{"id":594,"date":"2022-08-23T09:20:56","date_gmt":"2022-08-23T14:20:56","guid":{"rendered":"https:\/\/uwm.edu\/informationstudies\/?post_type=program&#038;p=594"},"modified":"2026-04-24T08:40:51","modified_gmt":"2026-04-24T13:40:51","slug":"cybersecurity-certificate","status":"publish","type":"program","link":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/","title":{"rendered":"Cybersecurity Certificate"},"content":{"rendered":"\n\n<div id=\"primary\" class=\"content-area\">\n\t<div id=\"main\" class=\"site-main\">\n\t\t\n\n<section id=\"program-intro\" class=\"uwm-u-pt-80 uwm-u-pb-40\">\n    <div class=\"uwm-l-container--base\">\n        \n\n<div class=\"uwm-l-row\">\n<div id=\"intro-main\" class=\"uwm-l-col\">\n<header class=\"page-header\">\n    <h1 class=\"entry-title heading-separator\">\n        Cybersecurity Certificate                    <div class=\"program-degree size-h3 uwm-u-mt-20\">Undergraduate Certificate<\/div>\n            <\/h1>\n<\/header>\n  \n\n\n\n\n<p class=\"lead-in\">The security of information resources and associated technologies has become critical in today\u2019s interconnected world. Cybersecurity professionals ensure information is protected from data breaches, unauthorized access, and data security threats.<\/p>\n\n\n\n<p>Information Security Certificate students will leverage their technical knowledge with problem-solving skills to address the growing threats arising from cyberattacks and information privacy intrusions. Students will be equipped with the skills needed to assess risks to the security of personal and proprietary information in an organization and articulate the technical, organizational, and human factors associated with these risks.<\/p>\n\n\n    <div id=\"program-details-jump\">\n        <a class=\"uwm-c-button uwm-c-button--s\" href=\"#program-details\" rel=\"\">Jump to Program Details <i class=\"uwm-u-pl-10 fa-solid fa-arrow-down\"><\/i><\/a>\n    <\/div>\n\n    \n\n\n    <div class=\"uwm-l-row uwm-u-mt-50\">\n                    <div class=\"uwm-l-col\">\n                <h2 class=\"size-h6 uwm-u-my-10 uwm-u-pt-10 uwm-u-border--top\">Program Type<\/h2>\n                <p class=\"size-h4 uwm-u-mt-0\">\n                    <strong>Undergraduate Certificate<\/strong>\n                <\/p>\n            <\/div>\n        \n                    <div class=\"uwm-l-col uwm-l-offset--2\">\n                <h2 class=\"size-h6 uwm-u-my-10 uwm-u-pt-10 uwm-u-border--top\">Program Format<\/h2>\n                <p class=\"size-h4 uwm-u-mt-0\">\n                    <strong>Hybrid, On Campus<\/strong>\n                <\/p>\n            <\/div>\n            <\/div>\n\n<\/div>\n\n\n\n<div id=\"intro-sidebar\" class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n\n        <div class=\"uwm-mini-rfi uwm-p-card uwm-p-card--gold uwm-p-card--shadow\">\n            <div class=\"uwm-p-card--body\">\n                <div class=\"uwm-p-card--content\">\n                    <div class=\"uwm-p-card--title\">Request Information<\/div>\n                    <div id='form_35d6cfab-7fe7-4386-a9a8-d2146e47556e'>Loading&#8230;<\/div>                <\/div>\n            <\/div>\n        <\/div>\n        \n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left uwm-u-mt-40\">\n<a class=\"uwm-c-button uwm-c-button--outline uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/admission\/\" rel=\"\">Apply Now<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--outline uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/cost-aid\/\" rel=\"\">Cost<\/a>\n<\/div>\n\n<script async='async' src='https:\/\/admissions.uwm.edu\/register\/?id=35d6cfab-7fe7-4386-a9a8-d2146e47556e&amp;output=embed&amp;div=form_35d6cfab-7fe7-4386-a9a8-d2146e47556e'>\/**\/<\/script>\n\n<\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\n\n\t    <section id=\"program-highlights\" class=\"uwm-u-py-80 uwm-bg-gray-dark\">\n        <div class=\"uwm-l-container--base\">\n        \n\n<div id=\"program-highlights-content-image\" class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n\n<h2 class=\"wp-block-heading uwm-u-mt-60 size-h2 heading-separator\" id=\"h-cybersecurity-professionals-are-in-demand-to-fill-roles-nationally\">Cybersecurity professionals are in demand to fill roles nationally!<\/h2>\n\n\n\n<p class=\"lead-in\">Information Security jobs are among the fastest-growing careers nationally. The Department of Labor\u2019s Bureau of Labor Statistics predicts that \u201cEmployment of information security analysts is projected to grow 33 percent from 2020 to 2030, much faster than the average for all occupations.