BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Similar documents
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

INFORMATION TECHNOLOGY, BS

Building the Cybersecurity Workforce. November 2017

COMPUTER TECHNOLOGY (COMT)

SOFTWARE ENGINEERING. Curriculum in Software Engineering. Program Educational Objectives

Associate in Science and Bachelor of Science in Information Technology

Computer Information Science xxx

DIGITAL SCIENCES - B.S.

Information Systems and Tech (IST)

School of Engineering & Computational Sciences

Bachelor of Information Technology (Network Security)

Computer Information Systems

INFORMATION TECHNOLOGY - B.S.I.T.

Department of Computer Science and Engineering

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

College Of. Technological Innovation

Programme Specification

COMPUTER GRAPHICS TECHNOLOGY

Oklahoma City Community College

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

Standard Course Outline IS 656 Information Systems Security and Assurance

School of Engineering and Computational Sciences

Bachelor of Science Information Studies School of Information Program Summary

Bachelor of Science in Business Administration - Information Systems and Technology Major

COMPUTER INFORMATION SYSTEMS

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination.

Associate of Arts To Bachelor of Science in Computer Information Technology

High School Course Guide

BSc (Honours) Computer Science Curriculum Outline

OVERVIEW OF SUBJECT REQUIREMENTS

it security specialist

High School Course Guide Information Technology

High School Course Guide Information Technology

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE (NON-THESIS OPTION)

Department of Business Information Technology

Department of Computer Science

GRAPHIC DESIGN AND MULTIMEDIA (GDS) GRAPHIC ARTS (GDS) Associate in Science in Graphic Design. Certificate of Achievement in Graphic Arts

Engineering Technology

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program

DIABLO VALLEY COLLEGE CATALOG

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

Your Student s Head Start on Career Goals and College Aspirations

INFORMATION TECHNOLOGIES Bachelor of Technology: 121 Credit Hours

Diploma Of Computing

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

cimc Information Brochure Chartered Institute of Management Consultants

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Bachelor of Applied Science Degree IT NETWORKING

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Associate of Science to Bachelor of Science in Business Information Systems

School of Engineering & Built Environment

COMPUTER INFORMATION SYSTEMS

PROGRAMME SPECIFICATION

CYBERSECURITY: Scholarship and Job Opportunities

CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

CYBER SECURITY Program Planning Guides

Networking and Cybersecurity. Computer Service Technician. Cybersecurity Award: Career Studies Certificate Length: 25 credits

Computer Science & IT

ACCOUNTING. Iowa State University

Bismarck State College

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Undergraduate Program for Specialty of Software Engineering

M.S. in Information Systems

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Transfer Agreement. * Statistics preferred; however, a select higher level math class may be accepted with permission from MSU advisor.

Section 1: Program Abstract

CSCU Exercise Science Transfer Pathway

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

IT Specialist Program Format 5, page

Department of Computer Science

B.A. in Information Systems

Eight units must be completed and passed to be awarded the Diploma.

Instructor(s)/Author(s): Clayton Smith

Computer Network Engineering

University Core Curriculum Requirements

Information Technology

BS in Computer Science Outcome Set (CAC/ABET)

California Institute of Arts & Technology AAS in Computer Information Systems - Networking Concentration

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

Networking Technology. Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Network Security Certificate

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

Manufacturing PROGRAMS STUDY

Computer Information Technology

PECB UNIVERSITY PECB UNIVERSITY

Course Curriculum for Master Degree in Network Engineering and Security

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Secure Systems Administration and Engineering

Seneca. August 26,20II

Computer Science and Information Technology

REGIS UNIVERSITY CATALOG

THE CITY UNIVERSITY OF NEW YORK

COMPUTER AND INFORMATION TECHNOLOGY

NETWORK ENGINEERING, ASSOCIATE IN APPLIED SCIENCE

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

Programme Specification

Transcription:

Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you prepare for career advancement in the information technology field by providing the technical knowledge, and communication, critical thinking, and creative skills relevant to the modern workplace. The degree program is designed to help you develop a working knowledge of information technology (IT) concepts, tools, and methods as well as the leading-edge technologies needed to design information systems. In addition, courses teach you how to apply technical competencies to solve business problems. Whether your immediate educational goals are satisfied by the completion of a bachelor's degree or you are planning to pursue study in the information technology field beyond the baccalaureate level, this degree program may be for you. The following program educational objectives are approved by information technology faculty and the Advisory Board: Our graduates will be able to evaluate and apply current IT best practices when solving real- world problems in complex IT environments. Our graduates will be able to demonstrate their ability to work within diverse teams, and to use effective written and oral communication skills when analyzing and designing IT solutions. Our graduates will be able to assess the impact of information technology on business processes and apply effective and ethically sound solutions locally and globally. Concentrations You can personalize your degree in IT by focusing electives on a particular concentration. Concentrations generally consist of three or more courses and allow you to concentrate on your individual career interests. When enrolling in the Bachelor of Science in Information Technology, you must select from the following concentrations: IT management, network administration, information security and assurance, or programming and software development. ExcelTrack Option The ExcelTrack option for the Bachelor of Science in Information Technology is designed to allow students with applicable skills, professional experience, and self-direction to accelerate their pace toward earning their degree. In the ExcelTrack option, there are no required weekly assignments or class hours per course just one final comprehensive project. Students can skip material they know and focus on what they need to learn to master course outcomes. With a few rare exceptions, ExcelTrack courses are divided into small one-credit courses that allow flexible course loads each term. ExcelTrack uses a termbased tuition model: the more courses students complete per term, the greater their cost savings. To determine if ExcelTrack is a good fit for you, speak to your Advisor. For more information on the policies governing ExcelTrack programs, see the academic policy (https:// catalog.kaplanuniversity.edu/policy-information) section of the Catalog. Accelerated Master of Science in Information Technology and Master of Science in Cybersecurity Management Options If you are interested in earning both a bachelor's degree and a master's degree, consider the accelerated options for either the Master of Science in Information Technology or Master of Science in Cybersecurity Management. Refer to the Policies (p. ) section for details. Program Length The Bachelor of Science in Information Technology program consists of a minimum of 80 quarter credit hours. Upon successful completion of the program, you will be awarded a bachelor of science degree. Program Outcomes Discipline-Specific Outcomes. Technology Skills: Apply current technical tools and methodologies to solve problems. 2. Client Specifications: Analyze users' technical issues. 3. System Specifications: Design information systems. 4. Technology Analysis: Evaluate IT trends, practices, and products. 5. Business Analysis: Evaluate the potential impact of information systems and technology on business processes.. Project Management: Apply project management practices, tools, and methods. 7. Professional Development: Recognize the ethical considerations for IT professionals locally and globally as they develop in their careers. General Education Literacies and Professional Competencies In addition to the discipline-specific outcomes, general education literacies and professional competencies are integrated throughout your academic program. You can review the general education literacies and professional competencies associated with your academic program in the undergraduate School of General Education (https:// catalog.kaplanuniversity.edu/undergraduate/general-education) section of this Catalog. Program Availability For program availability, please refer to the U.S. State and Other Approvals (https://catalog.kaplanuniversity.edu/policy-information/ university-information/accreditation-approvals-memberships) section and the Program Availability Grid (https://www.kaplanuniversity.edu/ catalog-state-approval-grid.pdf). Policies Please refer to school-specific policies (https:// catalog.kaplanuniversity.edu/undergraduate/businessinformation-technology) and the Policy Information (https:// catalog.kaplanuniversity.edu/policy-information) section for general Kaplan University policies. Admissions Requirements Upon enrollment in the Bachelor of Science in Information Technology, you are required to select a concentration. Accelerated Master of Science in Cybersecurity Management Option If you are enrolled in the University's Bachelor of Science in Information Technology program and are interested in continuing on to pursue the

