{"id":13472,"date":"2020-10-20T08:54:19","date_gmt":"2020-10-20T14:54:19","guid":{"rendered":"https:\/\/www.petersons.com\/blog\/?p=13472"},"modified":"2020-10-21T13:07:22","modified_gmt":"2020-10-21T19:07:22","slug":"cybersecurity-graduates-secure-their-own-future","status":"publish","type":"post","link":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/","title":{"rendered":"Cybersecurity Graduates Secure Their Own Future"},"content":{"rendered":"<p><b><\/b> <i><span style=\"font-weight: 400;\">* The following custom content is sponsored by Rider University.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">No matter the industry, one of the most valuable assets a company possesses is data. Whether it\u2019s customers\u2019 bank account numbers, credit card details, or PII (personally identifiable information), such as name, social security number, or email address, hackers, both foreign and domestic, serve as a constant threat to data security. Cybersecurity professionals defend data, computers, mobile devices, servers, networks, and electronic systems from the constant risk of malicious attacks.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Cybersecurity threats<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">According to Dr. Elizabeth Hawthorne, Program Director and Lecturer in Cybersecurity at <\/span><a href=\"https:\/\/www.petersons.com\/college-search\/rider-university-000_10000114.aspx\"><span style=\"font-weight: 400;\">Rider University<\/span><\/a><span style=\"font-weight: 400;\">, the biggest cybersecurity threats today are various forms of ransomware, including denial of service. \u201cCyber criminals lock up computing systems and individual computers until a ransom is paid for the code to unlock it. It\u2019s cyber-extortion.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other forms of ransomware include Distributed Denial of Service (DDoS) where websites are taken offline unless a ransom is paid, and data breaches where confidential data is disclosed until a ransom is paid. All forms of ransomware can cause devastating consequences to a business and are often carried out using a Trojan horse disguised as a legitimate file that is unsuspectingly downloaded most often as an email attachment. Sometimes even opening or previewing an email can trigger ransomware to infect a computer network.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Skills needed to protect data\u00a0\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You may have a passion for all things data-oriented, but do you have what it takes to excel in cybersecurity? Those who seek to work in cybersecurity require problem-solving skills, technical aptitude, attention to detail, good communication skills, fundamental computer forensics skills, a strong knowledge of security across various platforms, an understanding of hacking, and a desire to learn.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe field of cybersecurity is interdisciplinary and multifaceted,\u201d Dr. Hawthorne said. \u201cIt requires different skills for different job functions.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rider\u2019s B.S. in Cybersecurity program offers students two different academic tracks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>technical track<\/b><span style=\"font-weight: 400;\"> was designed for students who are passionate about problem-solving and creating large-scale strategies. This track features coursework related to designing, building, and implementing network and computer security.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>policy track<\/b><span style=\"font-weight: 400;\"> is geared toward analytical thinkers interested in risk-management and the laws that surround the protection of an organization&#8217;s information networks and systems. This track focuses on policy, cybersecurity law and the legal and ethical implications involved in cybersecurity investigations.\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Career Opportunities in Cybersecurity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cybersecurity experts are in high demand, with <\/span><span style=\"font-weight: 400;\">job opportunities in the field projected to grow 28 percent from 2019 to 2029, according to the U.S. Bureau of Labor Statistics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAccording to the annual <\/span><a href=\"https:\/\/cybersecurityventures.com\/jobs\/\"><span style=\"font-weight: 400;\">cybersecurity jobs report<\/span><\/a><span style=\"font-weight: 400;\"> by Cybersecurity Ventures, there is a 3.5 million global workforce shortage projected into 2021,\u201d Dr. Hawthorne said. \u201cBecause of this urgent talent crunch and the global pandemic, the job outlook for cybersecurity is excellent!\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just about all industries have a high demand for cybersecurity professionals. The government, financial, and healthcare industries have the greatest demand because of the high risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cA degree in cybersecurity will broaden your cybersecurity career options, such as being prepared for higher level management, analysts, and cryptology positions,\u201d said Dr. Hawthorne.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rider offers an array of degree options for those looking to pursue a career in cybersecurity. In addition to its on-campus undergraduate major, Rider also offers a <\/span><a href=\"https:\/\/www.rider.edu\/academics\/colleges-schools\/college-liberal-arts-education-sciences\/science-programs\/cybersecurity?utm_medium=website&amp;utm_source=petersons&amp;utm_campaign=cybersecurity&amp;utm_content=bachelors\"><span style=\"font-weight: 400;\">100% online Bachelor\u2019s of Science degree in Cybersecurity<\/span><\/a><span style=\"font-weight: 400;\"> for busy adults. For those looking to complete a graduate degree, Rider offers accelerated degree programs so students can earn a <\/span><a href=\"https:\/\/www.rider.edu\/academics\/colleges-schools\/college-liberal-arts-education-sciences\/science-programs\/computer-science-physics\/ms-cybersecurity?utm_medium=website&amp;utm_source=petersons&amp;utm_campaign=cybersecurity&amp;utm_content=masters\"><span style=\"font-weight: 400;\">M.S. in Cybersecurity <\/span><\/a><span style=\"font-weight: 400;\">in just one additional year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rider\u2019s Career Development and Success staff supports its students in developing a professional network, including hosting a variety of on-campus and virtual job fairs, resume development, and advertising internships.