  {"id":601,"date":"2022-08-23T11:02:38","date_gmt":"2022-08-23T16:02:38","guid":{"rendered":"https:\/\/uwm.edu\/informationstudies\/?post_type=program&#038;p=601"},"modified":"2025-02-09T19:02:03","modified_gmt":"2025-02-10T01:02:03","slug":"information-security-graduate-certificate","status":"publish","type":"program","link":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/","title":{"rendered":"Information Security Certificate"},"content":{"rendered":"\n\n<div id=\"primary\" class=\"content-area\">\n\t<div id=\"main\" class=\"site-main\">\n\t\t\n\n<section id=\"program-intro\" class=\"uwm-u-pt-80 uwm-u-pb-40\">\n    <div class=\"uwm-l-container--base\">\n        \n\n<div class=\"uwm-l-row\">\n<div id=\"intro-main\" class=\"uwm-l-col\">\n<header class=\"page-header\">\n    <h1 class=\"entry-title heading-separator\">\n        Information Security Certificate                    <div class=\"program-degree size-h3 uwm-u-mt-20\">Graduate Certificate<\/div>\n            <\/h1>\n<\/header>\n  \n\n\n\n\n<p class=\"lead-in\">Prepare to protect organizations against cyber threats and privacy intrusions with the University of Wisconsin-Milwaukee&#8217;s online information security certificate.<\/p>\n\n\n\n<p class=\"default\">By enrolling in the <a href=\"https:\/\/uwm.edu\/informationstudies\/\">School of Information Studies\u2019<\/a> information security graduate certificate program, you&#8217;ll develop in-demand skills in safeguarding information systems, networks and data across industries. Learn to implement robust security protocols and stay ahead of new technologies in the field. Plus, you can complete the certificate alongside our <a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/library-and-information-science-masters\/\">Master of Science in Library and Information Science (MLIS) degree<\/a>, giving you a head start on furthering your education and career.<\/p>\n\n\n\n<p><\/p>\n\n\n    <div id=\"program-details-jump\">\n        <a class=\"uwm-c-button uwm-c-button--s\" href=\"#program-details\" rel=\"\">Jump to Program Details <i class=\"uwm-u-pl-10 fa-solid fa-arrow-down\"><\/i><\/a>\n    <\/div>\n\n    \n\n\n    <div class=\"uwm-l-row uwm-u-mt-50\">\n                    <div class=\"uwm-l-col\">\n                <h2 class=\"size-h6 uwm-u-my-10 uwm-u-pt-10 uwm-u-border--top\">Program Type<\/h2>\n                <p class=\"size-h4 uwm-u-mt-0\">\n                    <strong>Graduate Certificate<\/strong>\n                <\/p>\n            <\/div>\n        \n                    <div class=\"uwm-l-col uwm-l-offset--2\">\n                <h2 class=\"size-h6 uwm-u-my-10 uwm-u-pt-10 uwm-u-border--top\">Program Format<\/h2>\n                <p class=\"size-h4 uwm-u-mt-0\">\n                    <strong>Hybrid, On Campus<\/strong>\n                <\/p>\n            <\/div>\n            <\/div>\n\n<\/div>\n\n\n\n<div id=\"intro-sidebar\" class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n\n        <div class=\"uwm-mini-rfi uwm-p-card uwm-p-card--gold uwm-p-card--shadow\">\n            <div class=\"uwm-p-card--body\">\n                <div class=\"uwm-p-card--content\">\n                    <div class=\"uwm-p-card--title\">Request Information<\/div>\n                    <div id='form_2b2e0855-c802-4b50-a396-29b20906af35'>Loading&#8230;<\/div>                <\/div>\n            <\/div>\n        <\/div>\n        \n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left uwm-u-mt-40\">\n<a class=\"uwm-c-button uwm-c-button--outline uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/admission\/\" rel=\"\">Apply Now<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--outline uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/cost-aid\/\" rel=\"\">Cost<\/a>\n<\/div>\n\n<script async='async' src='https:\/\/admissions.uwm.edu\/register\/?id=2b2e0855-c802-4b50-a396-29b20906af35&amp;output=embed&amp;div=form_2b2e0855-c802-4b50-a396-29b20906af35'>\/**\/<\/script>\n\n<\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n\n\t    <section id=\"program-highlights\" class=\"uwm-u-py-80 uwm-bg-gray-dark\">\n        <div class=\"uwm-l-container--base\">\n        \n\n<div id=\"program-highlights-content-image\" class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n\n<h2 class=\"wp-block-heading\" id=\"h-why-study-information-security-at-uwm\">Why Study Information Security at 51ÁÔÆæ?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Advance your career or transition into the growing field of cybersecurity in an online environment.&nbsp;<\/li>\n\n\n\n<li>Learn to assess risks, evaluate security tools and manage the entire information security lifecycle.<\/li>\n\n\n\n<li>Gain expertise in planning, acquisition, development and evolution of secure infrastructures.<\/li>\n\n\n\n<li>Elevate your knowledge in areas such as network security, cryptography and risk management.<\/li>\n\n\n\n<li>Participate in courses led by expert faculty who teach both in-person and online.