2 Bachelor of Science in Information Technology University's Master of Science in Cybersecurity Management, you may matriculate into a shortened version of the graduate program. Upon successful completion of the Bachelor of Science in Information Technology program, you may apply for entry to the University's Master of Science in Cybersecurity Management program. If accepted and you meet the requirements for the accelerated Master of Science in Cybersecurity Management option, you may have the following courses waived: IT530 Computer Networks 4 IT537 Introduction to Cybersecurity 4 IT54 Computer and Network Security 4 IT542 Ethical Hacking and Network Defense 4 IT550 Computer Forensics and Investigations 4 In order to qualify for the accelerated Master of Science in Cybersecurity Management option, you must meet the following criteria:. Complete your undergraduate coursework in the information technology or cybersecurity program with a minimum cumulative GPA of 3.2. 2. Complete the following courses and obtain a grade of B or better in each course (waiver of graduate courses noted above varies based on completion of specific courses listed below): IT234 Database Concepts 5 IT22 Certified Ethical Hacking I 5 IT28 Network Security Concepts 5 IT30 Project Management I IT3 Computer Forensics IT350 Advanced Database Concepts IT375 Windows Enterprise Administration IT395 Certified Ethical Hacking II IT40 Project Management II IT4 Digital Forensics IT42 Information Systems Security IT40 Systems Analysis and Design IT484 Cybersecurity Policies Accelerated Master of Science in Information Technology Option If you are enrolled in the University's Bachelor of Science in Information Technology program and are interested in continuing on to pursue the University's Master of Science in Information Technology, you may matriculate into a shortened version of the graduate program. Upon successful completion of the Bachelor of Science in Information Technology program, you may apply for entry to the University's Master of Science in Information Technology program. If accepted and you meet the requirements for the accelerated Master of Science in Information Technology option, you may have the following courses waived: IT50 System Analysis and Design 4 IT5 Information Systems Project Management 4 IT52 SQL Query Design 4 IT530 Computer Networks 4 IT54 Computer and Network Security 4 IT542 Ethical Hacking and Network Defense 4 IT550 Computer Forensics and Investigations 4 In order to qualify for the accelerated MSIT option, you must meet the following criteria:. Complete your undergraduate coursework in the information technology or cybersecurity program with a minimum cumulative GPA of 3.2. 2. Complete the following courses and obtain a grade of B or better in each course (waiver of graduate courses noted above varies based on completion of specific courses listed below): IT234 Database Concepts 5 IT22 Certified Ethical Hacking I 5 IT28 Network Security Concepts 5 IT30 Project Management I IT3 Computer Forensics IT350 Advanced Database Concepts IT375 Windows Enterprise Administration IT395 Certified Ethical Hacking II IT40 Project Management II IT4 Digital Forensics IT42 Information Systems Security IT40 Systems Analysis and Design IT484 Cybersecurity Policies Degree Plan Program Requirements Core Requirements CM07 College Composition I 5 CM220 College Composition II 5 CS204 Professional Presence 3 MM22 College Algebra 5 Arts and Humanities (select one of the following): 5 HU200 HU245 HU250 Arts and Humanities - Modern Creative Expressions Ethics Humanities and Culture Science (select one of the following): 5 SC200 SC235 SC24 SC250 Discovering Science - Current Issues in a Changing World General Biology I - Human Perspectives Fundamentals of Microbiology Science for Everyday Life Social Science (select one of the following): 5

Bachelor of Science in Information Technology 3 SS2 SS23 SS250 The 90s - Reshaping the American Dream People, Power, and Politics - An Introduction to American Government The Technological Revolution - A Social Scientific Approach Total Core Requirements 33 Major Requirements CM24 Foundations of Technical Communication 2 IT7 Website Development 5 IT33 Microsoft Office Applications on Demand 5 IT3 Database Concepts Using Microsoft Access IT90 Information Technology Concepts 5 IT23 Software Development Concepts 5 IT232 Software Design and Development Concepts IT234 Database Concepts 5 IT273 Networking Concepts 5 IT28 Network Security Concepts 5 MM250 Discrete Mathematics 5 MT40 Introduction to Management 5 IT30 Project Management I IT302 Human Computer Interaction IT33 Technology Infrastructure IT332 Principles of Information Systems Architecture IT350 Advanced Database Concepts IT402 IT Consulting Skills IT40 Systems Analysis and Design IT489 or IT499 Bachelor's-Level Information Technology Internship Bachelor's Capstone in Information Technology Total Major Requirements 05 Open Elective Requirements Open Electives (see below) 42 Total Open Elective Requirements 42 TOTAL CREDITS 80 Concentration Requirements Concentration courses are completed within the open electives requirement of the degree plan. Information Security and Assurance IT3 Computer Forensics IT390 Intrusion Detection and Incidence Response IT4 Digital Forensics IT42 Information Systems Security TOTAL CREDITS 34 5 5 IT Management Select four of the following: 2-24 IT22 IT277 IT279 IT303 IT374 IT375 IT390 IT395 IT40 IT40 IT4 IT42 IT47 Certified Ethical Hacking I Certified Information Systems Security Professional I Certified Information Systems Security Professional II Application Development, Virtualization, and the Cloud Linux Security Windows Enterprise Administration Intrusion Detection and Incidence Response Certified Ethical Hacking II Project Management II Certified Information Systems Security Professional III Digital Forensics Information Systems Security Routing and Switching II TOTAL CREDITS 2-24 Network Administration IT375 Windows Enterprise Administration IT388 Routing and Switching I IT47 Routing and Switching II TOTAL CREDITS 28 Programming and Software Development IT39 Advanced Software Development Including Web and Mobility IT48 Advanced Software Development IT488 Software Product Development Using Agile TOTAL CREDITS 8 ExcelTrack Program Requirements Core Requirements CM07 CM07M CM07M2 College Composition I Understanding What You Read - A Pathway to Reading and Writing Success Using Language Appropriate to Audience and Writing Situation CM07M3 Writing an Effective Academic Essay CM07M4 Locating, Integrating, and Citing Reliable and Relevant Sources

