{"id":3981,"date":"2020-01-14T12:21:59","date_gmt":"2020-01-14T17:21:59","guid":{"rendered":"https:\/\/missional.university\/programs\/?page_id=3981"},"modified":"2020-03-04T21:52:27","modified_gmt":"2020-03-05T02:52:27","slug":"undergraduate-certificate-in-cybersecurity-in-faith-based-organizations","status":"publish","type":"page","link":"https:\/\/missional.university\/programs\/undergraduate-certificate-in-cybersecurity-in-faith-based-organizations\/","title":{"rendered":"Undergraduate Certificate in Cybersecurity in Faith-Based Organizations"},"content":{"rendered":"<div id=\"pl-3981\"  class=\"panel-layout\" ><div id=\"pg-3981-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-0-0-0\" class=\"so-panel widget widget_ink-image panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-ink-image so-widget-ink-image-image-04583d51073d-3981\"\n\t\t\t\n\t\t><div class=\"iw-so-image-wrapper\">\n        <div class=\"iw-so-image\">\n\n        <div class=\"iw-so-image-container\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1230\" height=\"536\" src=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/SCE-UC-CyberscecurityFaithBasedOrg-fpk-5325103.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/SCE-UC-CyberscecurityFaithBasedOrg-fpk-5325103.jpg 1230w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/SCE-UC-CyberscecurityFaithBasedOrg-fpk-5325103-300x131.jpg 300w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/SCE-UC-CyberscecurityFaithBasedOrg-fpk-5325103-768x335.jpg 768w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/SCE-UC-CyberscecurityFaithBasedOrg-fpk-5325103-360x157.jpg 360w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/SCE-UC-CyberscecurityFaithBasedOrg-fpk-5325103-20x9.jpg 20w\" sizes=\"auto, (max-width: 1230px) 100vw, 1230px\" \/>        <\/div>\n\n        <div class=\"iw-so-caption-wrapper\">\n            <div class=\"iw-so-image-caption\">\n                <figcaption>\n                                                        <\/figcaption>\n            <\/div>\n        <\/div>\n\n        \n    <\/div>\n    <\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-3981-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 align=\"center\"><font color=\"#a65805\">Online Undergraduate Certificate in<br \/>\nCybersecurity in Faith-Based Organizations<br \/>\n<\/font><\/h1>\n<p align=\"center\">\u269c\u00a0 \u00a0<b>Rarely Offered in Christian Universities, Bible Colleges or Seminaries<\/b><\/p>\n<p align=\"center\"><i><b>Expand Your Missional Service Today!<\/b><\/i><\/p>\n<h1><\/h1>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div class=\"panel-widget-style panel-widget-style-for-3981-1-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\">REQUEST INFORMATION<\/h3>\n<h5 align=\"center\">Ready to learn more about the<\/h5>\n<h4 align=\"center\">Undergraduate Certificate in<br \/>\nCybersecurity in Faith-Based Organizations?<\/h4>\n<h4 align=\"center\"><a href=\"https:\/\/admissions.missional.university\/request-information\/\"><font color=\"#1d552e\"><b><font color=\"#a65805\">LEARN MORE NOW<\/font><\/b><\/font><\/a><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-3981-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Advanced digital technology has produced security issues that can't be neglected. All companies, organizations and ministries must shield their information from digital assaults. The Undergraduate Certificate in Cybersecurity in Faith-Based Organizations equips students to develop cybersecurity frameworks, instate digital crisis methods and stay current on cybersecurity policies and strategies.<\/p>\n<\/div>\n<\/div><\/div><div id=\"panel-3981-2-0-1\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>As more and more knowledge capital is stored on and transferred through the Internet, the security of this wealth of information is paramount. MU provides competent professionals that can ensure the highest measures of cybersecurity to their organizations. Graduates learn how to protect and serve their organizations as they support the mission of God in the world.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-3981-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-3981-3\" ><div id=\"pgc-3981-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"5\" ><div class=\"panel-widget-style panel-widget-style-for-3981-3-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>Program Features<\/h3>\n<ul>\n<li>\n<h5>Integrated practicums allow you to gain valuable real-world experience<\/h5>\n<\/li>\n<li>\n<h5>Learn from academic practitioners from around the world<\/h5>\n<\/li>\n<li>\n<h5>Credits earned in this certificate program can apply to a Missional University Bachelor degree program<\/h5>\n<\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3981-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-3-1-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 11px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-3-1-1\" class=\"so-panel widget widget_cl-counter widget-cl-counter panel-last-child\" data-index=\"7\" ><div class=\"panel-widget-style panel-widget-style-for-3981-3-1-1\" ><h3 class=\"widget-title\">Course Effort<\/h3><div class=\"cl-counter\" data-duration=\"3000\"><div class=\"cl-counter-value\" style=\"color:#000000;font-size:50px;\"><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><span