{"id":13,"date":"2019-10-08T16:07:53","date_gmt":"2019-10-08T16:07:53","guid":{"rendered":"https:\/\/stage.in.nau.edu\/cybersecurity\/?page_id=13"},"modified":"2022-02-21T16:42:07","modified_gmt":"2022-02-21T16:42:07","slug":"graduate-courses","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/cybersecurity\/graduate-courses\/","title":{"rendered":"Graduate Courses"},"content":{"rendered":"<h1>Graduate Courses<\/h1>\n<h3>PHY599: \u201cQuantum and Post Quantum Cryptography\u201d<\/h3>\n\n\n<!-- shortcode-tab -->\n<div class='shortcode-tab-container tab-count-3'>\n    <ul class='tabs'>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Description_1\">\n                <div class=\"shortcode-tab-header selected\">\n                    <h4>\n                        Course Description <span class=\"screen-reader-text\">Tab Open<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Requirements_2\">\n                <div class=\"shortcode-tab-header \">\n                    <h4>\n                        Course Requirements <span class=\"screen-reader-text\">Tab Closed<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Materials_3\">\n                <div class=\"shortcode-tab-header \">\n                    <h4>\n                        Course Materials <span class=\"screen-reader-text\">Tab Closed<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n            <\/ul>\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion \" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Description_1\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Description <span class=\"screen-reader-text\">Accordion Open<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p>Study of emerging methods, techniques, and research areas in cryptography that use quantum effects for key distribution, and the study of novel asymmetrical cryptographic methods currently under development to protect cyber physical systems, which will mitigate attacks from quantum computers.<\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Requirements_2\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Requirements <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p>One of the following: Elements of cryptography, nanotechnologies for cybersecurity, quantum physics and computing.<\/p>\n<p>Graduate Status or Override from Dr. Cambou<\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Materials_3\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Materials <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2022\/02\/PHY599-Spring-2022.docx\">Syllabus : PHY599 Spring 2022<\/a><\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n    <\/div>\n\n<p>&nbsp;<\/p>\n<h3>INF638:\u00a0\u201cElements of Cryptography and Public Key Infrastructure\u00a0(PKI)\u201d<\/h3>\n\n\n<!-- shortcode-tab -->\n<div class='shortcode-tab-container tab-count-3'>\n    <ul class='tabs'>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Description_1\">\n                <div class=\"shortcode-tab-header selected\">\n                    <h4>\n                        Course Description <span class=\"screen-reader-text\">Tab Open<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Requirements_2\">\n                <div class=\"shortcode-tab-header \">\n                    <h4>\n                        Course Requirements <span class=\"screen-reader-text\">Tab Closed<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Materials_3\">\n                <div class=\"shortcode-tab-header \">\n                    <h4>\n                        Course Materials <span class=\"screen-reader-text\">Tab Closed<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n            <\/ul>\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion \" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Description_1\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Description <span class=\"screen-reader-text\">Accordion Open<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p>The course describes&nbsp;symmetrical cryptographic methods&nbsp;(DES, and AES),&nbsp;asymmetrical cryptographic methods, and&nbsp;Diffie-Hellman&nbsp;based PKI&nbsp;(RSA, elliptic curve cryptography). The elements&nbsp;of&nbsp;mathematics&nbsp;important to cryptography&nbsp;are&nbsp;presented&nbsp;(number theory,&nbsp;Galois fields,&nbsp;Euclidian algorithms, Euler-Fermat theorems, fast exponential algorithms,&nbsp;and the&nbsp;formation of cyclic groups for ECC).&nbsp;Recent developments in&nbsp;cryptography are&nbsp;also&nbsp;presented:&nbsp;quantum&nbsp;key distribution&nbsp;(QKD),&nbsp;post quantum cryptography (ex. Shor algorithms),&nbsp;blockchain technology,&nbsp;digital signatures, and&nbsp;hash&nbsp;based&nbsp;cryptography (Lamport, HORS,&nbsp;Winternitz, Merkel Trees).