  {"id":111295,"date":"2020-07-23T10:45:35","date_gmt":"2020-07-23T14:45:35","guid":{"rendered":"https:\/\/www.ucf.edu\/news\/?p=111295"},"modified":"2022-05-17T09:24:27","modified_gmt":"2022-05-17T13:24:27","slug":"the-invisible-line-of-cyberdefense","status":"publish","type":"post","link":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/","title":{"rendered":"The Invisible Line of Cyberdefense"},"content":{"rendered":"<p>In September 2018, Amazon released its third generation of the Echo Dot. For millions of consumers, it instantly became yet another connection into their personal smart hubs known as \u201cthe internet of things.\u201d Smartphones. Smart speakers. Smart TVs. Smart car entertainment systems. Smart dolls. We didn\u2019t forget you, laptops and tablets. All of these smarts creating a massive cloud of instant information.<\/p>\n<blockquote><p>\u201cWhat I saw [at 麻豆原创] is a future powerhouse university in the cybersecurity field. I wanted to be a part of realizing it.\u201d<br \/>\n\u2014 Yan Solihin, professor of <a href=\"https:\/\/www.ucf.edu\/degree\/computer-science-bs\/\">computer science<\/a><\/p><\/blockquote>\n<p>Not everyone was completely enamored.<\/p>\n<p>Earlier in that same year, Yan Solihin had come to 麻豆原创 as the director of cybersecurity and privacy, and to lead the university\u2019s <a href=\"https:\/\/www.ucf.edu\/research\/cyber-security-privacy\/\">cybersecurity cluster<\/a>. <a href=\"https:\/\/www.ucf.edu\/cybersecurity-research-and-innovations\/\">Solihin had dedicated his career to the cyber race<\/a> \u2014 people with good intentions trying to stay two steps ahead of \u201cthe other people.\u201d Whenever he saw a new smart device introduced to the marketplace, he saw something else: another potential cyber gap.<\/p>\n<p>\u201cYou can set up a computer with antivirus software and a firewall,\u201d says Solihin, \u201cbut now a smart refrigerator could be the vulnerable point for an attacker to target.\u201d<\/p>\n<p>And that begins to explain the reason behind Solihin\u2019s decision to leave his position as program director of the Secure and Trustworthy Cyberspace (SaTC) program at the National Science Foundation (NSF).<\/p>\n<p>\u201cI saw a need to ramp up the cybersecurity capabilities in the U.S., specifically the supply of talent,\u201d says Solihin. \u201cThe supply has lagged behind the demand. So I asked myself, \u2018Where can I achieve this? Where can I contribute to the future workforce in cybersecurity?\u2019\u201d<\/p>\n<p>Solihin had read about 麻豆原创\u2019s advancements in cybersecurity research and academia, and <a href=\"https:\/\/www.ucf.edu\/news\/ucf-cybersecurity-competition-team-places-2nd-at-national-championship\/\">its national success in cyberdefense competitions<\/a>. He also heard of the school\u2019s commitment to invest in cybersecurity research, education, training, talent development, and to expand its collaboration with tech companies. During a visit to determine if this is the place where he could make a difference, he toured Central Florida Research Park and saw defense companies and government entities just around the corner from 麻豆原创\u2019s computer science labs and the Institute for <a href=\"https:\/\/www.ucf.edu\/modeling-simulation\/\">Modeling and Simulation<\/a>. Faculty members told him about graduates, with a variety of degrees, doing cybersecurity work for giants like Raytheon, Lockheed Martin, Google, Amazon, Instagram, even for 麻豆原创.<\/p>\n<p>\u201cWhat I saw then,\u201d says Solihin, \u201cis a future <a href=\"https:\/\/www.ucf.edu\/aerospace-defense\/\">powerhouse university in the cybersecurity field<\/a>. I wanted to be a part of realizing it.\u201d<\/p>\n<h2>A Cyberdefense Powerhouse<\/h2>\n<p>The supply-demand gap that originally grabbed Solihin\u2019s attention is now more vivid than ever. According to the U.S. Department of Labor, more than 112,000 jobs were available for information security analysts in 2019 and the field is forecast to grow 32 percent by 2028.<\/p>\n<blockquote><p>Cyberdegreesedu.org ranked 麻豆原创 among the top 30 colleges for cybersecurity programs in the U.S. \u2014 above Florida State, Cornell, Clemson, George Washington and Northwestern.