class=\"cl-counter-value-part type_number\" data-final=\"17\">0<\/span><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><\/div><div class=\"cl-counter-title\" style=\"color:#000000;font-size:20px;\">hours per week<\/div><\/div><\/div><\/div><\/div><div id=\"pgc-3981-3-2\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-3-2-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"8\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 11px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-3-2-1\" class=\"so-panel widget widget_cl-counter widget-cl-counter panel-last-child\" data-index=\"9\" ><div class=\"panel-widget-style panel-widget-style-for-3981-3-2-1\" ><h3 class=\"widget-title\">Course Length<\/h3><div class=\"cl-counter\" data-duration=\"3000\"><div class=\"cl-counter-value\" style=\"color:#000000;font-size:50px;\"><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><span class=\"cl-counter-value-part type_number\" data-final=\"8\">0<\/span><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><\/div><div class=\"cl-counter-title\" style=\"color:#000000;font-size:20px;\">Week Terms<\/div><\/div><\/div><\/div><\/div><div id=\"pgc-3981-3-3\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-3-3-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 11px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-3-3-1\" class=\"so-panel widget widget_cl-counter widget-cl-counter panel-last-child\" data-index=\"11\" ><div class=\"panel-widget-style panel-widget-style-for-3981-3-3-1\" ><h3 class=\"widget-title\">Credits Required<\/h3><div class=\"cl-counter\" data-duration=\"3000\"><div class=\"cl-counter-value\" style=\"color:#000000;font-size:50px;\"><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><span class=\"cl-counter-value-part type_number\" data-final=\"18\">0<\/span><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><\/div><div class=\"cl-counter-title\" style=\"color:#000000;font-size:20px;\">credit hours<\/div><\/div><\/div><\/div><\/div><div id=\"pgc-3981-3-4\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-3-4-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"12\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 11px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-3-4-1\" class=\"so-panel widget widget_cl-counter widget-cl-counter panel-last-child\" data-index=\"13\" ><div class=\"panel-widget-style panel-widget-style-for-3981-3-4-1\" ><h3 class=\"widget-title\">Program Cost<\/h3><div class=\"cl-counter\" data-duration=\"3000\"><div class=\"cl-counter-value\" style=\"color:#000000;font-size:50px;\"><span class=\"cl-counter-value-part type_text\" data-final=\"$\"><\/span><span class=\"cl-counter-value-part type_number\" data-final=\"295\">0<\/span><span class=\"cl-counter-value-part type_text\" data-final=\"\"><\/span><\/div><div class=\"cl-counter-title\" style=\"color:#000000;font-size:20px;\">per credit hour<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-3981-4\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"14\" ><div class=\"panel-widget-style panel-widget-style-for-3981-4-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>What Will I Study?<\/h3>\n<h5>We offer the most comprehensive approach to cybersecurity in the mission of God.<\/h5>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3981-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-4-1-0\" class=\"so-panel widget widget_sow-accordion panel-first-child\" data-index=\"15\" ><div class=\"panel-widget-style panel-widget-style-for-3981-4-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-accordion so-widget-sow-accordion-default-51194b335f67-3981\"\n\t\t\t data-max-open-panels=\"0\" data-use-anchor-tags=\"false\" data-initial-scroll-panel=\"0\"\n\t\t><div>\n\t<div class=\"sow-accordion\">\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"thc3320theology-of-media-communication\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-thc3320theology-of-media-communication\" aria-controls=\"accordion-content-thc3320theology-of-media-communication\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tTHC3320:\tTheology of Media &amp; Communication\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-thc3320theology-of-media-communication\"\n\t\t\t\tid=\"accordion-content-thc3320theology-of-media-communication\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>How has God spoken in word, deed, and through a variety of \u201cmedia,\u201d including nature, natural objects, and word pictures? The student will examine Scriptural and historical examples, various theories of communication, and practical missional concerns to develop a theology for telling the Good News in a variety of media.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm1100intro-to-cybersecurity\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm1100intro-to-cybersecurity\" aria-controls=\"accordion-content-itm1100intro-to-cybersecurity\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM1100:\tIntro to Cybersecurity\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm1100intro-to-cybersecurity\"\n\t\t\t\tid=\"accordion-content-itm1100intro-to-cybersecurity\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>This course introduces students to the many facets of cybersecurity and information assurance. Students will learn the fundamentals of malware, cryptography, intrusion detection, risk management and network security. Ethical issues related to cybersecurity will be covered in depth.