[[{"@type":["EducationalOccupationalProgram"],"@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#EducationalOccupationalProgram","@context":{"@vocab":"http:\/\/schema.org\/","kg":"http:\/\/g.co\/kg"},"url":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/","provider":[{"@id":"https:\/\/www.smumn.edu\/"}],"mainEntityOfPage":[{"@type":"WebPage","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#EducationalOccupationalProgram_mainEntityOfPage_WebPage","breadcrumb":[{"@type":"BreadcrumbList","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320175252736-600961_0_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"\n                    \n                                                    Home                    ","item":"https:\/\/www.smumn.edu\/","position":1},{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320175252736-600961_1_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"Degree","position":2},{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320175252736-600961_2_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"Graduate Certificates","position":3},{"@type":"ListItem","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320175252736-600961_3_EducationalOccupationalProgram_mainEntityOfPage_WebPage_breadcrumb_BreadcrumbList_itemListElement_ListItem","name":"Online Graduate Certificate In Cybersecurity Technology","position":4}]}],"url":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/","mentions":[{"name":"CompTIA - The Computing Technology Industry Association","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Organization_comptia-thecomputingtechnologyindustryassociation_a5ee1859767b5d35fccf2826f394b82f45d293f58847807b1a6b9938d6753f1a","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/040shq","http:\/\/www.wikidata.org\/entity\/Q597534","https:\/\/en.wikipedia.org\/wiki\/CompTIA"]},{"name":"graduate certificate","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_graduatecertificate_22fa76f401c2792a5713c6138f3965c5e8fb543a5739df57270a16ea844afecb","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/0_yk44_","http:\/\/www.wikidata.org\/entity\/Q17015904","https:\/\/en.wikipedia.org\/wiki\/Graduate_certificate"]},{"name":"technology","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_technology_eb725157be7e9d4e3f177bae249acd2900104d01d70260d8e8678c41853a1d8b","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q11016"},{"name":"security hacker","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_securityhacker_727602ab6426fb72f51122b34e7f63dee9f35c2be7f87bd2ec46868b2b56f07d","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/07gcbt","http:\/\/www.wikidata.org\/entity\/Q2798820","https:\/\/en.wikipedia.org\/wiki\/Security_hacker"]},{"name":"infrastructure","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_infrastructure_9ebffbca870f4126ed7eecdeae06203cd30ea7b6e555f169f7614b5693e0e115","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q121359"},{"name":"computer security","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_computersecurity_15a20812221173f70f7fece01120abf71d763e75fe7bf939316a54a330d39a71","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q3510521"},{"name":"architecture","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_architecture_42e8749ddb7a231b00e3905f3b595df87272d62112ce2cdefe53c9404d71073a","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q12271"},{"name":"computer programming","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_computerprogramming_d32c2b662212bf52604a194decc3616de8a57518c23a447c73474e806c3be0fd","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/01mf_","http:\/\/www.wikidata.org\/entity\/Q80006","https:\/\/en.wikipedia.org\/wiki\/Computer_programming"]},{"name":"organization","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_organization_9d1259d880392d7e39e38b1348c6188ceb584d77038685939360bcb4042bfcb1","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q43229"},{"name":"cloud computing","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_cloudcomputing_810fc70599aeab4b868dd792c011fffa8928cf548f4bc86b47018d6e1a680249","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/02y_9m3","http:\/\/www.wikidata.org\/entity\/Q483639","https:\/\/en.wikipedia.org\/wiki\/Cloud_computing"]},{"name":"ethics","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_ethics_3f3dc85c76d48da4fd557c0529102c19bea9a0fa38fe2d7e6901f0c2f7abe5c5","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q9465"},{"name":"understanding","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_understanding_d5e638c4fec38ab95dcdec570efb95fc9ae16acf59b8db0c52d91c260529fdb1","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q46744"},{"name":"skill","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_skill_f1c3c5b66c143af6b44b88da345df04cfdb6f28be7788d14be5f9e98283186bc","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":"http:\/\/www.wikidata.org\/entity\/Q205961"},{"name":"computer