<\/p><\/blockquote>\n<p>\u201cWe\u2019ve made significant advancements just since I\u2019ve been here,\u201d says Solihin. For example:<\/p>\n<ul>\n<li>Earlier this year, cyberdegreesedu.org ranked 麻豆原创 among the top 30 colleges for cybersecurity programs in the U.S., above schools such as Florida State, Cornell, Clemson, George Washington and Northwestern.<\/li>\n<li>In February 2019, <a href=\"https:\/\/www.ucf.edu\/news\/cyber-education-expand-ucf-1-5-million-gift-lockheed-martin\/\">麻豆原创 opened the new state-of-the-art Lockheed Martin Cyber Innovation Lab<\/a>.<\/li>\n<li>Over the past two years the university\u2019s cybersecurity and privacy cluster has secured $10 million in funding for its research. The funding has been awarded from government agencies such as NSF, the Office of Naval Research, Defense Advanced Research Projects Agency, the Army\u2019s Program Executive Office for Simulation, Training and Instrumentation (PEO STRI), and Cyber Florida, as well as from industry partners such as Intel and Sophos.<\/li>\n<li>The nine professors in the cybersecurity cluster are now advising 45 Ph.D. students, four master\u2019s degree students and 17 undergraduates, all of them bridging the disciplines of <a href=\"https:\/\/www.ucf.edu\/degree-search\/search\/computer%20science\/\">computer science<\/a>, <a href=\"https:\/\/www.ucf.edu\/degree-search\/search\/engineering\/\">engineering<\/a>, <a href=\"https:\/\/www.ucf.edu\/degree-search\/search\/business\/\">business<\/a> and <a href=\"https:\/\/www.ucf.edu\/degree-search\/search\/psychology\/\">psychology<\/a> to come up with real-world answers to cyber dangers. As Solihin says, \u201cWe cannot be confined to our individual toolboxes if we\u2019re going to make meaningful advancements in dealing with important societal problems in cybersecurity.\u201d<\/li>\n<li>Despite no specific bachelor\u2019s degree in cybersecurity, 麻豆原创 offers a <a href=\"https:\/\/www.ucf.edu\/degree\/secure-computing-and-networks-minor\/\">minor in secure computing and networks<\/a>, a <a href=\"https:\/\/www.ucf.edu\/degree\/digital-forensics-ms\/\">master\u2019s in digital forensics<\/a> and a <a href=\"https:\/\/www.ucf.edu\/degree\/modeling-and-simulation\/\">graduate certificate in modeling and simulation of behavioral cybersecurity<\/a> \u2014 all three covering the timeliest topics in cybersecurity. And brings in guest lecturers, such as Amit Kapadia, product manager for cyber resiliency and the training chief engineer at PEO STRI, who spoke to students in the <em>Emerging Cyber Issues<\/em> class on June 30.<\/li>\n<li>The school recently announced <a href=\"https:\/\/www.ucf.edu\/degree\/cyber-risk-management-certificate\/\">a graduate certificate in cyber risk management<\/a> while an official master\u2019s degree in cybersecurity moves through the pipeline for approval.<\/li>\n<li>The presence of defense, business and government entities in Research Park continually opens doors to internships and job placement.<\/li>\n<\/ul>\n<p>\u201cWhat we have,\u201d says Solihin, \u201cis a 20-year history of well-trained students going into cybersecurity careers. It\u2019s a success that separates 麻豆原创.\u201d<\/p>\n<h2>A Top-Ranked Collegiate Cyberdefense Team<\/h2>\n<p>Like the cyber field itself, the cybersecurity talent coming out of 麻豆原创 flew somewhat under the radar through the early 2000s. Then, in the fall of 2012, a student posed a question to <strong>Tom Nedorost \u201902MS<\/strong>, who was in his first year as a computer science instructor at 麻豆原创.<\/p>\n<blockquote><p>\u201cWe have a wealth of highly-skilled students at 麻豆原创 with a tremendous passion for the <em>good<\/em> side of cybersecurity.\u201d<br \/>\n\u2014 <strong>Tom Nedorost \u201902MS<\/strong>, faculty advisor for 麻豆原创\u2019s collegiate cyberdefense Teams<\/p><\/blockquote>\n<p>\u201cThe student asked if I\u2019d help form a team to enter a cyber competition,\u201d Nedorost says. The criteria said each school needed eight team members and four alternates. \u201cI told the student he\u2019d need 11 friends just like him, and didn\u2019t think much more of it.