<\/li>\n<\/ul>\n\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--6 uwm-l-offset--1\">    <figure class=\"default\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" \n                class=\"wp-image-8484\" \n                src=\"https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/12\/featured-image-info-security-750X500.jpg\" \n                alt=\"A woman working on her laptop next to her colleague\" \n srcset=\"https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/12\/featured-image-info-security-750X500.jpg 750w, https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/12\/featured-image-info-security-750X500-300x200.jpg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/>\n                    <\/figure>\n<\/div>\n<\/div>\n\n        <\/div>\n    <\/section>\n\n\n\n\n<section id=\"program-details\" class=\"uwm-u-py-80\">\n    <div class=\"uwm-l-container--base\">\n        \n\n<div class=\"uwm-l-row\">\n<div id=\"details-main\" class=\"uwm-l-col\">\n\n<div class=\"uwm-p-tabs\" data-tabs-prefix-class=\"uwm-p-tabs\"><ul class=\"uwm-p-tablist\" data-hx=\"h2\"><li class=\"uwm-p-tablist--item\"><a href=\"#tab-optq-about\" class=\"uwm-p-tablist--link\">About<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-optq-admissions\" class=\"uwm-p-tablist--link\">Admissions<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-optq-curriculum\" class=\"uwm-p-tablist--link\">Curriculum<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-optq-careers\" class=\"uwm-p-tablist--link\">Careers<\/a><\/li><\/ul><div class=\"uwm-p-tabcontent\">\n<div id=\"tab-optq-about\" class=\"uwm-p-tabcontent--pane\">\n<p class=\"default\">Students learn how to assess risks to the security of proprietary information in an organization and how to articulate the technical, organizational and human factors associated with these risks. Students will learn how to evaluate information technology tools designed to protect against information security threats and assess the impact of security policies on existing complex systems and organizational objectives.<\/p>\n\n\n\n<p>Graduates are well prepared to oversee the information security life cycle of an organization, including planning, acquisition, development, and evolution of secure infrastructures.&nbsp;<\/p>\n<\/div>\n\n\n\n<div id=\"tab-optq-admissions\" class=\"uwm-p-tabcontent--pane\">\n<p>To be considered for admission to 51ÁÔÆæ\u2019s information security graduate certificate program, you must:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Complete the graduate online application and submit all Graduate School application materials.<\/li>\n\n\n\n<li>Submit a one- or two-page statement outlining your background and educational and professional goals.<\/li>\n<\/ul>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/graduateschool\/students\/admission\/\" rel=\"\">51ÁÔÆæ Graduate Admissions<\/a>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-optq-curriculum\" class=\"uwm-p-tabcontent--pane\">\n<p>Learn to assess information security risks and understand technical, organizational and human factors in cybersecurity. The information security curriculum also emphasizes the use of IT tools for threat protection and overseeing comprehensive information security data.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/community-engagement-professions\/information-studies\/information-security-graduate-certificate\/#requirementstextcontainer\" rel=\"\">Information Security Requirements<\/a>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-courses\">Courses<\/h2>\n\n\n\n<p>The graduate certificate in information security requires the completion of two core courses and three electives. Explore topics related to legal issues, ethical decisions, network routing and database management. <\/p>\n\n\n\n<p>Students in the Information Security certificate program must complete a minimum of 15 graduate credits.&nbsp;<\/p>\n\n\n\n<div class=\"uwm-p-accordion\" data-accordion-prefix-classes=\"uwm\" data-accordion-cool-selectors=\"1\"><button class=\"uwm-p-accordion--toggle-button size-p-md\">Expand All<\/button>\n<div class=\"uwm-p-accordion--header\">Required Courses<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<ul class=\"wp-block-list\">\n<li>INFOST 583G: Survey of Information Security<\/li>\n\n\n\n<li>INFOST 784: Information Security Management<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Elective Courses<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<ul class=\"wp-block-list\">\n<li>INFOST 465G: Legal Aspects of Information Products and Services<\/li>\n\n\n\n<li>INFOST 660G: Information Policy<\/li>\n\n\n\n<li>INFOST 661G: Information Ethics<\/li>\n\n\n\n<li>INFOST 691G: Special Topics in Information Science<\/li>\n\n\n\n<li>INFOST 695G: Ethical Hacking I<\/li>\n\n\n\n<li>INFOST 696G: Ethical Hacking II<\/li>\n\n\n\n<li>INFOST 697G: Cisco Routing &amp; Switching I<\/li>\n\n\n\n<li>INFOST 785: Database Management Systems for Information Professionals<\/li>\n\n\n\n<li>INFOST 897: Information Science and Technology Independent Study<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-optq-careers\" class=\"uwm-p-tabcontent--pane\">\n<p>Prepare to tackle critical tasks such as protecting confidential information, developing