[[{"@type":["EducationalOccupationalProgram"],"@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#EducationalOccupationalProgram","@context":{"@vocab":"http:\/\/schema.org\/","kg":"http:\/\/g.co\/kg"},"url":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/","provider":[{"@id":"https:\/\/www.smumn.edu\/"}],"mainEntityOfPage":[{"@type":"WebPage","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#EducationalOccupationalProgram_mainEntityOfPage_WebPage","breadcrumb":[{"@type":"BreadcrumbList","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320175252736-600961_0_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"\n                    \n                                                    Home                    ","item":"https:\/\/www.smumn.edu\/","position":1},{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320175252736-600961_1_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"Degree","position":2},{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320175252736-600961_2_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"Graduate Certificates","position":3},{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320175252736-600961_3_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"Online Certificate In Cybersecurity Management","position":4}]}],"url":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/","mentions":[{"name":"graduate certificate","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_graduatecertificate_22fa76f401c2792a5713c6138f3965c5e8fb543a5739df57270a16ea844afecb","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/0_yk44_","http:\/\/www.wikidata.org\/entity\/Q17015904","https:\/\/en.wikipedia.org\/wiki\/Graduate_certificate"]},{"name":"computer security","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_computersecurity_15a20812221173f70f7fece01120abf71d763e75fe7bf939316a54a330d39a71","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q3510521"},{"name":"leadership","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_leadership_26826a33152195710981715ebfaf25925bf994d1d70150312fb0181e86abdd05","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/025rt2s","http:\/\/www.wikidata.org\/entity\/Q484275","https:\/\/en.wikipedia.org\/wiki\/Leadership"]},{"name":"business acumen","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_businessacumen_d65e5eebed2e2886f552b4a3ae4d1e852ccffca1b83c2d76430e3b24346c824e","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q5001820"},{"name":"security policy","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_securitypolicy_75ebc8694aa6939c20acc42c88f067c8972ab236ee665fde0383a8c6c2265c1b","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/086819","http:\/\/www.wikidata.org\/entity\/Q2167404","https:\/\/en.wikipedia.org\/wiki\/Security_policy"]},{"name":"role","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_role_0587217d95a2c312049592868d158b2f73402d51b63172e8147b783df0034f4a","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q214339"},{"name":"governance","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_governance_cb8f383ec55e1d355e65b840db481de1d8c0f703d3fcbf2a7d634f6169564e23","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q1553864"},{"name":"effectiveness","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_effectiveness_fbc88fdf8efa64ebf312da015544b682fb24828d819262ec29b0df3bce4229f0","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q1296024"},{"name":"strategy","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_strategy_e56254f69e367ea58aa1b3e426b18010af33ac483f582633766371a8ca314d78","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q185451"},{"name":"expert","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_expert_5b26742b53a084963251fbd2a4e80766070e1c26fca0040be5cdb4399c8e25b5","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/02pkl","http:\/\/www.wikidata.org\/entity\/Q381160","https:\/\/en.wikipedia.org\/wiki\/Expert"]},{"name":"security","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_security_2922dae38b7468a5a0ed7f84a4e7a547c05595b7f84f8b6bbdf32ed02bb3bc0a","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q2526135"},{"name":"hand","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_hand_4edb63f228ce5d32ee5b215d567576b854838467f9623703e9aedd03c9525876","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q33767"},{"name":"experience","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_experience_b1d96497f5573a6e76d212361ea8a3adfa8d61c16eabb249a9635847236982b5","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q164359"},{"name":"field","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_field_ac1c61fc5aba8227b06bc790b5e0c69ca20ba72df2dbda52521ab9a2c86cd1e4","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q190109"},{"name":"computer program","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_computerprogram_9a975346c57d5008701c26e1f37be0aad62beab95929fa666efae45626848d2c","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/01r9v","http:\/\/www.wikidata.org\/entity\/Q40056","https:\/\/en.wikipedia.org\/wiki\/Computer_program"]}]}],"name":"Online Graduate Certificate in