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIn collaboration with our faculty, we work with students to find meaningful opportunities that will launch our students on the path to a fulfilling career,\u201d said Dr. Hawthorne.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Women in cybersecurity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Although increasing in recent numbers, women are critically underrepresented in the field of cybersecurity. According to the nonprofit organization, <\/span><a href=\"https:\/\/www.wicys.org\/\"><span style=\"font-weight: 400;\">Women in Cybersecurity<\/span><\/a><span style=\"font-weight: 400;\">, women comprise only 13 percent of the cybersecurity field.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re a woman looking to pursue a degree in cybersecurity, Dr. Hawthorne offers this advice: \u201cFollow your cyber dream, attend the annual <\/span><a href=\"https:\/\/www.wicys.org\/\"><span style=\"font-weight: 400;\">Women in Cybersecurity conference<\/span><\/a><span style=\"font-weight: 400;\">, and find a female mentor.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">RELATED: <\/span><a href=\"https:\/\/www.petersons.com\/blog\/cybersecurity-majors-are-in-high-demand\/\"><span style=\"font-weight: 400;\">Cybersecurity Majors Are in High Demand<\/span><\/a><\/p>\n<p><i><span style=\"font-weight: 400;\">For more information about cybersecurity programs, check out Peterson\u2019s <\/span><\/i><a href=\"https:\/\/www.petersons.com\/college-search.aspx\"><i><span style=\"font-weight: 400;\">college search tool<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.\u00a0<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>* The following custom content is sponsored by Rider University. No matter the industry, one of the most valuable assets a company possesses is data. Whether it\u2019s customers\u2019 bank account numbers, credit card details, or PII (personally identifiable information), such as name, social security number, or email address, hackers, both foreign and domestic, serve as<\/p>\n","protected":false},"author":36,"featured_media":13477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[3942,3,5],"tags":[1797,5096,5123,5142,5122,5141,5097],"class_list":{"0":"post-13472","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-career-prep","8":"category-colleges","9":"category-grad-schools","10":"tag-career-development","11":"tag-cybersecurity","12":"tag-cybersecurity-career","13":"tag-cybersecurity-degree","14":"tag-cybersecurity-jobs","15":"tag-cybersecurity-professionals","16":"tag-data-protection"},"better_featured_image":{"id":13477,"alt_text":"","caption":"Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming","description":"","media_type":"image","media_details":{"width":2309,"height":1299,"file":"2020\/10\/iStock-1194430863.jpg","sizes":{"medium":{"file":"iStock-1194430863-300x169.jpg","width":300,"height":169,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-300x169.jpg"},"large":{"file":"iStock-1194430863-1024x576.jpg","width":1024,"height":576,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-1024x576.jpg"},"thumbnail":{"file":"iStock-1194430863-150x150.jpg","width":150,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-150x150.jpg"},"1536x1536":{"file":"iStock-1194430863-1536x864.jpg","width":1536,"height":864,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-1536x864.jpg"},"2048x2048":{"file":"iStock-1194430863-2048x1152.jpg","width":2048,"height":1152,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-2048x1152.jpg"},"post-thumbnail":{"file":"iStock-1194430863-270x180.jpg","width":270,"height":180,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-270x180.jpg"},"contentberg-main":{"file":"iStock-1194430863-770x515.jpg","width":770,"height":515,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-770x515.jpg"},"contentberg-main-full":{"file":"iStock-1194430863-1170x508.jpg","width":1170,"height":508,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-1170x508.jpg"},"contentberg-slider-stylish":{"file":"iStock-1194430863-900x515.jpg","width":900,"height":515,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-900x515.jpg"},"contentberg-slider-carousel":{"file":"iStock-1194430863-370x370.jpg","width":370,"height":370,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-370x370.jpg"},"contentberg-slider-grid-b":{"file":"iStock-1194430863-554x466.jpg","width":554,"height":466,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-554x466.jpg"},"contentberg-slider-grid-b-sm":{"file":"iStock-1194430863-306x466.jpg","width":306,"height":466,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-306x466.jpg"},"contentberg-slider-bold-sm":{"file":"iStock-1194430863-150x150.jpg","width":150,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-150x150.jpg"},"contentberg-grid":{"file":"iStock-1194430863-370x245.jpg","width":370,"height":245,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-370x245.jpg"},"contentberg-list":{"file":"iStock-1194430863-260x200.jpg","width":260,"height":200,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-260x200.jpg"},"contentberg-list-b":{"file":"iStock-1194430863-370x305.jpg","width":370,"height":305,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-370x305.jpg"},"contentberg-thumb":{"file":"iStock-1194430863-87x67.jpg","width":87,"height":67,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-87x67.jpg"},"contentberg-thumb-alt":{"file":"iStock-1194430863-150x150.jpg","width":150,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863-150x150.jpg"}},"image_meta":{"aperture":"0","credit":"Getty Images\/iStockphoto","camera":"","caption":"Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming","created_timestamp":"0","copyright":"Gorodenkoff Productions OU (Gorodenkoff Productions OU (Photographer) - [None]","focal_length":"0","iso":"0","shutter_speed":"0","title":"Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming","orientation":"1","keywords":["using"]}},"post":13472,"source_url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Graduates