{"version":"1.0","provider_name":"MS in Cybersecurity","provider_url":"https:\/\/www.plu.edu\/ms-cybersecurity","author_name":"oharasm","author_url":"https:\/\/www.plu.edu\/ms-cybersecurity\/author\/oharasm\/","title":"Learning Outcomes","type":"rich","width":600,"height":338,"html":"<style>.mfp-content{background:transparent !important;}#plu-wordpress-embed-b3523279d5b043fc23639622e687b0fc .wp-embedded-content{width: 100%;min-height: 480px;}<\/style><div id=\"plu-wordpress-embed-b3523279d5b043fc23639622e687b0fc\"><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.plu.edu\/ms-cybersecurity\/learning-outcomes\/embed\/#?secret=r3BPUmhYDH\" width=\"600\" height=\"338\" title=\"&#8220;Learning Outcomes&#8221; &#8212; MS in Cybersecurity\" data-secret=\"r3BPUmhYDH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe>\n<\/div>"}