robust security strategies and responding to cyber threats. By earning an information security graduate certificate online from 51ÁÔÆæ, you\u2019ll know how to keep you organization\u2019s information safe and succeed in high-demand roles, like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybersecurity Analyst<\/li>\n\n\n\n<li>Information Assurance Specialist<\/li>\n\n\n\n<li>Information Security Manager<\/li>\n\n\n\n<li>IT Security Consultant<\/li>\n\n\n\n<li>Security Operations Center (SOC) Analyst<\/li>\n<\/ul>\n<\/div>\n<\/div><\/div>\n\n<\/div>\n\n\n\n<div id=\"details-sidebar\" class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/community-engagement-professions\/information-studies\/information-security-graduate-certificate\/\" target=\"_blank\" rel=\"noreferrer noopener\">Academic Catalog<\/a>\n<\/div>\n\n\n\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/course-search\/\" rel=\"\">Schedule of Classes<\/a>\n<\/div>\n\n\n\n    <button\n        data-modal-prefix-class=\"uwm-p\"\n        data-modal-content-id=\"uwm-modal-op3uv7\"\n        data-modal-title=\"\"\n        data-modal-close-text=\"Close\"\n        data-modal-close-title=\"Close\"\n        aria-haspopup=\"dialog\"\n        aria-controls=\"uwm-modal-op3uv7\"\n        class=\"uwm-p-modal--launch uwm-c-button uwm-c-button--full uwm-u-mb-20\"\n    >All Academic Resources<\/button>\n\n    \n\n<div id=\"uwm-modal-op3uv7\" class=\"hidden\"><div class=\"content_block\" id=\"custom_post_widget-2614\">\n<div class=\"uwm-l-row uwm-l-row--6\">\n<div class=\"uwm-l-col\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/\">Academic Advising<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/catalog.uwm.edu\/\">Academic Catalog<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/\">Academic Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/course-syllabi\/\">Course Syllabi<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/\">FAQs, Forms and Policies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/fieldwork-and-internship-forms\/\">Fieldwork Forms &amp; Guidelines<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-u-border-desktop--left\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/graduateschool\/students\/academic-policies-and-procedures\/masters-resources\/masters-graduation\/\">Graduate Graduation Procedures<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/graduate-orientation\/\">Graduate Orientation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_type_facet=masters%2Cdoctoral%2Ccertificate\">Graduate Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/graduateschool\/students\/academic-policies-and-procedures\/masters-resources\/masters-requirements\/\/#transfer-credit\">Graduate Transfer Credit Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/sois-grievance-and-appeals-process\/\">Grievance and Appeals Process\/ Grade Appeal Process<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-u-border-desktop--left\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/sois-information-sessions\/\">Information Sessions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/it-department\/#ist-tutoring\">IST Tutoring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/student-resources\/ccep-new-student-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">New Student Checklist<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_format_facet=online\">Online Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/catalog.uwm.edu\/course-search\/\">Schedule of Classes<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_type_facet=major%2Cminor%2Caccelerated-masters%2Cundergraduate-certificate\">Undergraduate Programs<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n    <div class=\"uwm-p-card uwm-p-card--color-head uwm-u-mt-40\">\n        <div class=\"uwm-p-card--title\">Contact<\/div>\n        <div class=\"uwm-p-card--body\">\n            <div class=\"uwm-p-card--content\">\n                            <\/div>\n        <\/div>\n    <\/div>\n\n<\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\t<\/div>\n<\/div>\n\n\n","protected":false},"author":3016,"parent":0,"template":"","meta":{"_acf_changed":false,"_uwm_academics_program_template":"page","_uwm_academics_program_navigation":[],"uwm_academics_program_card_image_id":2829,"uwm_academics_program_banner_image_id":0,"uwm_academics_program_sort_title":"","uwm_academics_program_external_url":"","uwm_academics_program_jump_details_btn":true,"_uwm_academics_program_exclude_from_programs_archive_page":false,"_uwm_academics_program_exclude_from_programs_block":false,"_uwm_academics_program_exclude_from_department_page":false,"footnotes":"","uwm_wg_additional_authors":[]},"program_group":[],"program_tag":[],"program_type":[21],"program_format":[42,15],"program_department":[],"class_list":["post-601","program","type-program","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>School of Information Studies<\/title>\n<meta name=\"description\" content=\"Our information security certificate prepares graduate students to address threats from cyberattacks and information privacy