\u201d  <\/p>\n\n\n\n<p class=\"size-p-sm\">(<a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm<\/a>).<\/p>\n\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--6 uwm-l-offset--1\">    <figure class=\"default\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"500\" \n                class=\"wp-image-7402\" \n                src=\"https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/02\/ist-video.jpg\" \n                alt=\"Information Science &amp; Technology students work in the cybersecurity lab at the School of Information Studies.\" \n srcset=\"https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/02\/ist-video.jpg 750w, https:\/\/uwm.edu\/informationstudies\/wp-content\/uploads\/sites\/609\/2024\/02\/ist-video-300x200.jpg 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/>\n                                <figcaption>Information Science &amp; Technology Students working in the cybersecurity lab at the School of Information Studies.<\/figcaption>\n                <\/figure>\n<\/div>\n<\/div>\n\n        <\/div>\n    <\/section>\n\n\n\n\n<section id=\"program-details\" class=\"uwm-u-py-80\">\n    <div class=\"uwm-l-container--base\">\n        \n\n<div class=\"uwm-l-row\">\n<div id=\"details-main\" class=\"uwm-l-col\">\n\n<div class=\"uwm-p-tabs\" data-tabs-prefix-class=\"uwm-p-tabs\"><ul class=\"uwm-p-tablist\" data-hx=\"h2\"><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-about\" class=\"uwm-p-tablist--link\">About<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-admission\" class=\"uwm-p-tablist--link\">Admission<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-curriculum\" class=\"uwm-p-tablist--link\">Curriculum<\/a><\/li><li class=\"uwm-p-tablist--item\"><a href=\"#tab-d4xj-careers\" class=\"uwm-p-tablist--link\">Careers<\/a><\/li><\/ul><div class=\"uwm-p-tabcontent\">\n<div id=\"tab-d4xj-about\" class=\"uwm-p-tabcontent--pane\">\n<p>Students will learn to evaluate information technology tools designed to protect against threats facing organizations and assess the impact of security policies on existing complex systems and organizational objectives while considering regulatory requirements and compliance. Students will be well equipped to oversee the information security life cycle of an organization, including planning, acquisition, development, and evolution of secure infrastructures.<\/p>\n\n\n\n<p>Graduates can work in careers such as information security analysts, penetration testers, and forensic computer analysts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-choose-the-cybersecurity-certificate\">Why choose the cybersecurity certificate?<\/h2>\n\n\n\n<p>The undergraduate certificate in Cybersecurity will provide a documented credential that an informal track of courses does not reflect. <\/p>\n\n\n\n<p><strong>Post-baccalaureate Certificate Option<\/strong><br>Students may complete the certificate as part of the bachelor&#8217;s degree in <a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-science-and-technology\/\">Information Science &amp; Technology (IST)<\/a> or it can be completed independently of the IST program as a post-baccalaureate certificate program.<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div id=\"tab-d4xj-admission\" class=\"uwm-p-tabcontent--pane\">\n<p>In order to be considered for the undergraduate cybersecurity certificate program, you must meet <a href=\"https:\/\/uwm.edu\/undergrad-admission\/apply\/\">UWM\u2019s general admission requirements<\/a>.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/admission\/\" rel=\"\">UWM Admissions<\/a>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-paying-for-college\">Paying for College<\/h2>\n\n\n\n<p>From specialized Information Studies scholarships to payment plans, the Office of Student Financial Services is here to help you find ways to make your pursuit of an online cybersecurity certificate achievable.<\/p>\n\n\n\n<p>Scholarship opportunities may increase with academic standing. Explore the <a href=\"https:\/\/uwm.academicworks.com\/users\/sign_in\">Panther Scholarship Portal<\/a> regularly as you make progress on your certificate.