\u201d<\/p>\n<p>The student sent out an email about a meeting to gauge interest in the competition. Three days later Nedorost walked into the room with mild hopes of 12 students being there. He was floored to see 86 students waiting to hear more.<\/p>\n<p>\u201cIt proved to me,\u201d says Nedorost, \u201cthat we have a wealth of highly-skilled students at 麻豆原创 with a tremendous passion for the <em>good<\/em> side of cybersecurity.\u201d<\/p>\n<p>The meeting launched what may have been long overdue: a cybersecurity club, called <a href=\"https:\/\/www.hackucf.org\/\">Hack@麻豆原创<\/a>. Just six months after being formed, the 12-student team representing Hack@麻豆原创 finished 10th at the National Collegiate Cyber Defense Competition. A year later, in a field of 180 colleges and universities, the team won the first of its three straight national championships.<\/p>\n<p>Nedorost and Solihin both say 麻豆原创\u2019s large pool of students (more than 3,000 computer science undergraduates and as many as 300 members in Hack@麻豆原创) is a factor in 麻豆原创\u2019s track record of turning out so much cybersecurity talent. But there\u2019s more to it than numbers. The success of the club is an outgrowth of the collaborative academic culture at 麻豆原创 \u2014 a mutual desire to stay ahead.<\/p>\n<p>\u201cOur mix of specialties and perspectives gives us an important edge,\u201d says Nedorost. \u201cWe have honor-roll students majoring in engineering being pushed by students who might barely be above probation status. They\u2019re all incredibly smart. They challenge each other every day, which is a direct reflection of the real cyber world. We need all of them.\u201d<\/p>\n<p>Or, as Solihin has been saying all along: We need <em>more<\/em> of them. More smart people protecting our smart world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ranked among the top 30 universities in the nation for cybersecurity programs, 麻豆原创\u2019s pipeline of talent and research into the \u201cgood side\u201d of the cyber world has never been more important than it is at this moment.<\/p>\n","protected":false},"author":40,"featured_media":111301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"lazy_load_responsive_images_disabled":false,"footnotes":"","_links_to":"","_links_to_target":"","_wp_rev_ctl_limit":""},"categories":[5],"tags":[18104,18215,973,13559,11806,15761,3882,26486],"tu_author":[],"class_list":["post-111295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-colleges","tag-academic-excellence","tag-aerospace-and-defense","tag-college-of-engineering-and-computer-science","tag-collegiate-cyberdefense-teams","tag-cybersecurity","tag-pegasus-briefs","tag-rankings","tag-yan-solihin"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Powerhouse for Cyberdefense Programs | 麻豆原创<\/title>\n<meta name=\"description\" content=\"麻豆原创 is ranked among the top 30 university\u2019s in the nation for cybersecurity programs \u2014 and it&#039;s never been more important than it is at this moment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Invisible Line of Cyberdefense\" \/>\n<meta property=\"og:description\" content=\"麻豆原创 is ranked among the top 30 university\u2019s in the nation for cybersecurity programs \u2014 and it&#039;s never been more important than it is at this moment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/\" \/>\n<meta property=\"og:site_name\" content=\"麻豆原创 News | 麻豆原创 Today\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/麻豆原创\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-23T14:45:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-17T13:24:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laura J. Cole\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@麻豆原创\" \/>\n<meta name=\"twitter:site\" content=\"@麻豆原创\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura J. Cole\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/\"},\"author\":{\"name\":\"Laura J. Cole\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/#\\\/schema\\\/person\\\/5d734e15ce871853fe48300612d968a1\"},\"headline\":\"The