GET /api/v1/descriptions/291112/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 291112,
"description_type": {
"id": 5,
"name": "Source Catalog Curriculum"
},
"description": "<h1>Degree Requirements</h1><div><section><header data-test=\"grouping-0-header\"><div><h2 data-testid=\"grouping-label\"><span>Required Courses</span></h2></div><div><span>30 - 34</span><span>Total Credits</span></div><div><div><button aria-label=\"Collapse\"><i></i></button></div></div></header><div><div><ul><li><span>Complete <!-- -->all<!-- --> of the following</span><ul><li data-test=\"ruleView-A\"><div data-test=\"ruleView-A-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a6ca38edf7b4f3ec2d0\" target=\"_blank\">COP3502C</a> <!-- -->-<!-- --> <!-- -->Computer Science I<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4d00f827681a140d4e\" target=\"_blank\">CIS3360</a> <!-- -->-<!-- --> <!-- -->Security in Computing<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4de6bc790e9573e462\" target=\"_blank\">CIS3362</a> <!-- -->-<!-- --> <!-- -->Cryptography and Information Security<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4d5a158326529e6c66\" target=\"_blank\">CIS4615</a> <!-- -->-<!-- --> <!-- -->Secure Software Development and Assurance<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a53a38edf55ad3ec292\" target=\"_blank\">CIS4940C</a> <!-- -->-<!-- --> <!-- -->Topics in Cybersecurity<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a2ba8d2fb5b8a2d8042\" target=\"_blank\">CAP4145</a> <!-- -->-<!-- --> <!-- -->Introduction to Malware Analysis<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-B\"><div data-test=\"ruleView-B-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/654135bf02bb85af2f36957f\" target=\"_blank\">COT3100C</a> <!-- -->-<!-- --> <!-- -->Introduction to Discrete Structures<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca7fb85ada37282dec9f18\" target=\"_blank\">MAD2104</a> <!-- -->-<!-- --> <!-- -->Foundations of Discrete Math<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-C\"><div data-test=\"ruleView-C-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a6f714b5fb1e7521ffa\" target=\"_blank\">COP4600</a> <!-- -->-<!-- --> <!-- -->Operating Systems<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a44a8d2fb2ee62d807f\" target=\"_blank\">CGS3763</a> <!-- -->-<!-- --> <!-- -->Operating System Concepts<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-D\"><div data-test=\"ruleView-D-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a66a8d2fbcf242d80a6\" target=\"_blank\">CNT4704</a> <!-- -->-<!-- --> <!-- -->Analysis of Computer Communication Networks<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b476b6b62608a400131\" target=\"_blank\">EEL4781</a> <!-- -->-<!-- --> <!-- -->Computer Communication Networks<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><div><span>Select one of the following sequences of courses:</span><li><span>Complete <!-- -->1<!-- --> of the following</span><ul><li data-test=\"ruleView-E.1\"><div data-test=\"ruleView-E.1-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a3c00f827fb2e140d21\" target=\"_blank\">CDA3103C</a> <!-- -->-<!-- --> <!-- -->Computer Logic and Organization<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b46a38edfa48b3ec3fe\" target=\"_blank\">EEL4768</a> <!-- -->-<!-- --> <!-- -->Computer Architecture<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-E.5\"><div data-test=\"ruleView-E.5-result\"><div>Or</div></div></li><li data-test=\"ruleView-E.2\"><div data-test=\"ruleView-E.2-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/66e8294c3d626926fa0d36be\" target=\"_blank\">EEL3801C</a> <!-- -->-<!-- --> <!-- -->Computer Organization<!-- --> <span style=\"margin-left:5px\">(4)</span></span></li><li><span><a href=\"#/courses/view/60ca6b46a38edfa48b3ec3fe\" target=\"_blank\">EEL4768</a> <!-- -->-<!-- --> <!-- -->Computer Architecture<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-E.4\"><div data-test=\"ruleView-E.4-result\"><div>Or</div></div></li><li data-test=\"ruleView-E.3\"><div data-test=\"ruleView-E.3-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a4300f827ca80140d2f\" target=\"_blank\">CGS3269</a> <!-- -->-<!-- --> <!-- -->Computer Architecture Concepts<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li></ul></li></div></ul></li></ul></div></div></section><section><header data-test=\"grouping-1-header\"><div><h2 data-testid=\"grouping-label\"><span>Restricted Electives</span></h2></div><div><span>9</span><span>Total Credits</span></div><div><div><button aria-label=\"Collapse\"><i></i></button></div></div></header><div><div><ul><li data-test=\"ruleView-A\"><div data-test=\"ruleView-A-result\">Earn at least <span>9</span> credits from the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a2ba38edf73bb3ec207\" target=\"_blank\">CAP3104</a> <!-- -->-<!-- --> <!-- -->Foundations of HCI<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4da38edf17483ec27f\" target=\"_blank\">CIS4203C</a> <!-- -->-<!-- --> <!-- -->Digital Forensics<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/61a5438927cb919f010b663f\" target=\"_blank\">CIS4524</a> <!-- -->-<!-- --> <!-- -->Managing IT Integration<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a6ba38edfae563ec2ca\" target=\"_blank\">CNT4714</a> <!-- -->-<!-- --> <!-- -->Enterprise Computing<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a6d6b6b6267c8400088\" target=\"_blank\">COP3402</a> <!-- -->-<!-- --> <!-- -->Systems Software<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b3102fd3a74276d840a\" target=\"_blank\">EEE4346C</a> <!-- -->-<!-- --> <!-- -->Hardware Security and Trusted Circuit Design<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b4602fd3a473f6d8425\" target=\"_blank\">EEL4783</a> <!-- -->-<!-- --> <!-- -->Hardware Description Languages in Digital Systems Design<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b4a00f82712b7140e82\" target=\"_blank\">EEL5722C</a> <!-- -->-<!-- --> <!-- -->Field-Programmable Gate Array (FPGA) Design<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/618ad5bec271b5c747038e61\" target=\"_blank\">CIS4364</a> <!-- -->-<!-- --> <!-- -->Cyber Defense Analysis<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li></ul></div></div></section><h3>Grand Total Credits:<!-- --> <strong>39 - 43</strong></h3></div><h3><br />Foreign Language Requirements</h3> <hr /> <ul> <li> <p>None</p> </li> </ul> <h2><br /><br />Total Undergraduate Credit Hours Required: 39</h2> <hr /> <h3><br /><br />Other Requirements</h3> <hr /> <ul> <li>A grade of "C" (2.0) or better is required in each course toward this certificate.</li> <li>A student may not earn both the Cyber Operations Certificate and the Secure Computing and Networks Minor.</li> <li>Total hours required may vary based on courses selected to meet requirements.</li> </ul>",
"primary": false,
"program": 1047
}