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/finances\/\" rel=\"\">Student Financial Services<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/informationstudies\/students\/scholarships-tuition-and-fees\/\" rel=\"\">Information Studies Scholarships<\/a>\n\n\n\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/finances\/scholarships\/\" rel=\"\">UWM Scholarships<\/a>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-d4xj-curriculum\" class=\"uwm-p-tabcontent--pane\">\n<p>Learn how to evaluate information technology tools, assess security policies and oversee an organization\u2019s entire information security life cycle. The cybersecurity curriculum covers the planning, acquisition, development and evolution of secure infrastructures.<\/p>\n\n\n\n<p>The 18-credit online cybersecurity certificate program can be completed as part of the <a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/information-science-and-technology\/\">Bachelor of Science in Information Science &amp; Technology (IST) degree<\/a> or as a standalone post-baccalaureate certificate.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-c-button--black uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/community-engagement-professions\/information-studies\/cybersecurity-undergraduate-certificate\/#requirementstext\" rel=\"\">Cybersecurity Requirements<\/a>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-courses\">Courses<\/h2>\n\n\n\n<p>The online cybersecurity program at UWM consists of two required courses and a selection of electives. The required courses provide a solid foundation in cybersecurity principles that you can supplement with your choice of classes in areas like privacy, computer security, ethical hacking, and network routing and switching.<\/p>\n\n\n\n<div class=\"uwm-p-accordion\" data-accordion-prefix-classes=\"uwm\" data-accordion-cool-selectors=\"1\"><button class=\"uwm-p-accordion--toggle-button size-p-md\">Expand All<\/button>\n<div class=\"uwm-p-accordion--header\">Required Courses<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<ul class=\"wp-block-list\">\n<li>INFOST 325: Information Security I<\/li>\n\n\n\n<li>INFOST 385: Information Security II<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Elective Courses<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<ul class=\"wp-block-list\">\n<li>BUS ADM 530: Privacy and Information Security for Business<\/li>\n\n\n\n<li>COMPSCI 469: Introduction to Computer Security<\/li>\n\n\n\n<li>INFOST 465: Legal Aspects of Information Products and Services<\/li>\n\n\n\n<li>INFOST 481: Web Application Penetration Testing<\/li>\n\n\n\n<li>INFOST 660: Information Policy<\/li>\n\n\n\n<li>INFOST 661: Information Ethics<\/li>\n\n\n\n<li>INFOST 691: Advanced Topics in Information Science &amp; Technology: (Relevant courses such as Information Security, Disinformation &amp; Social Engineering and Computer Forensics)<\/li>\n\n\n\n<li>INFOST 695: Ethical Hacking I<\/li>\n\n\n\n<li>INFOST 696: Ethical Hacking II<\/li>\n\n\n\n<li>INFOST 697: Cisco Routing &amp; Switching I<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"tab-d4xj-careers\" class=\"uwm-p-tabcontent--pane\">\n<p>The cybersecurity field is experiencing rapid growth nationally, with the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">Bureau of Labor Statistics projecting the employment of information security analysts to increase 33% through 2033<\/a> \u2014 much faster than the average for all occupations. Cybersecurity professionals play a vital role in protecting organizations from data breaches, cyberattacks and other digital threats.<\/p>\n\n\n\n<p>Graduates with a cybersecurity certificate hold job titles such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Forensic Computer Analyst<\/li>\n\n\n\n<li>Information Security Analyst<\/li>\n\n\n\n<li>Penetration Tester<\/li>\n<\/ul>\n<\/div>\n<\/div><\/div>\n\n<\/div>\n\n\n\n<div id=\"details-sidebar\" class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\">\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/community-engagement-professions\/information-studies\/cybersecurity-undergraduate-certificate\/\" target=\"_blank\" rel=\"noreferrer noopener\">Academic Catalog<\/a>\n<\/div>\n\n\n\n\n\n<div class=\"uwm-l-buttons--full\">\n<a class=\"uwm-c-button uwm-c-button--full uwm-u-mb-20\" href=\"https:\/\/catalog.uwm.edu\/course-search\/\" rel=\"\">Schedule of Classes<\/a>\n<\/div>\n\n\n\n    <button\n        data-modal-prefix-class=\"uwm-p\"\n        data-modal-content-id=\"uwm-modal-op3uv7\"\n        data-modal-title=\"\"\n        data-modal-close-text=\"Close\"\n        