The Information Technology (IT) curriculum prepares graduates for employment in the technology sector as designers, testers, support technicians, system administrators, developers, or programmers who use computer software and\or hardware to design, process, implement and manage information systems in specialties such as database services, security, business intelligence, healthcare informatics and others depending on the technical path selected within this curriculum.
Course work includes development of a student’s ability to create, store, communicate, exchange and use information to solve technical issues related to information support and services, interactive media, network systems, programming and software development, information security and other emerging technologies based on the selected area of study.
Graduates should qualify for employment in entry-level positions with businesses, educational systems, and governmental agencies which rely on computer systems to design and manage information. The program will incorporate the competencies of industry-recognized certification exams.
Admission to this program requires that students be high school graduates or have a recognized equivalency.
Program Learning Objectives
Graduates of this program will be able to:
- A25590F Technical Support: Identify methods and technologies to evaluate, troubleshoot, and solve technical problems in an Information Technology system.
- A25590H Cybersecurity & Networking: Build a simple local area network and secure the network by identifying risks and implementing policies.
- A25590G Mobile & Web Development: Develop and use a program that demonstrates understanding of programming essentials, including control structures, events, exceptions, forms, and classes.
Graduates should qualify for employment in:
- computer support specialists
- database administrators
- information systems managers
- telecommunications specialists
- web developers.
Executive Director of Career Programs
Courses in this program
|Course||Course Code||Credit Hours||Link to course details|
This course introduces students to the Network concepts, including networking terminology and protocols, local and wide area networks, and network standards. Emphasis is placed on securing information systems and the various implementation policies. Upon completion, students should be able to perform basic tasks related to networking, mathematics, terminology, media and protocols.
This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.
This course introduces protocol analysis. Topics include protocol analysis tools, TCP/IP concepts, Internet protocols, network traffic analysis, monitoring network traffic, network security, protocol analysis, and understanding data flow through protocol analysis. Upon completion, students should be able to perform simple protocol analysis to determine baseline network performance and identify anomalies.
This course provides an overview of security administration and fundamentals of designing security architectures. Topics include networking technologies, TCP/IP concepts, protocols, network traffic analysis, monitoring, and security best practices. Upon completion, students should be able to identify normal network traffic using network analysis tools and design basic security defenses.
This course introduces the principles of securing networks using routers and firewalls. Topics include networking protocols, threat mitigation, firewall configuration, authentication, authorization, intrusion detection, encryption, IP security, VPNs, and remote access technologies. Upon completion, students should be able to secure internal networks using router and firewall technologies.
This course introduces the student to intrusion detection methods in use today. Topics include the types of intrusion detection products, traffic analysis, and planning and placement of intrusion detection solutions. Upon completion, students should be able to plan and implement intrusion detection solution for networks and host-based systems.