  {"id":8474,"date":"2025-02-09T18:25:38","date_gmt":"2025-02-10T00:25:38","guid":{"rendered":"https:\/\/uwm.edu\/informationstudies\/?post_type=program&#038;p=8474"},"modified":"2025-10-29T13:49:43","modified_gmt":"2025-10-29T18:49:43","slug":"cybersecurity-certificate-online","status":"publish","type":"program","link":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/","title":{"rendered":"Cybersecurity Certificate, Online"},"content":{"rendered":"\n\n<div id=\"primary\" class=\"content-area\">\n\t<div id=\"main\" class=\"site-main\">\n\t\t\n\n<section id=\"program-intro\" class=\"uwm-u-pt-80 uwm-u-pb-40\">\n    <div class=\"uwm-l-container--base\">\n        \n\n<div class=\"uwm-l-row\">\n<div id=\"intro-main\" class=\"uwm-l-col\">\n<header class=\"page-header\">\n    <h1 class=\"entry-title heading-separator\">\n        Cybersecurity Certificate, Online                    <div class=\"program-degree size-h3 uwm-u-mt-20\">Undergraduate Certificate<\/div>\n            <\/h1>\n<\/header>\n  \n\n\n\n\n<p class=\"lead-in\">In our digital world, protecting information and technologies is critical. The University of Wisconsin-Milwaukee&#8217;s online cybersecurity certificate program gives you the tools to safeguard organizations against data breaches, unauthorized access and potential threats.<\/p>\n\n\n\n<p>Whether you&#8217;re a current student pursuing a bachelor&#8217;s degree or a working professional seeking to enhance your credentials with a post-baccalaureate certificate, you\u2019ll gain a strong foundation in information security, IT tools and more. The <a href=\"https:\/\/uwm.edu\/informationstudies\/\">School of Information Studies\u2019<\/a> curriculum combines technical and problem-solving skills to prepare you for real career opportunities.<\/p>\n\n\n\n<p><strong>Start Dates: <\/strong>Fall, Spring or Summer<br><strong>Cost per Credits:<\/strong> $392 (Total Cost: $7,056*)<br><strong>Credit Hours: <\/strong>18<\/p>\n\n\n\n<p>* Total cost will vary based on the number of credits transferred into 51ÁÔÆæ<\/p>\n\n\n    <div id=\"program-details-jump\">\n        <a class=\"uwm-c-button uwm-c-button--s\" href=\"#program-details\" rel=\"\">Jump to Program Details <i class=\"uwm-u-pl-10 fa-solid fa-arrow-down\"><\/i><\/a>\n    <\/div>\n\n    \n\n\n    <div class=\"uwm-l-row uwm-u-mt-50\">\n                    <div class=\"uwm-l-col\">\n                <h2 class=\"size-h6 uwm-u-my-10 uwm-u-pt-10 uwm-u-border--top\">Program Type<\/h2>\n                <p class=\"size-h4 uwm-u-mt-0\">\n                    <strong>Undergraduate Certificate<\/strong>\n                <\/p>\n            <\/div>\n        \n                    <div class=\"uwm-l-col uwm-l-offset--2\">\n                <h2 class=\"size-h6 uwm-u-my-10 uwm-u-pt-10 uwm-u-border--top\">Program Format<\/h2>\n                <p class=\"size-h4 uwm-u-mt-0\">\n                    <strong>Online<\/strong>\n                <\/p>\n            <\/div>\n            <\/div>\n\n<\/div>\n\n\n\n<div id=\"intro-sidebar\" class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n\n        <div class=\"uwm-mini-rfi uwm-p-card uwm-p-card--gold uwm-p-card--shadow\">\n            <div class=\"uwm-p-card--body\">\n                <div class=\"uwm-p-card--content\">\n                    <div class=\"uwm-p-card--title\">Request Information<\/div>\n                    <div id='form_35d6cfab-7fe7-4386-a9a8-d2146e47556e'>Loading&#8230;<\/div>                <\/div>\n            <\/div>\n        <\/div>\n        \n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left uwm-u-mt-40\">\n<a class=\"uwm-c-button uwm-c-button--outline uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/admission\/\" rel=\"\">Apply Now<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--outline uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/cost-aid\/\" rel=\"\">Cost<\/a>\n<\/div>\n\n<script async='async' src='https:\/\/admissions.uwm.edu\/register\/?id=35d6cfab-7fe7-4386-a9a8-d2146e47556e&amp;output=embed&amp;div=form_35d6cfab-7fe7-4386-a9a8-d2146e47556e'>\/**\/<\/script>\n\n<\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n\n\t    <section id=\"program-highlights\" class=\"uwm-u-py-80 uwm-bg-gray-dark\">\n        <div class=\"uwm-l-container--base\">\n        \n\n<div id=\"program-highlights-content-image\" class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n\n<h2 class=\"wp-block-heading uwm-u-mt-60 size-h2 heading-separator\" id=\"h-why-study-cybersecurity-at-uwm\">Why Study Cybersecurity at 51ÁÔÆæ?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Earn a documented credential that sets you apart in the field. Our formal certification carries more weight than an informal track of courses in cybersecurity.<\/li>\n\n\n\n<li>Develop the ability to mitigate and assess risks to personal and proprietary information.<\/li>\n\n\n\n<li>Learn from expert instructors who teach online and in-person classes.<\/li>\n\n\n\n<li>Gain insights into the technical, organizational and human factors that impact information security.<\/li>\n\n\n\n<li>Learn to evaluate modern technologies and cybersecurity tools.<\/li>\n\n\n\n<li>Understand how to implement security measures that align with organizational needs and regulatory requirements.