data-modal-close-title=\"Close\"\n        aria-haspopup=\"dialog\"\n        aria-controls=\"uwm-modal-op3uv7\"\n        class=\"uwm-p-modal--launch uwm-c-button uwm-c-button--full uwm-u-mb-20\"\n    >All Academic Resources<\/button>\n\n    \n\n<div id=\"uwm-modal-op3uv7\" class=\"hidden\"><div class=\"content_block\" id=\"custom_post_widget-2614\">\n<div class=\"uwm-l-row uwm-l-row--6\">\n<div class=\"uwm-l-col\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/\">Academic Advising<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/catalog.uwm.edu\/\">Academic Catalog<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/\">Academic Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/course-syllabi\/\">Course Syllabi<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/\">FAQs, Forms and Policies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/fieldwork-and-internship-forms\/\">Fieldwork Forms &amp; Guidelines<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-u-border-desktop--left\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/graduateschool\/students\/academic-policies-and-procedures\/masters-resources\/masters-graduation\/\">Graduate Graduation Procedures<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/graduate-orientation\/\">Graduate Orientation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_type_facet=masters%2Cdoctoral%2Ccertificate\">Graduate Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/graduateschool\/students\/academic-policies-and-procedures\/masters-resources\/masters-requirements\/\/#transfer-credit\">Graduate Transfer Credit Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/faqs-forms-and-policies\/sois-grievance-and-appeals-process\/\">Grievance and Appeals Process\/ Grade Appeal Process<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-u-border-desktop--left\">\n<ul class=\"wp-block-list uwm-c-list--cleanlist uwm-c-link--dark-no-underline\">\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/sois-information-sessions\/\">Information Sessions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/students\/it-department\/#ist-tutoring\">IST Tutoring<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/student-resources\/ccep-new-student-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">New Student Checklist<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_format_facet=online\">Online Programs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/catalog.uwm.edu\/course-search\/\">Schedule of Classes<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/?_program_type_facet=major%2Cminor%2Caccelerated-masters%2Cundergraduate-certificate\">Undergraduate Programs<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n    <div class=\"uwm-p-card uwm-p-card--color-head uwm-u-mt-40\">\n        <div class=\"uwm-p-card--title\">Contact<\/div>\n        <div class=\"uwm-p-card--body\">\n            <div class=\"uwm-p-card--content\">\n                <div class=\"content_block\" id=\"custom_post_widget-9903\">\n<p><strong>College of Community Engagement &amp; Professions<\/strong><br><a href=\"https:\/\/uwm.edu\/community-engagement-professions\/about\/student-advising-support-services\/\">Student Advising &amp; Support Services<\/a><br>Northwest Quadrant D 3800<br>414-229-4707<br><a href=\"mailto:ccep-advising@uwm.edu\">ccep-advising@uwm.edu<\/a><\/p>\n<\/div>            <\/div>\n        <\/div>\n    <\/div>\n\n<\/div>\n<\/div>\n\n    <\/div>\n<\/section>\n\n\n\t<\/div>\n<\/div>\n\n\n","protected":false},"author":3016,"parent":0,"template":"","meta":{"_acf_changed":false,"_uwm_academics_program_template":"page","_uwm_academics_program_navigation":[],"uwm_academics_program_card_image_id":0,"uwm_academics_program_banner_image_id":3035,"uwm_academics_program_sort_title":"","uwm_academics_program_external_url":"","uwm_academics_program_jump_details_btn":true,"_uwm_academics_program_exclude_from_programs_archive_page":false,"_uwm_academics_program_exclude_from_programs_block":false,"_uwm_academics_program_exclude_from_department_page":false,"footnotes":"","uwm_wg_additional_authors":[]},"program_group":[],"program_tag":[],"program_type":[20],"program_format":[42,15],"program_department":[],"class_list":["post-594","program","type-program","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>School of Information Studies<\/title>\n<meta name=\"description\" content=\"Earn an undergraduate cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Certificate\" \/>\n<meta