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm3100cybersecurity-principles-practices\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm3100cybersecurity-principles-practices\" aria-controls=\"accordion-content-itm3100cybersecurity-principles-practices\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM3100:\tCybersecurity Principles &amp; Practices\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm3100cybersecurity-principles-practices\"\n\t\t\t\tid=\"accordion-content-itm3100cybersecurity-principles-practices\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>Students will explore theories and practices related to cybersecurity threats along with prevention strategies. Topics covered in this course will include: cybersecurity technologies, processes, cyber threat analysis, security risks in various environments, strategies to moderate potential cybersecurity threats and issues.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm3110cybersecurity-in-faith-based-organizations-ngos\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm3110cybersecurity-in-faith-based-organizations-ngos\" aria-controls=\"accordion-content-itm3110cybersecurity-in-faith-based-organizations-ngos\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM3110:\tCybersecurity in Faith-based Organizations &amp; NGOs\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm3110cybersecurity-in-faith-based-organizations-ngos\"\n\t\t\t\tid=\"accordion-content-itm3110cybersecurity-in-faith-based-organizations-ngos\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>Are faith-based organizations prepared to handle hacking and malicious acts? This course will cover a study of cybersecurity management in such organizations. Discussion covers the policy life cycle and the instruments used by organizations to formulate and implement policies, and internal regulations to protect and guard business operations and stakeholders as a whole against cyber attacks and crimes.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm3120network-security\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm3120network-security\" aria-controls=\"accordion-content-itm3120network-security\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM3120\tNetwork Security\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm3120network-security\"\n\t\t\t\tid=\"accordion-content-itm3120network-security\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>This course provides an overview of network security fundamentals. Students will gain knowledge of security, access control, risk management, network infrastructure, assessments, cryptography and organizational security. This course prepares students for the CompTIA Security+ industry certification.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm4100cybersecurity-standards-strategies\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm4100cybersecurity-standards-strategies\" aria-controls=\"accordion-content-itm4100cybersecurity-standards-strategies\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM4100\tCybersecurity Standards &amp; Strategies\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm4100cybersecurity-standards-strategies\"\n\t\t\t\tid=\"accordion-content-itm4100cybersecurity-standards-strategies\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>What cybersecurity standards and strategies should apply to a faith-based organization? Students will explore the basic concepts in cybersecurity and information assurance. Areas of focus include security policies, models, integrity, and availability of information. The course also covers methods to prevent, detect and recover from the loss of information, cryptography, vulnerability scanning, and web services for preserving information security.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-3981-4-1-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"16\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4><i><b>Optional Additional Courses:<\/b><\/i><\/h4>\n<div id=\"gtx-trans\" style=\"position: absolute; left: -58px; top: -18.0994px;\">\n<div class=\"gtx-trans-icon\"><\/div>\n<\/div>\n<\/div>\n<\/div><\/div><div id=\"panel-3981-4-1-2\" class=\"so-panel widget widget_sow-accordion panel-last-child\" data-index=\"17\" ><div class=\"panel-widget-style panel-widget-style-for-3981-4-1-2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-accordion so-widget-sow-accordion-default-51194b335f67-3981\"\n\t\t\t data-max-open-panels=\"0\" data-use-anchor-tags=\"false\" data-initial-scroll-panel=\"0\"\n\t\t><div>\n\t<div class=\"sow-accordion\">\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm4500evaluating-emerging-technologies\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm4500evaluating-emerging-technologies\" aria-controls=\"accordion-content-itm4500evaluating-emerging-technologies\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM4500:\tEvaluating Emerging Technologies\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm4500evaluating-emerging-technologies\"\n\t\t\t\tid=\"accordion-content-itm4500evaluating-emerging-technologies\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>What are the cutting edge technologies related to cybersecurity? This course will evaluate emerging technologies in the cybersecurity field. The goal is to research and assess emerging technologies and evaluate secure implementation strategies for faith-based organizations.