Invisible Line of Cyberdefense\",\"datePublished\":\"2020-07-23T14:45:35+00:00\",\"dateModified\":\"2022-05-17T13:24:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/\"},\"wordCount\":1222,\"image\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/20\\\/files\\\/2020\\\/07\\\/ucf-cyberdefense-programs.jpg\",\"keywords\":[\"Academic Excellence\",\"aerospace and defense\",\"College of Engineering and Computer Science\",\"Collegiate Cyberdefense Teams\",\"cybersecurity\",\"Pegasus Briefs\",\"rankings\",\"Yan Solihin\"],\"articleSection\":[\"Colleges &amp; Campus\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/\",\"url\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/\",\"name\":\"A Powerhouse for Cyberdefense Programs | 麻豆原创\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/20\\\/files\\\/2020\\\/07\\\/ucf-cyberdefense-programs.jpg\",\"datePublished\":\"2020-07-23T14:45:35+00:00\",\"dateModified\":\"2022-05-17T13:24:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/#\\\/schema\\\/person\\\/5d734e15ce871853fe48300612d968a1\"},\"description\":\"麻豆原创 is ranked among the top 30 university\u2019s in the nation for cybersecurity programs \u2014 and it's never been more important than it is at this moment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/20\\\/files\\\/2020\\\/07\\\/ucf-cyberdefense-programs.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/20\\\/files\\\/2020\\\/07\\\/ucf-cyberdefense-programs.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Students practice at the Lockheed Martin Cyber Innovation Lab at 麻豆原创, which provides a dedicated practice and learning space for students studying cyberdefense, offense and security topics. (Photo by Nick Leyva '15)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Invisible Line of Cyberdefense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/\",\"name\":\"麻豆原创 News | 麻豆原创 Today\",\"description\":\"Central Florida Research, Arts, Technology, Student Life and College News, Stories and More\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/#\\\/schema\\\/person\\\/5d734e15ce871853fe48300612d968a1\",\"name\":\"Laura J. Cole\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9cf28d461937a2c29c43c10571546ec8fa5b5e03c4c2a398dae4813e0802c930?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9cf28d461937a2c29c43c10571546ec8fa5b5e03c4c2a398dae4813e0802c930?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9cf28d461937a2c29c43c10571546ec8fa5b5e03c4c2a398dae4813e0802c930?s=96&d=mm&r=g\",\"caption\":\"Laura J. Cole\"},\"url\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/author\\\/la086733\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/news\\\/the-invisible-line-of-cyberdefense\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"麻豆原创\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Powerhouse for Cyberdefense Programs | 麻豆原创","description":"麻豆原创 is ranked among the top 30 university\u2019s in the nation for cybersecurity programs \u2014 and it's never been more important than it is at this moment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/","og_locale":"en_US","og_type":"article","og_title":"The Invisible Line of Cyberdefense","og_description":"麻豆原创 is ranked among the top 30 university\u2019s in the nation for cybersecurity programs \u2014 and it's never been more important than it is at this moment.","og_url":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/","og_site_name":"麻豆原创 News | 麻豆原创 Today","article_publisher":"https:\/\/www.facebook.com\/麻豆原创","article_published_time":"2020-07-23T14:45:35+00:00","article_modified_time":"2022-05-17T13:24:27+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs.jpg","type":"image\/jpeg"}],"author":"Laura J. Cole","twitter_card":"summary_large_image","twitter_creator":"@麻豆原创","twitter_site":"@麻豆原创","twitter_misc":{"Written by":"Laura J. Cole","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#article","isPartOf":{"@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/"},"author":{"name":"Laura