<\/li>\n<\/ul>\n\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--6 uwm-l-offset--1\">    <figure class=\"default\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" \n                class=\"wp-image-7402\" \n                src=\"https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/02\/ist-video.jpg\" \n                alt=\"Information Science &amp; Technology students work in the cybersecurity lab at the School of Information Studies.\" \n srcset=\"https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/02\/ist-video.jpg 750w, https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/02\/ist-video-300x200.jpg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/>\n                    <\/figure>\n<\/div>\n<\/div>\n\n        <\/div>\n    <\/section>\n\n\n\n\n<section id=\"program-details\" class=\"uwm-u-py-80\">\n    <div class=\"uwm-l-container--base\">\n        \n\n<div class=\"uwm-l-row\">\n<div id=\"details-main\" class=\"uwm-l-col\">\n\n<div class=\"uwm-p-tabs\" data-tabs-prefix-class=\"uwm-p-tabs\"><ul class=\"uwm-p-tablist\" data-hx=\"h2\"><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-paying-for-college\" class=\"uwm-p-tablist--link\">Paying for College<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-admissions\" class=\"uwm-p-tablist--link\">Admissions<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-curriculum\" class=\"uwm-p-tablist--link\">Curriculum<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-careers\" class=\"uwm-p-tablist--link\">Careers<\/a><\/li><\/ul><div class=\"uwm-p-tabcontent\">\n<div id=\"tab-d4xj-paying-for-college\" class=\"uwm-p-tabcontent--pane\">\n<p>From specialized Information Studies scholarships to payment plans, the Office of Student Financial Services is here to help you find ways to make your pursuit of an online cybersecurity certificate achievable.<\/p>\n\n\n\n<p>Scholarship opportunities may increase with academic standing. Explore the <a href=\"https:\/\/uwm.academicworks.com\/users\/sign_in\">Panther Scholarship Portal<\/a> regularly as you make progress on your certificate.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/finances\/\" rel=\"\">Student Financial Services<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/informationstudies\/students\/scholarships-tuition-and-fees\/\" rel=\"\">Information Studies Scholarships<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/finances\/scholarships\/\" rel=\"\">51ÁÔÆæ Scholarships<\/a>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-d4xj-admissions\" class=\"uwm-p-tabcontent--pane\">\n<p>In order to be considered for the undergraduate cybersecurity certificate program, you must meet <a href=\"https:\/\/uwm.edu\/undergrad-admission\/apply\/\">51ÁÔÆæ\u2019s general admission requirements<\/a>.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/online\/admission\/\" rel=\"\">Online Admission Requirements<\/a>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-d4xj-curriculum\" class=\"uwm-p-tabcontent--pane\">\n<p>Learn how to evaluate information technology tools, assess security policies and oversee an organization\u2019s entire information security life cycle. The cybersecurity curriculum covers the planning, acquisition, development and evolution of secure infrastructures.<\/p>\n\n\n\n<p>The 18-credit online cybersecurity certificate program can be completed as part of the <a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-science-and-technology\/\">Bachelor of Science in Information Science &amp; Technology (IST) degree<\/a> or as a standalone post-baccalaureate certificate.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/community-engagement-professions\/information-studies\/cybersecurity-undergraduate-certificate\/#requirementstext\" rel=\"\">Cybersecurity Requirements<\/a>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-courses\">Courses<\/h2>\n\n\n\n<p>The online cybersecurity program at 51ÁÔÆæ consists of two required courses and a selection of electives. The required courses provide a solid foundation in cybersecurity principles that you can supplement with your choice of classes in areas like privacy, computer security, ethical hacking, and network routing and switching.<\/p>\n\n\n\n<div class=\"uwm-p-accordion\" data-accordion-prefix-classes=\"uwm\" data-accordion-cool-selectors=\"1\"><button class=\"uwm-p-accordion--toggle-button size-p-md\">Expand All<\/button>\n<div class=\"uwm-p-accordion--header\">Required Courses<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<ul class=\"wp-block-list\">\n<li>INFOST 325: Information Security I<\/li>\n\n\n\n<li>INFOST 385: Information Security II<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Elective Courses<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<ul class=\"wp-block-list\">\n<li>BUS ADM 530: Privacy and Information Security for Business<\/li>\n\n\n\n<li>COMPSCI 469: Introduction to Computer Security<\/li>\n\n\n\n<li>INFOST 465: Legal Aspects of Information Products and Services<\/li>\n\n\n\n<li>INFOST 481: Web Application Penetration Testing<\/li>\n\n\n\n<li>INFOST 660: Information Policy<\/li>\n\n\n\n<li>INFOST 