Information Technology Options
Information Technology students may earn Associate in Applied Science degrees in three core areas (Technical Support, Cyber Security and Networking, and Mobile & Web Development). Each degree, diploma, and certificate in Information Technology is listed here. Students may NOT graduate under the A25590 program with no suffix.
The Information Technology (IT) curriculum prepares graduates for employment in the technology sector as designers, testers, support technicians, system administrators, developers, or programmers who use computer software and\or hardware to design, process, implement and manage information systems in specialties such as database services, security, business intelligence, healthcare informatics and others depending on the technical path selected within this curriculum.
Course work includes development of a student’s ability to create, store, communicate, exchange and use information to solve technical issues related to information support and services, interactive media, network systems, programming and software development, information security and other emerging technologies based on the selected area of study.
Graduates should qualify for employment in entry-level positions with businesses, educational systems, and governmental agencies which rely on computer systems to design and manage information. The program will incorporate the competencies of industry-recognized certification exams.
Admission to this program requires that students be high school graduates or have a recognized equivalency.
Program Learning Objectives
Graduates of this program will be able to:
- A25590F Technical Support: Identify methods and technologies to evaluate, troubleshoot, and solve technical problems in an Information Technology system.
- A25590H Cyber Security & Networking: Build a simple local area network and secure the network by identifying risks and implementing policies.
- A25590G Mobile & Web Development: Develop and use a program that demonstrates understanding of programming essentials, including control structures, events, exceptions, forms, and classes.
Graduates should qualify for employment in:
- computer support specialists
- database administrators
- information systems managers
- telecommunications specialists
- web developers.
Executive Director of Career Programs
Courses in this program
|Course||Course Code||Credit Hours||Link to course details|
This course introduces students to the Network concepts, including networking terminology and protocols, local and wide area networks, and network standards. Emphasis is placed on securing information systems and the various implementation policies. Upon completion, students should be able to perform basic tasks related to networking, mathematics, terminology, media and protocols.
This course introduces students to a broad range of operating system concepts, including installation and maintenance. Emphasis is place on operating system concepts, management, maintenance, and resources required. Upon completion of this course, students will have an understanding of OS concepts, installation, management, maintenance, using a variety of operating systems.
This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Upon completion, students should be able to identify information security risks, create an information security policy, and identify processes to implement and enforce policy.
This course provides an overview of security administration and fundamentals of designing security architectures. Topics include networking technologies, TCP/IP concepts, protocols, network traffic analysis, monitoring, and security best practices. Upon completion, students should be able to identify normal network traffic using network analysis tools and design basic security defenses.