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm4700information-security-audit-digital-forensics\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm4700information-security-audit-digital-forensics\" aria-controls=\"accordion-content-itm4700information-security-audit-digital-forensics\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM4700:\tInformation Security Audit &amp; Digital Forensics\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm4700information-security-audit-digital-forensics\"\n\t\t\t\tid=\"accordion-content-itm4700information-security-audit-digital-forensics\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>In this course you will explore the foundations of information security audit and digital forensics while applying common theories with modern technologies and principles. Topics for this course include: security policies and models, attacking methods and security, security and digital forensics theories, legal and ethical issues related to computer security, and IT auditing.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"psy4020cyberpsychology-digital-forensics\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-psy4020cyberpsychology-digital-forensics\" aria-controls=\"accordion-content-psy4020cyberpsychology-digital-forensics\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tPSY4020:\tCyberpsychology &amp; Digital Forensics\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-psy4020cyberpsychology-digital-forensics\"\n\t\t\t\tid=\"accordion-content-psy4020cyberpsychology-digital-forensics\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>This course will identify and focus attention on providing knowledge of internet usage in people\u2019s lives and the influence this influences our personal lives. Students will learn about a digital life and will acknowledge issues such as cyberbullying, managing their identity online, as well as mental health issues associated with internet use. The internet has become an integral part of our lives, with large numbers of people spending an average of 20 hours online per week. This is likely to grow with the advent of smart phones which provide 'internet in your pocket'. This shift towards online activities has led many to question whether it is having a positive or negative effect on our wellbeing. Particularly for the last two generations who have never not known a digital life and have had to navigate issues such as cyberbullying, managing their identity online and mental health issues associated with internet use. This course is suitable for anyone who has pondered the effect the internet is having on us, good or bad? In particular those interested in the psychological impact leading a digital life.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"itm3600ethics-in-information-technology\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-itm3600ethics-in-information-technology\" aria-controls=\"accordion-content-itm3600ethics-in-information-technology\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tITM3600:\tEthics in Information Technology\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-itm3600ethics-in-information-technology\"\n\t\t\t\tid=\"accordion-content-itm3600ethics-in-information-technology\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p>Do you understand the difference between ethical and unethical decision making? This course will introduce ethical concepts related to personal and organizational decision making in the use of information systems in faith-based organizations. Students will identify ethical issues raised by current and evolving technologies, apply a framework to analyze risk and decision options. Students will also evaluate the impact of personal ethics and organizational values on an ethical workplace.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-3981-5\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-3981-5\" ><div id=\"pgc-3981-5-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"18\" ><div class=\"panel-widget-style panel-widget-style-for-3981-5-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>When Can I Get Started?<\/h3>\n<h5>We offer multiple start dates each year to give you flexibility in your education, life and work schedules.