4 Bachelor of Science in Information Technology CM07M5 Writing Effective Professional Documents CM220 CM220M College Composition II Defining Effective Communication in Different Contexts CM220M2 Constructing Logical Arguments CM220M3 Using Research to Support Academic and Professional Assertions CM220M4 Articulating a Strong Written Argument CM220M5 CS204 Communicating Solutions With Digital Media Professional Presence CS204M Maintaining a Professional Presence CS204M2 CS204M3 HU245 Professional Communication Skills and Online Presence Professional Culture and Career Marketability Ethics HU245M Theories of Morality HU245M2 Bioethics HU245M3 Social Ethics HU245M4 Business Ethics HU245M5 Environmental Ethics MM22 College Algebra MM22M Factoring and Polynomials MM22M2 Analyzing Rational and Radical Equations MM22M3 Solving Linear Equations and Graphing MM22M4 Solving Quadratic Equations MM22M5 SC200 SC200M Solving Exponential and Logarithmic Equations Discovering Science Current Issues in a Changing World Basic Scientific Principles and Their Limitations SC200M2 Scientific Concepts Across Disciplines SC200M3 How Science and Life Work Together SC200M4 Technology Throughout History SC200M5 Applying Science Day to Day SS2 The 90s Reshaping the American Dream SS2M The 90s - Setting the Stage SS2M2 The 90s - A Brave New World SS2M3 The 90s - Building a Movement SS2M4 The 90s - Governing in Turbulent Times SS2M5 The 90s - Striving Toward Equality Total Core Requirements 33 Major Requirements CM24 CM24M CM24M2 IT Foundations of Technical Communication Applying Technical Communication Skills to Various Contexts Using Digital Media Tools for Various Audiences Programming Concepts ITM Elements of Object Programming ITM2 Parameters and Arguments ITM3 Iteration, Assignment, and Decision-Making ITM4 Functions ITM5 Storyboards for Design IT7 Website Development IT7M Website Project Planning IT7M2 HTML and Images IT7M3 CSS and HTML IT7M4 HTML Forms IT7M5 Constructing Functional Websites IT33 Microsoft Office Applications on Demand IT33M Operating System and Services IT33M2 Word Processing Skills IT33M3 Spreadsheet Skills IT33M4 Computer Presentation Skills IT33M5 Software Solutions and Analysis IT3 Database Concepts Using Microsoft Access IT3M Effective Design Concepts IT3M2 Relational Databases IT3M3 Database Forms IT3M4 Structured Query Language IT3M5 Database Reports IT90 Information Technology Concepts IT90M Hardware Components IT90M2 Software Applications IT90M3 System Software IT90M4 Computer Network Components IT90M5 Computer and Network Security IT234 Database Concepts IT234M Database Management Concepts IT234M2 Data Definition Language IT234M3 Data Manipulation Language IT234M4 Advanced SQL IT234M5 IT273 Analytical and Non-Relational Database Alternatives Networking Concepts IT273M Networking Concepts IT273M2 Networked Environments IT273M3 Data Transmission IT273M4 Wide Area Networks and Wireless Technologies IT273M5 Global Interconnectedness IT278 Network Administration IT278M Network Operating Systems IT278M2 Network Access Administration IT278M3 Active Directory Configuration IT278M4 TCP/IP, DNS, and DHCP Configuration IT278M5 Virtualization Management IT283 IT283M Networking with TCP/IP TCP/IP, IPv4 and IPv Addressing, and Basic IP Packet Structures IT283M2 Lower Layer Protocols