661: Information Ethics<\/li>\n\n\n\n<li>INFOST 691: Advanced Topics in Information Science &amp; Technology: (Relevant courses such as Information Security, Disinformation &amp; Social Engineering and Computer Forensics)<\/li>\n\n\n\n<li>INFOST 695: Ethical Hacking I<\/li>\n\n\n\n<li>INFOST 696: Ethical Hacking II<\/li>\n\n\n\n<li>INFOST 697: Cisco Routing &amp; Switching I<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-d4xj-careers\" class=\"uwm-p-tabcontent--pane\">\n<p>The cybersecurity field is experiencing rapid growth nationally, with the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">Bureau of Labor Statistics projecting the employment of information security analysts to increase 33% through 2033<\/a> \u2014 much faster than the average for all occupations. Cybersecurity professionals play a vital role in protecting organizations from data breaches, cyberattacks and other digital threats.<\/p>\n\n\n\n<p>Graduates with a cybersecurity certificate hold job titles such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Forensic Computer Analyst<\/li>\n\n\n\n<li>Information Security Analyst<\/li>\n\n\n\n<li>Penetration Tester<\/li>\n<\/ul>\n<\/div>\n<\/div><\/div>\n\n<\/div>\n\n\n\n<div id=\"details-sidebar\" class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/community-engagement-professions\/information-studies\/cybersecurity-undergraduate-certificate\/\" target=\"_blank\" rel=\"noreferrer noopener\">Academic Catalog<\/a>\n<\/div>\n\n\n\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/course-search\/\" rel=\"\">Schedule of Classes<\/a>\n<\/div>\n\n\n\n    <button\n        data-modal-prefix-class=\"uwm-p\"\n        data-modal-content-id=\"uwm-modal-op3uv7\"\n        data-modal-title=\"\"\n        data-modal-close-text=\"Close\"\n        data-modal-close-title=\"Close\"\n        aria-haspopup=\"dialog\"\n        aria-controls=\"uwm-modal-op3uv7\"\n        class=\"uwm-p-modal--launch uwm-c-button uwm-c-button--full uwm-u-mb-20\"\n    >All Academic Resources<\/button>\n\n    \n\n<div id=\"uwm-modal-op3uv7\" class=\"hidden\"><div class=\"content_block\" id=\"custom_post_widget-2614\">\n<div class=\"uwm-l-row uwm-l-row--6\">\n<div class=\"uwm-l-col\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/\">Academic Advising<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/catalog.uwm.edu\/\">Academic Catalog<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/\">Academic Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/course-syllabi\/\">Course Syllabi<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/\">FAQs, Forms and Policies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/fieldwork-and-internship-forms\/\">Fieldwork Forms &amp; Guidelines<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-u-border-desktop--left\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/graduateschool\/students\/academic-policies-and-procedures\/masters-resources\/masters-graduation\/\">Graduate Graduation Procedures<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/graduate-orientation\/\">Graduate Orientation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_type_facet=masters%2Cdoctoral%2Ccertificate\">Graduate Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/graduateschool\/students\/academic-policies-and-procedures\/masters-resources\/masters-requirements\/\/#transfer-credit\">Graduate Transfer Credit Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/sois-grievance-and-appeals-process\/\">Grievance and Appeals Process\/ Grade Appeal Process<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-u-border-desktop--left\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/sois-information-sessions\/\">Information Sessions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/it-department\/#ist-tutoring\">IST Tutoring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/student-resources\/ccep-new-student-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">New Student Checklist<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_format_facet=online\">Online Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/catalog.uwm.edu\/course-search\/\">Schedule of Classes<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_type_facet=major%2Cminor%2Caccelerated-masters%2Cundergraduate-certificate\">Undergraduate Programs<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n    <div class=\"uwm-p-card uwm-p-card--color-head uwm-u-mt-40\">\n        <div class=\"uwm-p-card--title\">Contact<\/div>\n        <div class=\"uwm-p-card--body\">\n            <div class=\"uwm-p-card--content\">\n                <div class=\"content_block\" id=\"custom_post_widget-9903\">\n<p><strong>College of Community Engagement &amp; Professions<\/strong><br><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/\">Student Advising &amp; Support Services<\/a><br>Northwest Quadrant D 3800<br>414-229-4707<br><a href=\"mailto:ccep-advising@uwm.edu\">ccep-advising@uwm.edu<\/a><\/p>\n<\/div>            <\/div>\n        <\/div>\n    <\/div>\n\n<\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\t<\/div>\n<\/div>\n\n\n","protected":false},"author":3016,"parent":0,"template":"","meta":{"_acf_changed":false,"_uwm_academics_program_template":"page","_uwm_academics_program_navigation":[],"uwm_academics_program_card_image_id":0,"uwm_academics_program_banner_image_id":3035,"uwm_academics_program_sort_title":"","uwm_academics_program_external_url":"","uwm_academics_program_jump_details_btn":true,"_uwm_academics_program_exclude_from_programs_archive_page":false,"_uwm_academics_program_exclude_from_programs_block":false,"_uwm_academics_program_exclude_from_department_page":false,"footnotes":"","uwm_wg_additional_authors":[]},"program_group":[],"program_tag":[],"program_type":[20],"program_format":[16],"program_department":[],"class_list":["post-8474","program","type-program","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>School of Information Studies<\/title>\n<meta name=\"description\" content=\"Earn an undergraduate online cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Certificate, Online\" \/>\n<meta property=\"og:description\" content=\"Earn an undergraduate online cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Information Studies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T18:49:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate-online\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate-online\\\/\",\"name\":\"Online Cybersecurity Certificate - School of Information Studies | 51ÁÔÆæ Online\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#website\"},\"datePublished\":\"2025-02-10T00:25:38+00:00\",\"dateModified\":\"2025-10-29T18:49:43+00:00\",\"description\":\"Earn an undergraduate online cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate-online\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Academic Programs\",\"item\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Certificate, Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\",\"name\":\"School of Information Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2-academic\\\/wp-content\\\/uploads\\\/sites\\\/542\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2-academic\\\/wp-content\\\/uploads\\\/sites\\\/542\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"School of Information Studies","description":"Earn an undergraduate online cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Certificate, Online","og_description":"Earn an undergraduate online cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.","og_url":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/","og_site_name":"School of Information Studies","article_modified_time":"2025-10-29T18:49:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/","url":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/","name":"Online Cybersecurity Certificate - School of Information Studies | 51ÁÔÆæ Online","isPartOf":{"@id":"https:\/\/uwm.edu\/informationstudies\/#website"},"datePublished":"2025-02-10T00:25:38+00:00","dateModified":"2025-10-29T18:49:43+00:00","description":"Earn an undergraduate online cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.","breadcrumb":{"@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/informationstudies\/"},{"@type":"ListItem","position":2,"name":"Academic Programs","item":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Certificate, Online"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/informationstudies\/#website","url":"https:\/\/uwm.edu\/informationstudies\/","name":"School of Information Studies","description":"","publisher":{"@id":"https:\/\/uwm.edu\/informationstudies\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/informationstudies\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/informationstudies\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/informationstudies\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/informationstudies\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/0template-webid2-academic\/wp-content\/uploads\/sites\/542\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/0template-webid2-academic\/wp-content\/uploads\/sites\/542\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/informationstudies\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/8474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program"}],"about":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/types\/program"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/users\/3016"}],"version-history":[{"count":13,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/8474\/revisions"}],"predecessor-version":[{"id":9964,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/8474\/revisions\/9964"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/media?parent=8474"}],"wp:term":[{"taxonomy":"program_group","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_group?post=8474"},{"taxonomy":"program_tag","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_tag?post=8474"},{"taxonomy":"program_type","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_type?post=8474"},{"taxonomy":"program_format","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_format?post=8474"},{"taxonomy":"program_department","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_department?post=8474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}