program","@id":"https:\/\/entity.schemaapp.com\/Advance_Local_Media\/SaintMarysUniversityofMinnesota\/Thing_computerprogram_9a975346c57d5008701c26e1f37be0aad62beab95929fa666efae45626848d2c","@type":"Thing","@context":{"@vocab":"http:\/\/schema.org\/"},"sameAs":["http:\/\/g.co\/kg\/m\/01r9v","http:\/\/www.wikidata.org\/entity\/Q40056","https:\/\/en.wikipedia.org\/wiki\/Computer_program"]}]}],"name":"Online Graduate Certificate in Cybersecurity Technology\nRelated Programs\nFrequently Asked Questions","programPrerequisites":"\n                      Whether you apply through our online application via hard copy, or in-person with a Saint Mary\u2019s admissions counselor, your application must include the following items:\nOfficial transcripts: An official transcript issued to Saint Mary\u2019s University of Minnesota from the institution posting the applicant\u2019s completed degree and other relevant transcripts documenting program prerequisites and potential transfer credits must be sent separately and directly from your institution. Saint Mary\u2019s University of Minnesota accepts official transcripts electronically from previously attended institutions. Transcripts should be sent to oladmissions@smumn.edu or mailed to:\nTranscript Processing Center\nSaint Mary\u2019s University of Minnesota\n851 Trafalgar Court, Suite 420\nMaitland, FL 32751\n&nbsp;\n\n                    ","description":"\n                    \n                    \n\n    Program Highlights\n        \n  \n\n\n    \n        \nCISSP and CISM Certification Preparation\nNetwork+, Security+, and CySA+ Certification Preparation&nbsp;\nApply Graduate Certificate Credits to an M.S. in Cybersecurity\nCourse Topics Include Security Infrastructure, Cloud Security Architecture, Programming\/Ethical Hacking Techniques, and Cybersecurity Analyst Functions\nNo Letters of Recommendation Required\nOfficial CompTIA Authorized Academic Partner&nbsp;\n\n    \n    \n\n        \n  \n\n\n    \n        Request Info        \n            \n        \n    \n\n    \n                ","hasCourse":[{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320195826705-17953_0_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          Prerequisite Course (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      Students who have not taken a foundational computer networking course and\/or lack previous experience in the networking technology field may be required to take CYBR 590 Network Technology and Infrastructure (3 cr.) as part of their program. These credits do not apply to the Cybersecurity M.S. program nor to the certificate.\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320195826705-17953_1_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 600 Foundations of Cybersecurity (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      Prerequisite Course\nStudents who have not taken a foundational computer networking course and\/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.\nThis course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.\nUpon completion of the course, students are expected to be able to do the following:\n\nApply the principles of information technology security\nAnalyze situations of computer and network usage from a security perspective to develop a security mindset\nExplain information security\u2019s importance in our increasingly computer-driven world\nIdentify appropriate strategies to ensure confidentiality, integrity, and availability of information\nExpress management\u2019s role in the development, maintenance, and enforcement of an information security program\nDescribe the relationship among laws, regulations, and professional issues in information security\nArticulate how cryptography serves as the central language of information security\nAnalyze how physical security fits within an information security program\nDefine the roles of computer forensics in information security\nApply basic software tools for assessing the security posture of a business\nExplain how issues of privacy relate to business information security\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320195826705-17953_2_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 606 Cloud Architecture and Application Security (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      This course introduces the domains of cloud security in both theoretical and practical applications. Students are presented with a structured approach to cloud architecture and design requirements along with applications involved in developing layered cloud security strategies. Students evaluate the data organization, data security, cloud applications, operations, and compliance used in deploying cloud-based security architecture that supports the objectives of the enterprise.