Information Technology / Bachelor of Science
Program: BS-INTH-1
Total Credit Hours: 120
Major Credit Hours: 55
Through effective integration of hardware and software, computing technology enables conveniences on which modern life depends. The Bachelor of Science in Information Technology offers a core of courses that give students a broad command of the software and hardware concepts and skills that will enable them to describe, design, and implement such technologies. It also offers concentrations that lead to a variety of in-demand technology certifications that give students more focused credentials and skill sets.
Degree Requirements
Code | Title | Hours |
---|---|---|
Core Courses | ||
CPSC 20000 | Introduction to Computer Science | 3 |
CPSC 21000 | Programming Fundamentals | 3 |
CPSC 22000 | Introduction to Linux | 3 |
CPSC 24500 | Object-Oriented Programming | 3 |
or CPSC 24700 | Web and Distributed Programming | |
CPSC 28100 | Introduction to Networks | 3 |
CPSC 30000 | Computer Organization | 3 |
CPSC 33000 | Database Systems | 3 |
CPSC 35000 | Operating Systems | 3 |
CPSC 35500 | Cloud Computing and Virtualization | 3 |
CPSC 42000 | Cybersecurity Essentials | 3 |
CPSC 49300 | Computer Infrastructure Capstone Project | 3 |
INSY 23000 | Legal and Ethical Issues in Computing | 3 |
MATH 21000 | Discrete Mathematics | 4 |
Concentration | ||
The following concentrations are offered through the Bachelor of Science in Information Technology degree. To earn a concentration, as student must take 15 credit hours of coursework toward that concentration. A student may earn multiple concentrations by taking 15 credit hours of coursework toward each. Where specified, a course may count toward multiple concentrations. | 15 | |
Total Hours | 55 |
Cybersecurity
Concentration: CYBS
Code | Title | Hours |
---|---|---|
CPSC 42100 | Advanced Cybersecurity | 3 |
CPSC 42200 | Wireless Security | 3 |
CPSC 42300 | Ethical Hacking | 3 |
CPSC 42500 | Encryption and Authentication Systems | 3 |
INSY 35000 | Cybersecurity Policy and Strategy | 3 |
Total Hours | 15 |
Data Privacy
Concentration: DTPR
Code | Title | Hours |
---|---|---|
CPSC 25000 | File Systems and Digital Forensics | 3 |
CPSC 42500 | Encryption and Authentication Systems | 3 |
INSY 35000 | Cybersecurity Policy and Strategy | 3 |
INSY 35100 | Security Assessment and Risk Management | 3 |
INSY 45000 | Enterprise Security | 3 |
Total Hours | 15 |
Digital Forensics
Concentration: DGTL
Code | Title | Hours |
---|---|---|
CPSC 25000 | File Systems and Digital Forensics | 3 |
CPSC 42300 | Ethical Hacking | 3 |
CPSC 42600 | Mobile Device Forensics | 3 |
CPSC 42800 | Programming for Digital Forensics | 3 |
INSY 46000 | Cybercrime Prevention Tools | 3 |
Total Hours | 15 |
Enterprise Computing
Concentration: ENCC
Code | Title | Hours |
---|---|---|
CPSC 28200 | Switching, Routing, and Wireless Essentials | 3 |
CPSC 48000 | Client-Server Computing | 3 |
CPSC 48500 | Enterprise Networking, Security and Automation | 3 |
INSY 35100 | Security Assessment and Risk Management | 3 |
INSY 45000 | Enterprise Security | 3 |
Total Hours | 15 |
Networking
Concentration: NETW
Code | Title | Hours |
---|---|---|
CPSC 28200 | Switching, Routing, and Wireless Essentials | 3 |
CPSC 38200 | Network Security | 3 |
CPSC 42200 | Wireless Security | 3 |
CPSC 48000 | Client-Server Computing | 3 |
CPSC 48500 | Enterprise Networking, Security and Automation | 3 |
Total Hours | 15 |
Project Management
Concentration: PROJ
Code | Title | Hours |
---|---|---|
PROJ 31000 | Principles of Project Management | 3 |
INSY 35100 | Security Assessment and Risk Management | 3 |
PROJ 32500 | Introduction to Six Sigma | 3 |
PROJ 42500 | Advanced Project Management | 3 |
PROJ 43500 | Business Process Management | 1 |
Total Hours | 13 |
No Declared Concentration
Concentration: ITNC
Take any five DATA, CPSC, or INSY courses at or above the 20000-level. This concentration may not be supplemented by any additional concentration.
Advanced Writing Requirement
The Advanced Writing Requirement of the General Education Curriculum is satisfied by successful completion of CPSC 49300 Computer Infrastructure Capstone Project.
Recommended Minors
Pursuing a minor gives students an opportunity to explore an area of interest in greater depth. Information Technology professionals help organizations of all kinds access, store, communicate and secure their data, and this gives students great freedom to choose a minor that aligns with their personal or professional interests. However, the following minors align most closely with the coursework of the major:
The requirements for some of these minors overlap with those of the major. To earn a minor, a student must take at least two upper-division courses that count exclusively for the minor. A student may not both major and minor in Information Technology.