Bachelor of Science in Information Technology 5 IT283M3 IPv Neighbor Discovery, Addressing, and Name Resolution IT283M4 TCP/IP Transport Layer Protocols IT283M5 IPv4 and IPv Comparison IT28 Network Security Concepts IT28M Risk Assessment and Network Monitoring IT28M2 Device and Infrastructure Security IT28M3 Protections Measures IT28M4 Cryptography IT28M5 Security Awareness and Enforcement MM250 Discrete Mathematics MM250M Numbers and Logical Reasoning MM250M2 Counting Techniques and Probability MM250M3 Sets, Sequences, and Series MM250M4 Graph Theory and Trees MM250M5 Transition Diagrams MT40 Introduction to Management MT40M Solving Management Problems MT40M2 Management Skills MT40M3 Change Management MT40M4 Global Management Skills MT40M5 Ethics in Management IT30 Project Management I IT30M Project Management Framework IT30M2 Triple Constraints Management IT30M3 Project Risk and Resource Management IT30M4 Project Execution Management IT30M5 Project Management Ethics and Integrity IT30M IT302 Project Management Global Interconnectedness Human Computer Interaction IT302M HCI Theories and Principles IT302M2 HCI Principles and the Discovery Process IT302M3 Text and Typography in Design IT302M4 Auditory Components IT302M5 Haptics IT302M Interface Design IT3 Computer Forensics IT3M Computers and Criminal Behavior IT3M2 Computer Forensics as a Profession IT3M3 Computer Forensics Processes IT3M4 Data Acquisition Methods IT3M5 Computer Forensics Tools IT3M Data Analysis and Validation Techniques IT33 Technology Infrastructure IT33M Networking Skills for Project Success IT33M2 Key Infrastructure Components IT33M3 IT Infrastructure Planning IT33M4 Wide Area Network Technologies IT33M5 Global Interconnectedness in Technology Infrastructure IT33M Network Security Design IT332 Principles of Information Systems Architecture IT332M Binary Language IT332M2 The Computer as a System IT332M3 System Architecture Components IT332M4 Data Communication and Networking IT332M5 Data Storage and Protection IT332M Computer Operating Systems IT375 Windows Enterprise Administration IT375M Windows Server Installation IT375M2 Windows Server Advanced Configuration IT375M3 Windows Server Active Directory Configuration IT375M4 Network Services and Components IT375M5 Network Policy IT375M Security Functions IT388 Routing and Switching I IT388M Network Routing and Switching Concepts IT388M2 IP Addressing Concepts IT388M3 Router and Switching Configurations IT388M4 Network Routing Protocols IT388M5 VLAN Design IT388M Routing and Switching Proposals IT390 Intrusion Detection and Incidence Response IT390M Principles and Concepts IT390M2 Comparing Intrusion Detection Systems IT390M3 Responding to Threats IT390M4 Installing and Examining Intrusion Detection Systems IT390M5 Security Analytics IT390M Incident Response Strategies IT402 IT Consulting Skills IT402M Consulting and Ethics IT402M2 Time and Resource Management IT402M3 Interpersonal Skills IT402M4 Consulting History and Global Views IT402M5 The Consulting Project Proposal IT402M Persuasive Presentations IT4 Digital Forensics IT4M Digital Forensic Concepts and Techniques IT4M2 Securing Digital Evidence IT4M3 Examining Forensic Data IT4M4 Audits and Investigations IT4M5 Analyzing System Files and Artifacts IT4M Current Practices and Trends IT42 Information Systems Security IT42M Information Security Concepts IT42M2 System Vulnerability and Threats IT42M3 Cryptography Techniques IT42M4 Operational Security and Incident Planning IT42M5 Disaster Recovery Planning IT42M Network Security Policies and Procedures

Bachelor of Science in Information Technology IT44 IT40 Directed Studies, School of Information Technology System Analysis and Design IT40M Information Systems Concepts IT40M2 Developing Logical Systems Models IT40M3 Object Modeling IT40M4 Development Strategies IT40M5 Systems Architecture IT40M Systems Implementation IT47 Routing and Switching II IT47M IP Addressing Schemes IT47M2 Routing and Switching Configuration IT47M3 Advanced Routing and Switching Concepts IT47M4 Network Design IT47M5 Disaster Recovery with WANs IT47M Network Health IT489 or IT499 Bachelor's-Level Information Technology Internship Bachelor's Capstone in Information Technology Total Major Requirements 47 TOTAL CREDITS 80