GET /api/v1/descriptions/249109/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 249109,
"description_type": {
"id": 5,
"name": "Source Catalog Curriculum"
},
"description": "<h1>Program Prerequisites</h1><h1>Degree Requirements</h1><div><section><header data-test=\"grouping-0-header\"><div><h2 data-testid=\"grouping-label\"><span>Required Courses</span></h2></div><div><span>15</span><span>Total Credits</span></div><div><div><button aria-label=\"Collapse\"><i></i></button></div></div></header><div><div><ul><li><span>Complete <!-- -->all<!-- --> of the following</span><ul><li data-test=\"ruleView-A\"><div data-test=\"ruleView-A-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6be1714b5f52595222a4\" target=\"_blank\">IDC5602</a> <!-- -->-<!-- --> <!-- -->Cybersecurity: A Multidisciplinary Approach<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6be100f827a22214102b\" target=\"_blank\">IDC6600</a> <!-- -->-<!-- --> <!-- -->Emerging Cyber Issues<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6be15a15837a779e6d8e\" target=\"_blank\">IDC6601</a> <!-- -->-<!-- --> <!-- -->Behavioral Aspects of Cybersecurity<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6be100f827415414102e\" target=\"_blank\">IDC6941</a> <!-- -->-<!-- --> <!-- -->Capstone in Modeling and Simulation of Behavioral Cybersecurity<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-B\"><div data-test=\"ruleView-B-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a4de6bc796b1a73e461\" target=\"_blank\">CIS6395</a> <!-- -->-<!-- --> <!-- -->Incident Response Technologies<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a64a38edf61d53ec2bd\" target=\"_blank\">CNT5410L</a> <!-- -->-<!-- --> <!-- -->Cyber Operations Lab<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li></ul></li></ul></div></div></section><h3>Grand Total Credits:<!-- --> <strong>15</strong></h3></div><h1>Financial Information</h1><h1>Fellowship Information</h1><p>The Graduate Certificate in Modeling and Simulation of Behavioral Cybersecurity provides students with an interdisciplinary modeling and simulation approach to cybersecurity with a particular emphasis on the behavioral aspects of cybersecurity and cyber operations.</p> <br /> <p>This graduate certificate is beneficial to individuals who have an interest in interdisciplinary studies and problem-solving for modeling, simulation, and behavioral aspects of cybersecurity.</p> <br /> <p><strong>UCF Partnerships</strong></p> <p>The Modeling and Simulation of Behavioral Cybersecurity certificate partners with several UCF master's programs. If students complete the certificate and are accepted into a partnering program, all certificate coursework can be used toward that master's degree. Here is a list of our partnering UCF master's programs:</p> <ul> <li><a href=\"#/programs/B1LoRxOsO?bc=true&bcCurrent=Computer%20Engineering%20MSCpE&bcGroup=College%20of%20Engineering%20and%20Computer%20Science&bcItemType=programs\">Computer Engineering MSCpE</a></li> <li><a href=\"#/programs/BkenClOjO?bc=true&bcCurrent=Industrial%20Engineering%20MS&bcGroup=College%20of%20Engineering%20and%20Computer%20Science&bcItemType=programs\">Industrial Engineering MS</a></li> <li><a href=\"#/programs/B1IiCx_oO?bc=true&bcCurrent=Modeling%20and%20Simulation%20MS&bcGroup=College%20of%20Graduate%20Studies&bcItemType=programs\">Modeling and Simulation MS</a></li> <li><a href=\"#/programs/Hk7CQJZdju?bc=true&bcCurrent=Cyber%20Security%20and%20Privacy%20MS&bcGroup=College%20of%20Engineering%20and%20Computer%20Science&bcItemType=programs\">Cyber Security and Privacy MS</a></li> </ul>",
"primary": false,
"program": 2068
}