<\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Requirements_2\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Requirements <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p>Graduate Status or Override from Dr. Cambou<\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Materials_3\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Materials <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/1-Definitions-20.pdf\">1 &mdash; Definitions (20)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/2-Introduction-Number-theory-full.pdf\">2&ndash; Introduction Number theory (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/3-Early-cryptographic-methods-full.pdf\">3&ndash; Early cryptograph<\/a><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/3-Early-cryptographic-methods-full.pdf\">ic methods (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/4-DES-Full.pdf\">4&ndash; DES (Full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/5A-Math-for-AES-full.pdf\">5A&ndash; Math for AES (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/5B-AES-algorithm-full.pdf\">5B&mdash;AES algorithm (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/6A-Quantum-Cryptography-QKD-Full.pdf\">6A- Quantum Cryptography-QKD (Full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/6B-Quantum-ComputingFull.pdf\">6B- Quantum Computing(Full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/6C-Post-Quantum-Cryptofull.pdf\">6C- Post Quantum Crypto(full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/8A-Math-for-RSA-full.pdf\">8A- Math for RSA (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/8B-RSA-crypto-full.pdf\">8B- RSA crypto (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/9A-ECC-prime-fields-full.pdf\">9A- ECC prime fields (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/9B-ECC-extended-fields-full.pdf\">9B- ECC extended fields (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/10-PKI-Digital-signatures-full.pdf\">10 PKI &amp; Digital signatures (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/Homework-INF638-1-10B.docx\">Homework INF638 1-10B<\/a><\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n    <\/div>\n\n<p>&nbsp;<\/p>\n<h3>INF639:\u00a0\u201cNanomaterials and Nanoelectronics for Cybersecurity\u201d<\/h3>\n\n<!-- shortcode-tab -->\n<div class='shortcode-tab-container tab-count-3'>\n    <ul class='tabs'>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Description_1\">\n                <div class=\"shortcode-tab-header selected\">\n                    <h4>\n                        Course Description <span class=\"screen-reader-text\">Tab Open<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Requirements_2\">\n                <div class=\"shortcode-tab-header \">\n                    <h4>\n                        Course Requirements <span class=\"screen-reader-text\">Tab Closed<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n                <li class=\"tab\">\n            <a class=\"shortcode-tab__trigger\" href=\"#\" data-header=\"Course Materials_3\">\n                <div class=\"shortcode-tab-header \">\n                    <h4>\n                        Course Materials <span class=\"screen-reader-text\">Tab Closed<\/span>\n                    <\/h4>\n                <\/div>\n            <\/a>\n        <\/li>\n            <\/ul>\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion \" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Description_1\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Description <span class=\"screen-reader-text\">Accordion Open<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p>This&nbsp;course&nbsp;presents&nbsp;elements of nanotechnologies and several&nbsp;nanoelectronic&nbsp;components&nbsp;(MOSFET, SRAM cell, DRAM cell, Flash cell, Resistive RAM cells,&nbsp;memristors,&nbsp;and Sensors). The design and use of secure elements and their related security limitations under side-channel attacks&nbsp;are presented.&nbsp;This course&nbsp;also&nbsp;reviews, in detail, the&nbsp;design of True Random Number Generators&nbsp;(TRNGs), and physically unclonable functions (PUF)&nbsp;from&nbsp;nanoelectronic&nbsp;devices.&nbsp;The cryptographic protocols exploiting nanomaterials&nbsp;that are&nbsp;presented include: password generators, password managers,&nbsp;public key exchange for PKI and DSA, keyless encryption, noise induced encryption, and&nbsp;hash-based&nbsp;cryptography.