Information Technology / Bachelor of Science
Information Technology / Bachelor of Science
Total Credit Hours: 128
Major Credit Hours: 55
Through effective integration of hardware and software, computing technology enables conveniences on which modern life depends. The Bachelor of Science in Information Technology offers a core of courses that give students a broad command of the software and hardware concepts and skills that will enable them to describe, design, and implement such technologies. It also offers concentrations that lead to a variety of in-demand technology certifications that give students more focused credentials and skill sets.
Degree Requirements
Program: BS-INTH-1
I. Core Courses (43)
CPSC-20000 | Introduction to Computer Science |
3 |
CPSC-21000 | Programming Fundamentals |
3 |
CPSC-22000 | Introduction to Unix |
3 |
CPSC-24500 | Object-Oriented Programming |
3 |
OR |
|
|
CPSC-24700 | Web and Distributed Programming |
3 |
CPSC-28100 | Introduction to Networks |
3 |
CPSC-30000 | Computer Organization |
3 |
CPSC-33000 | Database Systems |
3 |
CPSC-35000 | Operating Systems |
3 |
CPSC-48500 | Enterprise Networking, Security, and Automation |
3 |
CPSC-49300 | Computer Infrastructure Capstone Project |
3 |
INSY-23000 | Legal and Ethical Issues in Computing |
3 |
INSY-30500 | Cloud Computing Strategies |
3 |
INSY-33500 | Introduction to Information Security |
3 |
MATH-21000 | Discrete Mathematics |
4 |
II. Concentrations
The following concentrations are offered through the Bachelor of Science in Information Technology degree. To earn a concentration, as student must take 12 credit hours of coursework toward that concentration. A student may earn multiple concentrations by taking twelve credit hours of coursework toward each. Where specified, a course may count toward multiple concentrations.
A. Cybersecurity (12)
Concentration: CYBS
CPSC-42000 | Cybersecurity Essentials |
3 |
CPSC-42100 | Advanced Cybersecurity |
3 |
CPSC-42200 | Wireless Security |
3 |
CPSC-42300 | Ethical Hacking |
3 |
B. Data Privacy (12)
Concentration: DTPR
CPSC-42500 | Encryption and Authentication Systems |
3 |
INSY-35000 | Cybersecurity Policy and Strategy |
3 |
INSY-35100 | Security Assessment and Risk Management |
3 |
INSY-45000 | Enterprise Security |
3 |
C. Digital Forensics (12)
Concentration: DGTL
CPSC-25000 | File Systems and Digital Forensics |
3 |
CPSC-42600 | Mobile Devices Forensics |
3 |
INSY-33600 | Computer Forensics for Business Applications |
3 |
INSY-46000 | Cybercrime Prevention Tools |
3 |
D. Enterprise Computing (12)
Concentration: ENCC
CPSC-35500 | Cloud Computing and Virtualization |
3 |
CPSC-48000 | Client-Server Computing |
3 |
INSY-45000 | Enterprise Security |
3 |
BSAN-33400 | Business Intelligence |
3 |
E. Networking (12)
Concentration: NETW
CPSC-28200 | Switching, Routing, and Wireless Essentials |
3 |
CPSC-35500 | Cloud Computing and Virtualization |
3 |
CPSC-38200 | Network Security |
3 |
CPSC-42200 | Wireless Security |
3 |
F. Project Management (12)
Concentration: PROJ
INSY-31000 | Principles of Project Management |
3 |
INSY-32500 | Introduction to Six Sigma |
3 |
INSY-42500 | Advanced Project Management |
3 |
INSY-43500 | Business Process Management |
3 |
G. No Declared Concentration (12)
Concentration: ITNC
Take any four DATA, CPSC, or INSY courses at or above the 20000-level. This concentration may not be supplemented by any additional concentration.
III. Advanced Writing Requirement
The Advanced Writing Requirement of the General Education Curriculum is satisfied by successful completion of CPSC 49300 Computer Infrastructure Capstone.
IV. Recommended Minors
Pursuing a minor gives students an opportunity to explore an area of interest in greater depth. Information Technology professionals help organizations of all kinds access, store, communicate and secure their data, and this gives students great freedom to choose a minor that aligns with their personal or professional interests. However, the following minors align most closely with the coursework of the major:
- Minor in Computer Science
- Minor in Cybersecurity
- Minor in Data Science
- Minor in Mathematics
The requirements for some of these minors overlap with those of the major. To earn a minor, a student must take at least two upper-division courses that count exclusively for the minor. A student may not both major and minor in Information Technology.