Secure Their Own Future | Careers<\/title>\n<meta name=\"description\" content=\"No matter the industry, one of the most valuable assets a company possesses is data. Learn about the growing demand for cybersecurity graduates now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Graduates Secure Their Own Future | Careers\" \/>\n<meta property=\"og:description\" content=\"No matter the industry, one of the most valuable assets a company possesses is data. Learn about the growing demand for cybersecurity graduates now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Peterson&#039;s\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/petersons\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-20T14:54:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-21T19:07:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2309\" \/>\n\t<meta property=\"og:image:height\" content=\"1299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kathy Staples\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Petersons\" \/>\n<meta name=\"twitter:site\" content=\"@Petersons\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kathy Staples\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Graduates Secure Their Own Future | Careers","description":"No matter the industry, one of the most valuable assets a company possesses is data. Learn about the growing demand for cybersecurity graduates now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Graduates Secure Their Own Future | Careers","og_description":"No matter the industry, one of the most valuable assets a company possesses is data. Learn about the growing demand for cybersecurity graduates now!","og_url":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/","og_site_name":"Peterson&#039;s","article_publisher":"https:\/\/www.facebook.com\/petersons","article_published_time":"2020-10-20T14:54:19+00:00","article_modified_time":"2020-10-21T19:07:22+00:00","og_image":[{"width":2309,"height":1299,"url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg","type":"image\/jpeg"}],"author":"Kathy Staples","twitter_card":"summary_large_image","twitter_creator":"@Petersons","twitter_site":"@Petersons","twitter_misc":{"Written by":"Kathy Staples","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#article","isPartOf":{"@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/"},"author":{"name":"Kathy Staples","@id":"https:\/\/www.petersons.com\/blog\/#\/schema\/person\/ebeb8b19c39781232f53f3846468cfc6"},"headline":"Cybersecurity Graduates Secure Their Own Future","datePublished":"2020-10-20T14:54:19+00:00","dateModified":"2020-10-21T19:07:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/"},"wordCount":720,"image":{"@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#primaryimage"},"thumbnailUrl":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg","keywords":["career development","cybersecurity","cybersecurity career","cybersecurity degree","cybersecurity jobs","cybersecurity professionals","data protection"],"articleSection":["Career Prep","Colleges","Grad Schools"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/","url":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/","name":"Cybersecurity Graduates Secure Their Own Future | Careers","isPartOf":{"@id":"https:\/\/www.petersons.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#primaryimage"},"image":{"@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#primaryimage"},"thumbnailUrl":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg","datePublished":"2020-10-20T14:54:19+00:00","dateModified":"2020-10-21T19:07:22+00:00","author":{"@id":"https:\/\/www.petersons.com\/blog\/#\/schema\/person\/ebeb8b19c39781232f53f3846468cfc6"},"description":"No matter the industry, one of the most valuable assets a company possesses is data. Learn about the growing demand for cybersecurity graduates now!","breadcrumb":{"@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#primaryimage","url":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg","contentUrl":"https:\/\/wp-media.petersons.com\/blog\/wp-content\/uploads\/2020\/10\/13172000\/iStock-1194430863.jpg","width":2309,"height":1299,"caption":"Smart Female IT Programer Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals Doing Code Programming"},{"@type":"BreadcrumbList","@id":"https:\/\/www.petersons.com\/blog\/cybersecurity-graduates-secure-their-own-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.petersons.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Colleges","item":"https:\/\/www.petersons.com\/blog\/category\/colleges\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Graduates Secure Their Own Future"}]},{"@type":"WebSite","@id":"https:\/\/www.petersons.com\/blog\/#website","url":"https:\/\/www.petersons.com\/blog\/","name":"Peterson&#039;s","description":"Peterson&#039;s helps students discover their best fit educational program","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.petersons.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.petersons.com\/blog\/#\/schema\/person\/ebeb8b19c39781232f53f3846468cfc6","name":"Kathy Staples","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c97df4e27b57e34b825a96e1960feaadc6999d5fbdcb07eb611b9e33dbce76f9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c97df4e27b57e34b825a96e1960feaadc6999d5fbdcb07eb611b9e33dbce76f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c97df4e27b57e34b825a96e1960feaadc6999d5fbdcb07eb611b9e33dbce76f9?s=96&d=mm&r=g","caption":"Kathy Staples"},"sameAs":["http:\/\/petersons.com\/blog"],"url":"https:\/\/www.petersons.com\/blog\/author\/kathy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/posts\/13472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/comments?post=13472"}],"version-history":[{"count":9,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/posts\/13472\/revisions"}],"predecessor-version":[{"id":15768,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/posts\/13472\/revisions\/15768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/media\/13477"}],"wp:attachment":[{"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/media?parent=13472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/categories?post=13472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.petersons.com\/blog\/wp-json\/wp\/v2\/tags?post=13472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}