property=\"og:description\" content=\"Earn an undergraduate cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Information Studies\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T13:40:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate\\\/\",\"name\":\"Cybersecurity Certificate - School of Information Studies | UW-Milwaukee\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#website\"},\"datePublished\":\"2022-08-23T14:20:56+00:00\",\"dateModified\":\"2026-04-24T13:40:51+00:00\",\"description\":\"Earn an undergraduate cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/cybersecurity-certificate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Academic Programs\",\"item\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/academic-programs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Certificate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\",\"name\":\"School of Information Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2-academic\\\/wp-content\\\/uploads\\\/sites\\\/542\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/0template-webid2-academic\\\/wp-content\\\/uploads\\\/sites\\\/542\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/informationstudies\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"School of Information Studies","description":"Earn an undergraduate cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Certificate","og_description":"Earn an undergraduate cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.","og_url":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/","og_site_name":"School of Information Studies","article_modified_time":"2026-04-24T13:40:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/","url":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/","name":"Cybersecurity Certificate - School of Information Studies | UW-Milwaukee","isPartOf":{"@id":"https:\/\/uwm.edu\/informationstudies\/#website"},"datePublished":"2022-08-23T14:20:56+00:00","dateModified":"2026-04-24T13:40:51+00:00","description":"Earn an undergraduate cybersecurity certificate from UW-Milwaukee. Prepare for high-demand careers in information security.","breadcrumb":{"@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/cybersecurity-certificate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/informationstudies\/"},{"@type":"ListItem","position":2,"name":"Academic Programs","item":"https:\/\/uwm.edu\/informationstudies\/academic-programs\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Certificate"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/informationstudies\/#website","url":"https:\/\/uwm.edu\/informationstudies\/","name":"School of Information Studies","description":"","publisher":{"@id":"https:\/\/uwm.edu\/informationstudies\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/informationstudies\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/informationstudies\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/informationstudies\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/informationstudies\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/0template-webid2-academic\/wp-content\/uploads\/sites\/542\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/0template-webid2-academic\/wp-content\/uploads\/sites\/542\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/informationstudies\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program"}],"about":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/types\/program"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/users\/3016"}],"version-history":[{"count":31,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/594\/revisions"}],"predecessor-version":[{"id":10718,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program\/594\/revisions\/10718"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/media?parent=594"}],"wp:term":[{"taxonomy":"program_group","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_group?post=594"},{"taxonomy":"program_tag","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_tag?post=594"},{"taxonomy":"program_type","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_type?post=594"},{"taxonomy":"program_format","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_format?post=594"},{"taxonomy":"program_department","embeddable":true,"href":"https:\/\/uwm.edu\/informationstudies\/wp-json\/wp\/v2\/program_department?post=594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}