Cybersecurity Management","programPrerequisites":"\n                      Whether you apply through our online application via hard copy, or in-person with a Saint Mary\u2019s admissions counselor, your application must include the following items:\nOfficial transcripts: An official transcript issued to Saint Mary\u2019s University of Minnesota from the institution posting the applicant\u2019s completed degree and other relevant transcripts documenting program prerequisites and potential transfer credits must be sent separately and directly from your institution. Saint Mary\u2019s University of Minnesota accepts official transcripts electronically from previously attended institutions. Transcripts should be sent to oladmissions@smumn.edu or mailed to:\nTranscript Processing Center\nSaint Mary\u2019s University of Minnesota\n851 Trafalgar Court, Suite 420\nMaitland, FL 32751\n&nbsp;\n\n                    ","description":"\n                    \n                    \n\n    Program Highlights\n        \n  \n\n\n    \n        \nApply Graduate Certificate Credits to an M.S. in Cybersecurity Degree\nProvides additional background surrounding CISSP, CISM and CompTIA certifications\nLearn Valuable Information Management and Mitigation Strategies\nNo Letters of Recommendation Required\nOfficial CompTIA Authorized Academic Partner&nbsp;\n\n    \n    \n\n        \n  \n\n\n    \n        Request Info        \n            \n        \n    \n\n    \n                ","hasCourse":[{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320195826705-17953_0_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 600 Foundations of Cybersecurity (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.\nUpon completion of this course, students are expected to be able to do the following:\n\nApply the principles of information technology security\nAnalyze situations of computer and network usage from a security perspective to develop a security mindset\nExplain information security\u2019s importance in our increasingly computer-driven world\nIdentify appropriate strategies to ensure confidentiality, integrity, and availability of information\nExpress management\u2019s role in the development, maintenance, and enforcement of an information security program\nDescribe the relationship among laws, regulations, and professional issues in information security\nArticulate how cryptography serves as the central language of information security\nAnalyze how physical security fits within an information security program\nDefine the roles of computer forensics in information security\nApply basic software tools for assessing the security posture of a business\nExplain how issues of privacy relate to business information security\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320195826705-17953_1_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 615 Cybersecurity Change Management (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      This course describes the business context in which a cybersecurity professional must function within an organization. Students examine the interplay between business processes and cybersecurity issues in mitigating security threats. An overview of audit, compliance, regulation, and liability for business security are provided, along with how to construct effective continuity and disaster recovery plans, is provided.\nUpon completion of this course, students are expected to be able to do the following:\n\nManage business decisions affected by changing and diverse external and internal security threats\nAlign security functions to business strategy, goals, mission, and objectives\nDetermine compliance requirements among contractual, legal, regulatory, privacy requirements, and industry standards\nOutline legal and regulatory issues that pertain to information security in a global context in areas such as cyber-crimes and data breaches, licensing and intellectual property requirements, import\/export controls, trans-border data flow, and privacy\nIdentify, analyze, and prioritize business continuity requirements through the development of a scope and plan and business impact analysis\nImplement disaster recovery processes and understand concepts of response, recovery personnel, communications methods, damage assessment, system restoration and training, and security awareness\nAddress security concerns related to personnel safety, travel, security training and awareness, and emergency management\nDevelop a security awareness and training program\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320195826705-17953_2_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 620 Operational Security Policy (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      In this course, students examine the roles of security policies, standards, and procedures in addressing business and technical security risks. Students explore the types of policies that are part of an overall security strategy. Policies are discussed that drive computer security, including discretionary access control, mandatory access control, and role-based access control types of policies, and how these are used in organizations. Students develop policies and deployment plans as part of the comprehensive strategic plan for the enterprise.