%-164%. Cyber professionals sometimes find that they can earn salary premiums of $5,256 to $15,025 over their traditional IT counterparts.<\/p>\n\n\n\n<p><strong>Potential cybersecurity careers:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Security Analyst<\/li>\n\n\n\n<li>Computer Network Architect<\/li>\n\n\n\n<li>Network Administrator<\/li>\n\n\n\n<li>Computer Systems Administrator<\/li>\n\n\n\n<li>Computer Systems Analyst<\/li>\n\n\n\n<li>Cyber Info Assurance Analyst<\/li>\n\n\n\n<li>Security Engineer<\/li>\n\n\n\n<li>Security Manager, IT<\/li>\n\n\n\n<li>Incident Manager<\/li>\n\n\n\n<li>Information Security Specialist<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column well is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">How To Get Started<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity blue\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">Contact Us!<\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1020\" src=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/Genesis.jpg\" alt=\"Genesis Medeards\" class=\"wp-image-12\" srcset=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/Genesis.jpg 1024w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/Genesis-800x797.jpg 800w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/Genesis-768x765.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong><strong>EOU Admissions Office<\/strong><\/strong><br><strong>Email:<\/strong>  <a rel=\"noreferrer noopener\" href=\"mailto:admissions@eou.edu\" target=\"_blank\"><\/a><a href=\"mailto:admissions@eou.edu\">admissions@eou.edu<\/a><br><strong>Phone:<\/strong> <a href=\"tel:8004528639\">800-452-8639<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"401\" src=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/DSC_4418.jpg\" alt=\"\" class=\"wp-image-8\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_image.jpg\" alt=\"\" class=\"wp-image-11\" srcset=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_image.jpg 800w, https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/eou_cybersecurity_image-768x513.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2022\/02\/DSC_3861.jpg\" alt=\"\" class=\"wp-image-7\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Gain Practical Experience!<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Learn from Cybersecurity Experts<\/h3>\n\n\n\n<p>Faculty for the bachelor\u2019s in cybersecurity program will guide you through the curriculum to connect their real-world experience to case studies, coursework, and the challenges you may be seeing right now at work. Our small class sizes, combined with our dedicated faculty, provide you with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Personalized attention<\/li>\n\n\n\n<li>Mentorship opportunities<\/li>\n\n\n\n<li>Networking possibilities<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">National Security Agency (NSA) Center for Academic Excellence (CAE)<\/h2>\n\n\n\n<p>EOU is an NSA Center for Academic Excellence in Cyber Defense, a designation awarded by the National Security Agency to institutions that meet rigorous standards in cybersecurity education. This recognition signals to students, employers, and partners that our program is aligned with national priorities and prepares graduates with the knowledge and skills needed to defend against real-world cyber threats.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"438\" height=\"438\" src=\"https:\/\/www.eou.edu\/cybersecurity\/files\/2025\/06\/NCAE-C_Seal-1.png\" alt=\"\" class=\"wp-image-46\" style=\"width:174px;height:auto\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>EOU Center Point of Contact:<\/strong><br>Dr. Brian Scavotto<br><a href=\"mailto:bscavotto@eou.edu\">bscavotto@eou.edu<\/a><\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column well is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Cybersecurity News<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity blue\" \/>\n\n\n\n<p>For EOU-specific cybersecurity news, please ensure you are part of our tech students email distribution list. To be added to this email list, please send a request to bscavotto@eou.edu.<\/p>\n\n\n\n<p>For general cybersecurity industry news, please visit these links:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/\">Bleeping Computer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/thehackernews.com\/\">The Hacker News<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.securityweek.com\/\">Security Week<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cyberscoop.com\/\">Cyber Scoop<\/a><\/li>\n<\/ul>\n\n\n\n<p>For excellent cybersecurity podcasts, consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/darknetdiaries.com\/\">Darknet Diaries<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.scworld.com\/security-weekly\">Security Weekly<\/a><\/li>\n<\/ul>\n\n\n\n<p>For trusted industry expert reporting, consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon Data Breach Investigations Report<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.crowdstrike.com\/en-us\/global-threat-report\/\">Crowdstrike Global Threat Report<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column well is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Get Involved!