<\/h5>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3981-5-1\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-5-1-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"19\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-5-1-1\" class=\"so-panel widget widget_sow-icon\" data-index=\"20\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-icon so-widget-sow-icon-default-04e6ae19b8a3-3981\"\n\t\t\t\n\t\t>\n<div class=\"sow-icon-container sow-icon\">\n\t\t\t<span class=\"sow-icon-fontawesome sow-far\" data-sow-icon=\"&#xf2dc;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t<\/div>\n<\/div><\/div><div id=\"panel-3981-5-1-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"21\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>JANUARY<\/b><\/h3>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-5-2\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-5-2-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"22\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-5-2-1\" class=\"so-panel widget widget_sow-icon\" data-index=\"23\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-icon so-widget-sow-icon-default-04e6ae19b8a3-3981\"\n\t\t\t\n\t\t>\n<div class=\"sow-icon-container sow-icon\">\n\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf0e9;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t<\/div>\n<\/div><\/div><div id=\"panel-3981-5-2-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"24\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>MARCH<\/b><\/h3>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-5-3\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-5-3-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"25\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-5-3-1\" class=\"so-panel widget widget_sow-icon\" data-index=\"26\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-icon so-widget-sow-icon-default-04e6ae19b8a3-3981\"\n\t\t\t\n\t\t>\n<div class=\"sow-icon-container sow-icon\">\n\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf185;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t<\/div>\n<\/div><\/div><div id=\"panel-3981-5-3-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"27\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>MAY<\/b><\/h3>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-5-4\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-5-4-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"28\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-5-4-1\" class=\"so-panel widget widget_sow-icon\" data-index=\"29\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-icon so-widget-sow-icon-default-04e6ae19b8a3-3981\"\n\t\t\t\n\t\t>\n<div class=\"sow-icon-container sow-icon\">\n\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf5d1;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t<\/div>\n<\/div><\/div><div id=\"panel-3981-5-4-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"30\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>AUGUST<\/b><\/h3>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-5-5\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-5-5-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"31\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-5-5-1\" class=\"so-panel widget widget_sow-icon\" data-index=\"32\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-icon so-widget-sow-icon-default-04e6ae19b8a3-3981\"\n\t\t\t\n\t\t>\n<div class=\"sow-icon-container sow-icon\">\n\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf06c;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t<\/div>\n<\/div><\/div><div id=\"panel-3981-5-5-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"33\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>OCTOBER<\/b><\/h3>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-3981-6\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-6-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-3981-7\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-7-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-7-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"34\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>A Career in Communicating Creatively<\/h3>\n<h3><i><font color=\"#a65805\">Is this Your Mission?<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3998 alignright\" src=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/cybersecurityfaithbasedorganizations-fpk-5123338.jpg\" alt=\"\" width=\"662\" height=\"435\" srcset=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/cybersecurityfaithbasedorganizations-fpk-5123338.jpg 662w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/cybersecurityfaithbasedorganizations-fpk-5123338-300x197.jpg 300w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/cybersecurityfaithbasedorganizations-fpk-5123338-360x237.jpg 360w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/cybersecurityfaithbasedorganizations-fpk-5123338-20x13.jpg 20w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/font><br \/>\n<\/i><\/h3>\n<blockquote>\n<p>Application Security Administrator, Cloud Security Architect, Counterespionage Analyst, Cyber Insurance Policy Specialist, Cyber Operations Specialist, Data Security Analyst, Information Assurance Analyst, Information Security Analyst, IT Security Architect, Network Security Administrator, Security Analyst, Security Auditor, Security Consultant, Security Operations Center (SOC) Analyst, IT Security Manager\/Director, Security Administrator, Security Operations Center (SOC) Manager, Chief Information Security Officer (CISO)<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><a href=\"https:\/\/admissions.missional.university\/request-information\/\"><font color=\"#a65805\">Request Information Now<\/font><\/a><\/h2>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-3981-8\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-8-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-8-0-0\" class=\"so-panel widget widget_spacer panel-first-child panel-last-child\" data-index=\"35\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 15px\">\r\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-3981-9\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-3981-9\" ><div id=\"pgc-3981-9-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-9-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"36\" ><div class=\"panel-widget-style panel-widget-style-for-3981-9-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3>How Much Will it Cost?