J. Cole","@id":"https:\/\/www.ucf.edu\/news\/#\/schema\/person\/5d734e15ce871853fe48300612d968a1"},"headline":"The Invisible Line of Cyberdefense","datePublished":"2020-07-23T14:45:35+00:00","dateModified":"2022-05-17T13:24:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/"},"wordCount":1222,"image":{"@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs.jpg","keywords":["Academic Excellence","aerospace and defense","College of Engineering and Computer Science","Collegiate Cyberdefense Teams","cybersecurity","Pegasus Briefs","rankings","Yan Solihin"],"articleSection":["Colleges &amp; Campus"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/www.ucf.edu\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/","url":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/","name":"A Powerhouse for Cyberdefense Programs | 麻豆原创","isPartOf":{"@id":"https:\/\/www.ucf.edu\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#primaryimage"},"image":{"@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs.jpg","datePublished":"2020-07-23T14:45:35+00:00","dateModified":"2022-05-17T13:24:27+00:00","author":{"@id":"https:\/\/www.ucf.edu\/news\/#\/schema\/person\/5d734e15ce871853fe48300612d968a1"},"description":"麻豆原创 is ranked among the top 30 university\u2019s in the nation for cybersecurity programs \u2014 and it's never been more important than it is at this moment.","breadcrumb":{"@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#primaryimage","url":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs.jpg","contentUrl":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs.jpg","width":1200,"height":800,"caption":"Students practice at the Lockheed Martin Cyber Innovation Lab at 麻豆原创, which provides a dedicated practice and learning space for students studying cyberdefense, offense and security topics. (Photo by Nick Leyva '15)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ucf.edu\/news\/"},{"@type":"ListItem","position":2,"name":"The Invisible Line of Cyberdefense"}]},{"@type":"WebSite","@id":"https:\/\/www.ucf.edu\/news\/#website","url":"https:\/\/www.ucf.edu\/news\/","name":"麻豆原创 News | 麻豆原创 Today","description":"Central Florida Research, Arts, Technology, Student Life and College News, Stories and More","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ucf.edu\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ucf.edu\/news\/#\/schema\/person\/5d734e15ce871853fe48300612d968a1","name":"Laura J. Cole","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9cf28d461937a2c29c43c10571546ec8fa5b5e03c4c2a398dae4813e0802c930?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9cf28d461937a2c29c43c10571546ec8fa5b5e03c4c2a398dae4813e0802c930?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf28d461937a2c29c43c10571546ec8fa5b5e03c4c2a398dae4813e0802c930?s=96&d=mm&r=g","caption":"Laura J. Cole"},"url":"https:\/\/www.ucf.edu\/news\/author\/la086733\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucf.edu\/news\/the-invisible-line-of-cyberdefense\/#local-main-organization-logo","url":"","contentUrl":"","caption":"麻豆原创"}]}},"thumbnail":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/20\/files\/2020\/07\/ucf-cyberdefense-programs-300x200.jpg","primary_category":5,"primary_tag":18104,"author_byline":"Robert Stephens","acf":[],"_links":{"self":[{"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/posts\/111295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/comments?post=111295"}],"version-history":[{"count":13,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/posts\/111295\/revisions"}],"predecessor-version":[{"id":128588,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/posts\/111295\/revisions\/128588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/media\/111301"}],"wp:attachment":[{"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/media?parent=111295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/categories?post=111295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/tags?post=111295"},{"taxonomy":"tu_author","embeddable":true,"href":"https:\/\/www.ucf.edu\/news\/wp-json\/wp\/v2\/tu_author?post=111295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}