<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity blue\" \/>\n\n\n\n<p><strong>Bits &amp; PCs Computer Science Club<\/strong><\/p>\n\n\n\n<p>This club provides students interested in computer science (CS), cybersecurity, or technology with an opportunity to meet with other students, work on group projects, and gain insight into careers in tech.<\/p>\n\n\n\n<p>Contact&nbsp;<a href=\"mailto:bitsandpcs-group@eou.edu\">bitsandpcs-group@eou.edu<\/a>&nbsp;to learn more and get involved.<\/p>\n\n\n\n<p><strong>National Cyber League<\/strong><\/p>\n\n\n\n<p>The National Cyber League (NCL) is a biannual, nationwide cybersecurity competition that provides a valuable, hands-on learning experience for high school and college students. It&#8217;s a dynamic, &#8220;capture the flag&#8221; style tournament where participants test their skills against real-world cybersecurity challenges in a safe and legal environment.<\/p>\n\n\n\n<p>How Students Benefit:<\/p>\n\n\n\n<p>Participating in the NCL offers students a significant edge as they prepare for careers in the rapidly growing field of cybersecurity. Key benefits include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Practical Skill Development:<\/strong> Students move beyond theory to apply their knowledge in critical areas such as open-source intelligence, network traffic analysis, log analysis, cryptography, password cracking, and web application security.<\/li>\n\n\n\n<li><strong>Performance-Based Scouting Reports:<\/strong> After each season, students receive detailed &#8220;Scouting Reports&#8221; that highlight their strengths and areas for improvement. These reports serve as tangible evidence of their skills, which can be shared with potential employers.<\/li>\n\n\n\n<li><strong>Career Preparation:<\/strong> The challenges within the NCL are designed to mirror the tasks and scenarios that cybersecurity professionals encounter daily. This prepares students for the demands of the workforce and helps them identify specific career paths within the industry.<\/li>\n\n\n\n<li><strong>National Recognition:<\/strong> Students have the opportunity to represent their university and compete against peers from across the country, with top performers recognized in national power rankings.<\/li>\n<\/ul>\n\n\n\n<p><strong>How It Works:<\/strong><\/p>\n\n\n\n<p>The NCL season is structured to accommodate students at all skill levels, from beginners to advanced practitioners. The competition unfolds in several stages:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Gymnasium:<\/strong> A non-competitive preparatory phase where students can practice and familiarize themselves with the competition format and the types of challenges they will face.<\/li>\n\n\n\n<li><strong>Preseason:<\/strong> An unranked game that allows participants to further hone their skills before the official competition begins.<\/li>\n\n\n\n<li><strong>Individual Game:<\/strong> Students compete on their own, tackling a variety of challenges to earn points and a national ranking.<\/li>\n\n\n\n<li><strong>Team Game:<\/strong> Following the individual competition, students can form or join teams to collaborate on more complex challenges, fostering teamwork and communication skills.<\/li>\n<\/ul>\n\n\n\n<p>The entire competition is conducted online, making it accessible to students nationwide. Through its engaging and challenging format, the National Cyber League provides an unparalleled opportunity for students to learn, grow, and launch their careers in cybersecurity.<\/p>\n\n\n\n<p>For more information, please contact Dr. Brian Scavotto. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column well is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">EOU Resources<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity blue\" \/>\n\n\n\n<h4 class=\"wp-block-heading\">EOU Information Technology Department Knowledge Base<\/h4>\n\n\n\n<p><a href=\"https:\/\/eou.my.site.com\/s\/kb\">https:\/\/eou.my.site.com\/s\/kb<\/a><\/p>\n\n\n\n<p>This provides students with an overview of EOU&#8217;s IT services, including securely connecting to the network, and answers to major questions students have regarding on-campus and remote technologies. <\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prepare for IT Security Careers With Specialized Knowledge Protect data and networks with EOU\u2019s Bachelor&#8217;s in Cybersecurity degree, an NSA CAE-CD-accredited program in Cyber Defense. In this practical, hands-on program, you\u2019ll gain foundational technical cybersecurity skills necessary for success in both Windows and Linux environments. Under the direction of expert faculty currently working in the [&hellip;]<\/p>\n","protected":false},"author":491,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"panels_page.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/491"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":28,"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":70,"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/5\/revisions\/70"}],"wp:attachment":[{"href":"https:\/\/www.eou.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}