{"version":"1.0","provider_name":"MS in Cybersecurity","provider_url":"https:\/\/www.plu.edu\/ms-cybersecurity","author_name":"oharasm","author_url":"https:\/\/www.plu.edu\/ms-cybersecurity\/author\/oharasm\/","title":"Program Details","type":"rich","width":600,"height":338,"html":"<style>.mfp-content{background:transparent !important;}#plu-wordpress-embed-c8eb2e580bd8f297cf854781fae1e087 .wp-embedded-content{width: 100%;min-height: 480px;}<\/style><div id=\"plu-wordpress-embed-c8eb2e580bd8f297cf854781fae1e087\"><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.plu.edu\/ms-cybersecurity\/program-details\/embed\/#?secret=gNtwpCsYpu\" width=\"600\" height=\"338\" title=\"&#8220;Program Details&#8221; &#8212; MS in Cybersecurity\" data-secret=\"gNtwpCsYpu\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe>\n<\/div>"}