intrusions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Certificate\" \/>\n<meta property=\"og:description\" content=\"Our information security certificate prepares graduate students to address threats from cyberattacks and information privacy intrusions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Information Studies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-10T01:02:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/information-security-graduate-certificate\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/information-security-graduate-certificate\\\/\",\"name\":\"Information Security Certificate - School of Information Studies - UW-Milwaukee\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#website\"},\"datePublished\":\"2022-08-23T16:02:38+00:00\",\"dateModified\":\"2025-02-10T01:02:03+00:00\",\"description\":\"Our information security certificate prepares graduate students to address threats from cyberattacks and information privacy intrusions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/information-security-graduate-certificate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/information-security-graduate-certificate\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/information-security-graduate-certificate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Academic Programs\",\"item\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security Certificate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\",\"name\":\"School of Information Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2-academic\\\/wp-content\\\/uploads\\\/sites\\\/542\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2-academic\\\/wp-content\\\/uploads\\\/sites\\\/542\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"School of Information Studies","description":"Our information security certificate prepares graduate students to address threats from cyberattacks and information privacy intrusions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Certificate","og_description":"Our information security certificate prepares graduate students to address threats from cyberattacks and information privacy intrusions.","og_url":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/","og_site_name":"School of Information Studies","article_modified_time":"2025-02-10T01:02:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/","url":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/","name":"Information Security Certificate - School of Information Studies - UW-Milwaukee","isPartOf":{"@id":"https:\/\/uwm.edu\/informationstudies\/#website"},"datePublished":"2022-08-23T16:02:38+00:00","dateModified":"2025-02-10T01:02:03+00:00","description":"Our information security certificate prepares graduate students to address threats from cyberattacks and information privacy intrusions.","breadcrumb":{"@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-security-graduate-certificate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/informationstudies\/"},{"@type":"ListItem","position":2,"name":"Academic Programs","item":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/"},{"@type":"ListItem","position":3,"name":"Information Security Certificate"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/informationstudies\/#website","url":"https:\/\/uwm.edu\/informationstudies\/","name":"School of Information Studies","description":"","publisher":{"@id":"https:\/\/uwm.edu\/informationstudies\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/informationstudies\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/informationstudies\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/informationstudies\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/informationstudies\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/0template-webid2-academic\/wp-content\/uploads\/sites\/542\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/0template-webid2-academic\/wp-content\/uploads\/sites\/542\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/informationstudies\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program"}],"about":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/types\/program"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/users\/3016"}],"version-history":[{"count":21,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/601\/revisions"}],"predecessor-version":[{"id":8894,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/601\/revisions\/8894"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/media?parent=601"}],"wp:term":[{"taxonomy":"program_group","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_group?post=601"},{"taxonomy":"program_tag","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_tag?post=601"},{"taxonomy":"program_type","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_type?post=601"},{"taxonomy":"program_format","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_format?post=601"},{"taxonomy":"program_department","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_department?post=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}