{"id":1114,"date":"2021-09-08T10:28:40","date_gmt":"2021-09-08T16:28:40","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=1114"},"modified":"2021-09-08T10:28:41","modified_gmt":"2021-09-08T16:28:41","slug":"nsa-student-programs-available","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2021\/09\/08\/nsa-student-programs-available\/","title":{"rendered":"NSA Student Programs Available"},"content":{"rendered":"\n<p>The National Security Agency has a number of student programs available for qualified applicants.  Many application periods end at the end of October and selections may be made for programs up to a year in advance to take a look early.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.intelligencecareers.gov\/nsa\/nsastudents.html\">https:\/\/www.intelligencecareers.gov\/nsa\/nsastudents.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Security Agency has a number of student programs available for qualified applicants. Many application periods end at the end of October and selections may be made for programs up to a year in advance to take a look early. <a href=\"https:\/\/www.intelligencecareers.gov\/nsa\/nsastudents.html\" rel=\"nofollow\">https:\/\/www.intelligencecareers.gov\/nsa\/nsastudents.html<\/a><\/p>\n","protected":false},"author":10,"featured_media":806,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34],"tags":[],"class_list":["post-1114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-careers"],"jetpack_featured_media_url":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2021\/08\/NSA-e1627921737620.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/1114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=1114"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/1114\/revisions"}],"predecessor-version":[{"id":1115,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/1114\/revisions\/1115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media\/806"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=1114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=1114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=1114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}