\nUpon completion of this course, students are expected to be able to do the following:\n\nDevelop high-level security policies that directly support the mission, vision, and direction of an organization\nDevelop issue-specific policies to control the use of resources, assets, and activities to support the organization\u2019s goals and objectives\nDevelop system-specific policies that express technical details for the implementation, configuration, and management of the system including configuration rules and access control\nDevelop, document, and implement security policies, standards, procedures, and guidelines\nCreate security procedures and administrative controls for the enterprise\nEvaluate physical and logical access to assets such as information, systems, devices, and facilities\nManage identification, authentication, and authorization of people, devices, and services\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320195826705-17953_3_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 625 Risk Management (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      This course includes a study of the existing risk management frameworks, models, processes, and tools to provide students with the theory and practical knowledge needed to operationalize risk management in an organization or government agency. Additionally, fundamental concepts in information technology security audit and control processes for an organization are discussed. Students learn to create a control structure and audit an information technology infrastructure.\nUpon completion of this course, students are expected to be able to do the following:\n\nPerform a risk assessment to determine the extent that an organization\u2019s technology assets are exposed to risk\nDemonstrate the concepts of risk appetite and residual risk as they apply to the information assets of an organization\nComplete a threat assessment that identifies asset vulnerabilities and ranks threats based on likelihood and financial impact\nApply the risk control strategies of transfer, mitigation, acceptance, and termination and how cost-benefit analysis is utilized in determining which strategy to implement\nEmploy risk assessment and analysis techniques that include risk response and countermeasure selection and implementation\nApply risk-based management concepts to the supply chain with an understanding of risks associated with hardware, software, and services\nConduct a security control testing plan that involves a vulnerability assessment, penetration testing, log reviews, synthetic transactions, code review, and interface testing\nVerify controls are applied consistently\nDefine how business alignment, risk appetite, and risk aversion affect the security program implementation\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#Highlight20260320195826705-17953_4_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 645 Incident Response and Investigation (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      This course introduces the principles and best practices for incident response, along with an overview of digital forensics. Students understand the goals of incident response and learn how to prepare and respond to information security incidents and understand how the incident occurred. Students understand the process of collecting and analyzing data, and the process of remediation. The course outlines the investigative and analysis process, tools, digital evidence, and applicable law with a focus on computer, mobile, network, and database forensics.\nUpon completion of the course, students are expected to be able to do the following:\n\nImplement the basics of evidence collection and documentation, reporting, investigative techniques, digital forensics tools, and procedures\nInterpret requirements for investigation types of administrative, criminal, civil, regulatory, and industry standards and the associated costs\nIdentify the implications of data location in responding to security incidents\nConduct incident management through all stages of a breach with knowledge of detection, response, mitigation, reporting, recovery, and remediation.\nAdjust preventative measures in response to security incidents\nImplement recovery strategies such as backup, recovery sites, multiple processing sites, and system resilience via high availability, Quality of Service (QoS), and fault tolerance\nDevelop incident reports and analysis presentations\n\n\n                    "}],"numberOfCredits":15},{"@context":"http:\/\/schema.org","@type":"CollegeOrUniversity","image":[{"@type":"ImageObject","width":"1000","height":"785","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2022\/09\/Landing-page-center_DSC_1079_mobile.jpg","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2022\/09\/Landing-page-center_DSC_1079_mobile.jpg"},{"@type":"ImageObject","width":"947","height":"733","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/4A9AB7AA-33A4-4C07-A551-E243D44BE2DE_1_201_a.jpeg","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/4A9AB7AA-33A4-4C07-A551-E243D44BE2DE_1_201_a.jpeg"},{"@type":"ImageObject","width":"827","height":"1000","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/adult-learner2.jpg","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/adult-learner2.jpg"}],"areaServed":[{"@type":"Place","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Winona,_Minnesota","name":"Winona, MN","url":"https:\/\/www.smumn.edu\/#Place","@id":"https:\/\/www.smumn.edu\/#Place"},{"@type":"Place","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Minneapolis","name":"Minneapolis, MN","url":"https:\/\/www.smumn.edu\/#Place1","@id":"https:\/\/www.smumn.edu\/#Place1"},{"@type":"Place","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Rochester,_Minnesota","name":"Rochester, MN","url":"https:\/\/www.smumn.edu\/#Place2","@id":"https:\/\/www.smumn.edu\/#Place2"}],"contactPoint":[{"@type":"ContactPoint","availableLanguage":"English","areaServed":{"@id":"https:\/\/www.smumn.edu\/#Place"},"contactType":"Admissions","telephone":"+1 (507) 457-1700","name":"Winona ContactPoint","@id":"https:\/\/www.smumn.edu\/#ContactPoint"},{"@type":"ContactPoint","availableLanguage":"English","areaServed":{"@id":"https:\/\/www.smumn.edu\/#Place1"},"contactType":"Admissions","telephone":"+1 (612) 728-5100","name":"Minneapolis ContactPoint","@id":"https:\/\/www.smumn.edu\/#ContactPoint1"},{"@type":"ContactPoint","availableLanguage":"English","areaServed":{"@id":"https:\/\/www.smumn.edu\/#Place2"},"contactType":"Admissions","telephone":"+1 (507) 285-1410","name":"Rochester ContactPoint","@id":"https:\/\/www.smumn.edu\/#ContactPoint2"}],"email":"admission@smumn.edu","openingHours":"Monday to Friday; 8:00 a.m. - 4:00 p.m.","sameAs":["https:\/\/www.tiktok.com\/@smumn","https:\/\/www.linkedin.com\/school\/saint-mary's-university-of-minnesota\/","https:\/\/www.facebook.com\/smumn","https:\/\/www.instagram.com\/smumn\/"],"name":"Saint Mary's University of Minnesota","telephone":["+1 (507) 285-1410","+1 (612) 728-5100","+1 507-457-1700"],"description":"Saint Mary\u2019s offers a highly personal, real-world-ready educational experience that fully prepares you to work, lead, and serve with character and purpose. Whether online or in person, adult or undergraduate, you\u2019ll be supported by faculty and staff committed to your success in programs designed for today\u2019s and tomorrow\u2019s careers.","disambiguatingDescription":"Why choose Saint Mary\u2019s?","url":"https:\/\/www.smumn.edu\/","geo":[{"@type":"GeoCoordinates","longitude":"-91.69734","latitude":"44.04384","name":"Winona Geo","@id":"https:\/\/www.smumn.edu\/#GeoCoordinates"},{"@type":"GeoCoordinates","longitude":"-93.26557","latitude":"44.95679","name":"Minneapolis Geo","@id":"https:\/\/www.smumn.edu\/#GeoCoordinates1"},{"@type":"GeoCoordinates","longitude":"-92.50489","latitude":"44.0396","name":"Rochester Geo","@id":"https:\/\/www.smumn.edu\/#GeoCoordinates2"}],"logo":{"@type":"ImageObject","width":"300","height":"113","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/06\/SMU-Logo_StackedHorizontalofM_FC_03_REV-WHT300.png","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/06\/SMU-Logo_StackedHorizontalofM_FC_03_REV-WHT300.png"},"address":[{"@type":"PostalAddress","streetAddress":"700 Terrace Heights","postalCode":"55987","addressRegion":"MN","addressLocality":"Winona","addressCountry":{"@type":"Country","url":"https:\/\/www.smumn.edu\/#Country","name":"US","sameAs":"https:\/\/en.wikipedia.org\/wiki\/United_States","@id":"https:\/\/www.smumn.edu\/#Country"},"name":"Winona Campus - PostalAddress","url":"https:\/\/www.smumn.edu\/#PostalAddress","@id":"https:\/\/www.smumn.edu\/#PostalAddress"},{"@type":"PostalAddress","streetAddress":"2500 Park Avenue","postalCode":"55404","addressRegion":"MN","addressLocality":"Minneapolis","addressCountry":{"@id":"https:\/\/www.smumn.edu\/#Country"},"name":"Minneapolis Campus - PostalAddress","url":"https:\/\/www.smumn.edu\/#PostalAddress1","@id":"https:\/\/www.smumn.edu\/#PostalAddress1"},{"@type":"PostalAddress","streetAddress":"2900 19th Street NW","postalCode":"55901","addressRegion":"MN","addressLocality":"Rochester","addressCountry":{"@id":"https:\/\/www.smumn.edu\/#Country"},"name":"Rochester Campus - PostalAddress","url":"https:\/\/www.smumn.edu\/#PostalAddress2","@id":"https:\/\/www.smumn.edu\/#PostalAddress2"}],"@id":"https:\/\/www.smumn.edu\/"},{"@context":"http:\/\/schema.org","@type":"EducationalOccupationalCredential","credentialCategory":"High School","name":"High School","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Secondary_school","@id":"https:\/\/www.smumn.edu\/#EducationalOccupationalCredential"}],{"@context":"https:\/\/schema.org","@type":"BreadcrumbList","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Degree","item":"https:\/\/www.smumn.edu\/degree\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Graduate Certificates","item":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/#breadcrumbitem"},{"@type":"ListItem","position":3,"name":"Online Certificate In Cybersecurity Management","item":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-management\/#breadcrumbitem"}]}]