<\/h3>\n<h5>We offer tuition based upon country of residence.\u00a0 According to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Human_Development_Index\">Human Development Index<\/a>, all countries around the world fall into one of four categories:<\/h5>\n<ul>\n<li>\n<h6>(Tier 1) - Very High Human Development<\/h6>\n<\/li>\n<li>\n<h6>(Tier 2) High Human Development<\/h6>\n<\/li>\n<li>\n<h6>(Tier 3) Medium Human Development<\/h6>\n<\/li>\n<li>\n<h6>(Tier 4) Low Human Development<\/h6>\n<\/li>\n<\/ul>\n<h5>Our tiered global tuition makes higher education affordable for everyone world wide.<\/h5>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-3981-9-1\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-9-1-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"37\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-9-1-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"38\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<\/div>\n<\/div><\/div><div id=\"panel-3981-9-1-2\" class=\"so-panel widget widget_sow-image\" data-index=\"39\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-113ccd71f3e6-3981\"\n\t\t\t data-tooltip-enabled=\"1\" data-tooltip-theme=\"light\"\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tsrc=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-150x150.png 150w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-300x300.png 300w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-850x850.png 850w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-768x768.png 768w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-270x270.png 270w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-600x600.png 600w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1-20x20.png 20w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/1.png 960w\" sizes=\"(max-width: 150px) 100vw, 150px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><div id=\"panel-3981-9-1-3\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"40\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>TIER COUNTRIES<\/b><\/h3>\n<h4 align=\"center\">100% Tuition<\/h4>\n<p>&nbsp;<\/p>\n<p align=\"center\">\n<h4 align=\"center\">$295<br \/>\nper credit hour<\/h4>\n<h4 align=\"center\"><\/h4>\n<\/p>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">3 credit course<br \/>\n$885<\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-9-2\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-9-2-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"41\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-9-2-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"42\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<\/div>\n<\/div><\/div><div id=\"panel-3981-9-2-2\" class=\"so-panel widget widget_sow-image\" data-index=\"43\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-113ccd71f3e6-3981\"\n\t\t\t data-tooltip-enabled=\"1\" data-tooltip-theme=\"light\"\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tsrc=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-150x150.png 150w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-300x300.png 300w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-850x850.png 850w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-768x768.png 768w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-270x270.png 270w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-600x600.png 600w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2-20x20.png 20w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/2.png 960w\" sizes=\"(max-width: 150px) 100vw, 150px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><div id=\"panel-3981-9-2-3\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"44\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>TIER COUNTRIES<\/b><\/h3>\n<h4 align=\"center\">80% Tuition<\/h4>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">$236<br \/>\nper credit hour<\/h4>\n<h4 align=\"center\"><\/h4>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">3 credit course<br \/>\n$708<\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-9-3\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-9-3-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"45\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-9-3-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"46\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<\/div>\n<\/div><\/div><div id=\"panel-3981-9-3-2\" class=\"so-panel widget widget_sow-image\" data-index=\"47\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-113ccd71f3e6-3981\"\n\t\t\t data-tooltip-enabled=\"1\" data-tooltip-theme=\"light\"\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tsrc=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-150x150.png 150w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-300x300.png 300w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-850x850.png 850w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-768x768.png 