\nUpon completion of the course, students are expected to be able to do the following:\n\nCreate a plan for an organization\u2019s strategic security objectives\nApply architectural frameworks and design principles\nIdentify methods, roles, responsibilities, and accountabilities of personnel governing compliance of security policies\nEvaluate data security strategies and data classification controls\nDifferentiate cloud-based security models\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320195826705-17953_3_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 610 Network Security and Intrusion Detection (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      Prerequisite(s): CYBR590 Network Technology and Infrastructure\nThis course provides a comprehensive overview of network security and intrusion detection. Students focus on methods for securing networks, and utilize these methods in basic architectural design. Students apply these methods into a cohesive network security strategy. Topics include investigation of areas such as data analysis and interpretation, threat\/intrusion detection, vulnerability management, incident response and security architecture. The course also prepares students for the CompTIA CySA+ Certification Exam.\nUpon completion of the course, students are expected to be able to do the following:\n\nImplement security operations and monitoring design principles in network architectures\nIntegrate software and systems security components through knowledge of hardware, transmission media, cryptography, network access, honeypot, endpoint security, and content-distribution networks\nImplement secure communication channels according to design that involve voice, multimedia collaboration, remote access, data communications, and virtualized networks\nSpecify incident response and forensic procedures to recover from attacks on network systems\nConduct logging and monitoring activities to support intrusion detection and prevention, and event management\nIdentify threats and vulnerabilities in networked systems\nUnderstand compliance and assessment practices\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320195826705-17953_4_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          DIGA 625 Python Programming for Technology Applications (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      The course focuses on core programming concepts such as classes and objects, controlling flow, batch processing, and error handling while working in data processing, analysis, and visualization. The course explores a variety of Python packages and integration for project development. Using Python to automate workflows and create custom visualizations is discussed, and students can explore tabular data, spatial data, and\/or cybersecurity applications of Python.\nUpon completion of the course, students are expected to be able to do the following:\n\nDevelop custom visualizations that communicate data and results of an analysis\nRespond to specific scripting requirements to address analytical problems and improve workflows\nApply the concepts and logic of object-oriented programming\n\n\n                    "},{"@type":"Course","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#Highlight20260320195826705-17953_5_EducationalOccupationalProgram_hasCourse_Course","name":"\n                          CYBR 655 Pen Testing and Ethical Hacking (3 credits)                          \n                              \n                          \n                          \n                              \n                          \n                        ","description":"\n                      This course includes a study of theoretical and practical aspects of network and web application penetration testing. Students are able to evaluate the security of a network or system\u2019s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities. Included in the course are in-depth details on ethical hacking, including reconnaissance, vulnerability assessment, exploitation, maintaining access, and covering tracks. Current tools and methodologies are stressed.\nUpon completion of the course, students are expected to be able to do the following:\n\nExplain the regulatory\/legal requirements and rationale for penetration testing\nInterpret and differentiate cyber threats and exploits in a penetration testing context\nDistinguish key phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering the tracks\nPerform protocol analysis using packet captures and analyze data using a network sniffer\nInvestigate and uncover network devices, operating systems, and services\nDiscover network security issues using an intrusion detection tool\nLeverage penetration testing applications to recognize information targets across operating systems and services\nImplement scripts and tools to assist in penetration testing\nDeploy and test exploits targeting operating systems and services\nIdentify and exploit various vulnerabilities in web applications\n\n\n                    "}],"numberOfCredits":15},{"@context":"http:\/\/schema.org","@type":"CollegeOrUniversity","image":[{"@type":"ImageObject","width":"1000","height":"785","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2022\/09\/Landing-page-center_DSC_1079_mobile.jpg","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2022\/09\/Landing-page-center_DSC_1079_mobile.jpg"},{"@type":"ImageObject","width":"947","height":"733","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/4A9AB7AA-33A4-4C07-A551-E243D44BE2DE_1_201_a.jpeg","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/4A9AB7AA-33A4-4C07-A551-E243D44BE2DE_1_201_a.jpeg"},{"@type":"ImageObject","width":"827","height":"1000","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/adult-learner2.jpg","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/04\/adult-learner2.jpg"}],"areaServed":[{"@type":"Place","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Winona,_Minnesota","name":"Winona, MN","url":"https:\/\/www.smumn.edu\/#Place","@id":"https:\/\/www.smumn.edu\/#Place"},{"@type":"Place","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Minneapolis","name":"Minneapolis, MN","url":"https:\/\/www.smumn.edu\/#Place1","@id":"https:\/\/www.smumn.edu\/#Place1"},{"@type":"Place","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Rochester,_Minnesota","name":"Rochester, MN","url":"https:\/\/www.smumn.edu\/#Place2","@id":"https:\/\/www.smumn.edu\/#Place2"}],"contactPoint":[{"@type":"ContactPoint","availableLanguage":"English","areaServed":{"@id":"https:\/\/www.smumn.edu\/#Place"},"contactType":"Admissions","telephone":"+1 (507) 457-1700","name":"Winona ContactPoint","@id":"https:\/\/www.smumn.edu\/#ContactPoint"},{"@type":"ContactPoint","availableLanguage":"English","areaServed":{"@id":"https:\/\/www.smumn.edu\/#Place1"},"contactType":"Admissions","telephone":"+1 (612) 728-5100","name":"Minneapolis ContactPoint","@id":"https:\/\/www.smumn.edu\/#ContactPoint1"},{"@type":"ContactPoint","availableLanguage":"English","areaServed":{"@id":"https:\/\/www.smumn.edu\/#Place2"},"contactType":"Admissions","telephone":"+1 (507) 285-1410","name":"Rochester ContactPoint","@id":"https:\/\/www.smumn.edu\/#ContactPoint2"}],"email":"admission@smumn.edu","openingHours":"Monday to Friday; 8:00 a.m. - 4:00 p.m.","sameAs":["https:\/\/www.tiktok.com\/@smumn","https:\/\/www.linkedin.com\/school\/saint-mary's-university-of-minnesota\/","https:\/\/www.facebook.com\/smumn","https:\/\/www.instagram.com\/smumn\/"],"name":"Saint Mary's University of Minnesota","telephone":["+1 (507) 285-1410","+1 (612) 728-5100","+1 507-457-1700"],"description":"Saint Mary\u2019s offers a highly personal, real-world-ready educational experience that fully prepares you to work, lead, and serve with character and purpose. Whether online or in person, adult or undergraduate, you\u2019ll be supported by faculty and staff committed to your success in programs designed for today\u2019s and tomorrow\u2019s careers.","disambiguatingDescription":"Why choose Saint Mary\u2019s?","url":"https:\/\/www.smumn.edu\/","geo":[{"@type":"GeoCoordinates","longitude":"-91.69734","latitude":"44.04384","name":"Winona Geo","@id":"https:\/\/www.smumn.edu\/#GeoCoordinates"},{"@type":"GeoCoordinates","longitude":"-93.26557","latitude":"44.95679","name":"Minneapolis Geo","@id":"https:\/\/www.smumn.edu\/#GeoCoordinates1"},{"@type":"GeoCoordinates","longitude":"-92.50489","latitude":"44.0396","name":"Rochester Geo","@id":"https:\/\/www.smumn.edu\/#GeoCoordinates2"}],"logo":{"@type":"ImageObject","width":"300","height":"113","url":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/06\/SMU-Logo_StackedHorizontalofM_FC_03_REV-WHT300.png","@id":"https:\/\/www.smumn.edu\/wp-content\/uploads\/2023\/06\/SMU-Logo_StackedHorizontalofM_FC_03_REV-WHT300.png"},"address":[{"@type":"PostalAddress","streetAddress":"700 Terrace Heights","postalCode":"55987","addressRegion":"MN","addressLocality":"Winona","addressCountry":{"@type":"Country","url":"https:\/\/www.smumn.edu\/#Country","name":"US","sameAs":"https:\/\/en.wikipedia.org\/wiki\/United_States","@id":"https:\/\/www.smumn.edu\/#Country"},"name":"Winona Campus - PostalAddress","url":"https:\/\/www.smumn.edu\/#PostalAddress","@id":"https:\/\/www.smumn.edu\/#PostalAddress"},{"@type":"PostalAddress","streetAddress":"2500 Park Avenue","postalCode":"55404","addressRegion":"MN","addressLocality":"Minneapolis","addressCountry":{"@id":"https:\/\/www.smumn.edu\/#Country"},"name":"Minneapolis Campus - PostalAddress","url":"https:\/\/www.smumn.edu\/#PostalAddress1","@id":"https:\/\/www.smumn.edu\/#PostalAddress1"},{"@type":"PostalAddress","streetAddress":"2900 19th Street NW","postalCode":"55901","addressRegion":"MN","addressLocality":"Rochester","addressCountry":{"@id":"https:\/\/www.smumn.edu\/#Country"},"name":"Rochester Campus - PostalAddress","url":"https:\/\/www.smumn.edu\/#PostalAddress2","@id":"https:\/\/www.smumn.edu\/#PostalAddress2"}],"@id":"https:\/\/www.smumn.edu\/"},{"@context":"http:\/\/schema.org","@type":"EducationalOccupationalCredential","credentialCategory":"High School","name":"High School","sameAs":"https:\/\/en.wikipedia.org\/wiki\/Secondary_school","@id":"https:\/\/www.smumn.edu\/#EducationalOccupationalCredential"}],{"@context":"https:\/\/schema.org","@type":"BreadcrumbList","@id":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Degree","item":"https:\/\/www.smumn.edu\/degree\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Graduate Certificates","item":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/#breadcrumbitem"},{"@type":"ListItem","position":3,"name":"Online Graduate Certificate In Cybersecurity Technology","item":"https:\/\/www.smumn.edu\/degree\/graduate-certificate\/cybersecurity-technology\/#breadcrumbitem"}]}]