<\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Requirements_2\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Requirements <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p>Graduate Status or Override from Dr. Cambou<\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n        <!-- shortcode-accordion -->\n<div class=\"shortcode-accordion shortcode-accordion--closed\" style=\"position: relative;\" >\n        <a class=\"shortcode-accordion__trigger\" data-header=\"Course Materials_3\" href=\"#\">\n      <div class=\"shortcode-accordion__header\">\n          <h4>Course Materials <span class=\"screen-reader-text\">Accordion Closed<\/span><\/h4>\n          <span class=\"shortcode-accordion__header__arrow\"><\/span>\n      <\/div>\n    <\/a>\n    <div class=\"shortcode-accordion__body\">\n        <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body>\n\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/1-Micro-to-nanoelectronics-full1.pdf\">Micro to nanoelectronics<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/2-Intro.-to-cryptography-full.pdf\">Intro. to cryptography<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/3-Public-Key-cryptography-full.pdf\">Public Key cryptography<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/6-MOS-transistor-logic-circuits-full.pdf\">6 &ndash; MOS transistor &ndash; logic circuits<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/8-1-PUF-architecture-full.pdf\">8-1 PUF architecture<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/8-2-Early-PUF-designs-full.pdf\">8-2 Early PUF designs<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/8-3-Memory-PUF-full.pdf\">8-3 Memory PUF<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/02\/8-4-TRNGs-full.pdf\">8-4 TRNGs<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/9-1-Access-control-Introduction-full.pdf\">9-1 Access control &ndash; Introduction (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/9-2-Access-control-PUF-enhanced-full.pdf\">9-2 Access control &ndash; PUF enhanced (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/11-1-Resistive-RAM-Technology-full.pdf\">11-1 Resistive RAM &ndash; Technology (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/11-2-Resistive-RAM-Security-full.pdf\">11-2 Resistive RAM &ndash; Security (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/12-1-PKI-key-disctribution-full.pdf\">12-1 PKI key distribution (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/12-2-PKI-Correcting-schemes-full.pdf\">12-2 PKI Correcting schemes (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/12-3-PQC-with-PUFs-full.pdf\">12-3 PQC with PUFs (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/12-4-Blockchains-with-PUFs-full.pdf\">12-4 Blockchains with PUFs (full)<\/a><\/p>\n<p><a href=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/223\/2021\/04\/Homework1-12.639.docx\">Homework(1-12).639<\/a><\/p>\n\n\n    <\/body><\/html>\n\n    <\/div>\n<\/div>\n\n    <\/div>\n<\/p>\n<!-- shortcode-right-column -->\n<div class=\"shortcode-right-column\" >\n    <div class=\"shortcode-right-column__container\"><br \/>\n<!-- shortcode-contact -->\n<div class=\"shortcode-contact\">\n    <div class=\"contact-header\">\n        <h3>Contact Cybersecurity<\/h3>\n    <\/div>\n    <div class=\"contact-body\">\n                <a href=\"mailto:ian.burke@nau.edu\" aria-label=\"Contact Cybersecurity: Email Address\" title=\"Email Address\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Email:<\/span>\n            <\/div>\n            <div class=\"contact-email\">ian.burke&#8203;@nau.edu<\/div>\n        <\/a>\n                        <a href=\"tel:928-523-0101\" aria-label=\"Contact Cybersecurity: Telephone Number\" title=\"Telephone Number\">\n            <div class=\"contact-icon-container\">\n                <i class=\"fas fa-phone\" aria-hidden=\"true\"><\/i>\n                <span class=\"sr-only\">Call:<\/span>\n            <\/div>\n            <div class=\"contact-phone\">928-523-0101<\/div>\n        <\/a>\n            <\/div>\n<\/div>\n\n<br \/>\n<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Graduate Courses PHY599: \u201cQuantum and Post Quantum Cryptography\u201d &nbsp; INF638:\u00a0\u201cElements of Cryptography and Public Key Infrastructure\u00a0(PKI)\u201d &nbsp; INF639:\u00a0\u201cNanomaterials and Nanoelectronics for Cybersecurity\u201d<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":8,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":449,"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/pages\/13\/revisions\/449"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/cybersecurity\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}