768w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-270x270.png 270w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-600x600.png 600w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3-20x20.png 20w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/3.png 960w\" sizes=\"(max-width: 150px) 100vw, 150px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><div id=\"panel-3981-9-3-3\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"48\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>TIER COUNTRIES<\/b><\/h3>\n<h4 align=\"center\">60% Tuition<\/h4>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">$177<br \/>\nper credit hour<\/h4>\n<h4 align=\"center\"><\/h4>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">3 credit course<br \/>\n$531<\/h4>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-3981-9-4\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-9-4-0\" class=\"so-panel widget widget_spacer panel-first-child\" data-index=\"49\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 3px\">\r\n<\/div><\/div><\/div><div id=\"panel-3981-9-4-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"50\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<\/div>\n<\/div><\/div><div id=\"panel-3981-9-4-2\" class=\"so-panel widget widget_sow-image\" data-index=\"51\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-113ccd71f3e6-3981\"\n\t\t\t data-tooltip-enabled=\"1\" data-tooltip-theme=\"light\"\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tsrc=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-150x150.png 150w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-300x300.png 300w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-850x850.png 850w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-768x768.png 768w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-270x270.png 270w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-600x600.png 600w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4-20x20.png 20w, https:\/\/missional.university\/programs\/wp-content\/uploads\/sites\/14\/2020\/01\/4.png 960w\" sizes=\"(max-width: 150px) 100vw, 150px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><div id=\"panel-3981-9-4-3\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"52\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h3 align=\"center\"><b>TIER COUNTRIES<\/b><\/h3>\n<h4 align=\"center\">40% Tuition<\/h4>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">$118<br \/>\nper credit hour<\/h4>\n<h4 align=\"center\"><\/h4>\n<p>&nbsp;<\/p>\n<h4 align=\"center\">3 credit course<br \/>\n$354<\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-3981-10\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3981-10-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3981-10-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"53\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p align=\"right\"><b>Tiered tuition based on country of origin and scholarships available. <a href=\"https:\/\/admissions.missional.university\/global-tiered-tuition\/\">\u00a0Find your country of residence here for more information<\/a>.<\/b><br \/>\nTuition may be further reduced by participating in the\u00a0<a href=\"http:\/\/admissions.missional.university\/index.php\/paying-for-mu\/sponsorship-program\/\"><b>Sponsorship Program<\/b><\/a>.<\/p>\n<\/div>\n<\/div><\/div><div id=\"panel-3981-10-0-1\" class=\"so-panel widget widget_spacer panel-last-child\" data-index=\"54\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-spacer so-widget-spacer-spacer-style-d75171398898-3981\"\n\t\t\t\n\t\t>\r\n\r\n\r\n\r\n\r\n<div class=\"spacer\" style=\"height: 9px\">\r\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Online Undergraduate Certificate in Cybersecurity in Faith-Based Organizations \u269c\u00a0 \u00a0Rarely Offered in Christian Universities, Bible Colleges or Seminaries Expand Your Missional Service Today! REQUEST INFORMATION Ready to learn more about the Undergraduate Certificate in Cybersecurity in Faith-Based Organizations? LEARN MORE&hellip;&nbsp;<a href=\"https:\/\/missional.university\/programs\/undergraduate-certificate-in-cybersecurity-in-faith-based-organizations\/\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/builder.php","meta":{"_acf_changed":false,"url":"","client":"","location":"","start_date":"","end_date":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[22,31],"tags":[27],"class_list":["post-3981","page","type-page","status-publish","hentry","category-bachelor-certificates","category-templates","tag-school-of-creative-expression"],"acf":[],"_links":{"self":[{"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/pages\/3981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/comments?post=3981"}],"version-history":[{"count":20,"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/pages\/3981\/revisions"}],"predecessor-version":[{"id":7040,"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/pages\/3981\/revisions\/7040"}],"wp:attachment":[{"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/media?parent=3981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/categories?post=3981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/missional.university\/programs\/wp-json\/wp\/v2\/tags?post=3981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}