1 RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE / VALUABLE
2 OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT) PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY S WORKPLACES. Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer the sophisticated computer-based technologies that power today s workplaces. For any organization to progress, technology is vital as are the well-trained professionals who understand how to manage, protect, and enhance it. At Strayer University, you ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career. * The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire, providing a live, networked environment, with anytime-anywhere access. KEY LEARNING OBJECTIVES APPLY knowledge of computing and the current use of technology techniques, skills, and tools necessary for the computing practice. DEMONSTRATE the ability to locate, critically evaluate, and solve business problems with technology solutions using qualitative and quantitative information. DESIGN, implement, and evaluate computer-based systems, processes, components, or programs to meet desired needs. DEMONSTRATE an understanding of the professional, ethical, legal, security, and social issues and responsibilities in the information technology domain. DEMONSTRATE the ability to communicate and function effectively with a range of audiences to accomplish a common goal. ANALYZE the impact of computing on individuals, organizations, and society. UNDERSTAND the relevance of continuing professional development requirements in the information technology domain. DEMONSTRATE the ability to identify and analyze user needs in the selection, creation, evaluation, and administration of computer-based systems. EXPLAIN the use of best practices and technology standards, and their application in an organizational context. DEMONSTRATE the ability to analyze and create effective information technology project plans with graphic representations into the user environment. Accreditations and Approvals STRAYER UNIVERSITY IS ACCREDITED BY THE MIDDLE STATES COMMISSION ON HIGHER EDUCATION an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education. Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA ( ) THE NATIONAL SECURITY AGENCY (NSA) COMMITTEE ON NATIONAL SECURITY SYSTEMS (CNSS) certifies that Strayer University s information security curriculum meets the national training standards for information systems security professionals and system administrators (NSTISSI No. 4011, 4013). Additionally, the BSIS curriculum aligns with curricular guidelines set by the Association for Computing Machinery (ACM).
3 PROGRAM CONCENTRATIONS The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique career and learning goals: Cyber Security Management Become an authority on protecting data assets. You ll explore the design, implementation, and management of security initiatives in common and complex computing environments. Learn the knowledge, skills, legal background, and ethical principles necessary for sound and effective policy development. Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Cybersecurity Technology Get extensive tactical preparation in the design and protection of data assets. You ll focus on defending digital assets, systems, and information from cybercrime attacks, including viruses, botnets, worms, and Trojans. Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Database Technology Learn to create and administer enterprise databases in support of practical businesses problems. Focus on applying effective database security, redundancy, and data transformation strategies to real-world situations. Coursework provides graduates with competencies applicable to database administration. Typical responsibilities include coordinating changes to, testing, and implementing databases; and planning effective security measures. Digital Forensics Technology Investigate the world of forensics related to digital evidence and devices. Get applied knowledge, skills, and practice in identifying and creating a digital forensic investigation, examination, and response. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Internetworking Technology Learn the ins and outs of administering and designing enterprise internetwork environments for efficient information and resource management. Coursework provides proficiencies for students interested in pursuing roles such as Network Analyst, Systems Engineer/Analyst, Network Specialist, System Programmer, or Telecommunications Manager. Networking Technology Understand how to create and administer enterprise computing environments that successfully address practical business problems. Coursework provides graduates with additional competencies to assume roles similar to Computer Software Engineers. Typical job responsibilities in computer software engineering include developing, creating, and modifying general computer applications software or specialized utility programs, analyzing user needs and developing software solutions, designing software or customizing software for client use with the aim of optimizing operational efficiency, analyzing and designing databases within an application area, and working individually or coordinating database development as part of a team. Programming Technology Prepare for you future role in designing, writing, documenting, developing, and implementing computer programs that generate real enterprise solutions for businesses and organizations. Coursework provides students with competencies applicable to Computer Programmers. Responsibilities may include converting project specifications and statements of problems/procedures to logical flow charts for coding; developing programs to store, locate, and retrieve documents, data, and information; and programming websites. Web Development Technology Build a strong knowledge and skill base in the design, coding, and development of Web applications as applied to practical business problems. Coursework prepares students to assume roles as Web Developers, with a focus on design and building Web applications and websites; creating and specifying architectural and technical parameters; and directing content creation, enhancement, and maintenance. Enterprise Security Technology Become adept at identifying and creating powerful, effective enterprise security solutions as applied to practical business problems. You ll develop competencies for securing and administering digital assets in an organization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst.
4 COURSE OF STUDY Bachelor of Science in Information Technology Area I-Core Component 27.0 Credit Hours ACC 100 Accounting I BUS 100 Introduction to Business CIS 106 Introduction to Information Technology CIS 110 Computer Programming Design ENG 115 English Composition MAT 104 Algebra with Applications Area II-Major Component 45.0 Credit Hours CIS 111 Introduction to Relational Database Management Systems CIS 175 Introduction to Networking CIS 210 Systems Analysis and Development CIS 273 Web Design & Development CIS 312 Computer Architecture CIS 329 Administering Desktop Clients OR CIS 337 Internetworking Basics CIS 333 Network Security Fundamentals CIS 375 Human Computer Interaction MAT 200 Pre-Calculus CIS 498 Undergraduate Information Technology Capstone Component Students must choose one of the following Area II Concentration Components to complete the Bachelor of Science in Information Systems. Area III-General Education Component 54.0 Credit Hours ENG 215 Research and Writing ENG 315 Professional Communications OR ENG 316 Technical Writing (Required for IT) HIS 105 Contemporary U.S. History OR POL 110 U.S. Government HUM 111 World Cultures I HUM 112 World Cultures II MAT 311 Discrete Math PHI 210 Critical Thinking PSY 100 Psychology of Adjustment OR PSY 105 Introduction to Psychology REL 212 World Religions SCI 110 Introduction to Physical Science OR SCI 115 Introduction to Biology SOC 100 Introduction to Sociology ECO 405 Economic Problems and Issues OR POL 300 Contemporary International Problems OR SOC 300 Sociology of Developing Countries Area IV-Elective Component 40.5 Credit Hours These courses are selected in consultation with the Academic Advisor; within this component it is possible for students to develop a minor in a second area of study (See Minors ). Students attending New Jersey campuses must take five electives from the General Studies disciplines listed in the catalog: Economics, English, Foreign Language, History, Humanities, Mathematics, Philosophy, Political Science, Psychology, Religion, Science and Sociology. Minimum Total Quarter Hours Required for Completion Concentration in Cyber Security Technology SEC 420 Perimeter Defense Techniques SEC 435 Network Penetration Testing Concentration in Database Technology CIS 267 Visual Basic Programming CIS 424 Database Administration I CIS 428 Database Administration II Concentration in Digital Forensics Technology SEC 340 Computer Forensic Technology SEC 435 Network Penetration Testing Concentration in Enterprise Security Technology SEC 420 Perimeter Defense Techniques SEC 459 Disaster Recovery & Virtualization Concentration in Internetworking Technology CIS 411 Advanced Routing CIS 413 Internetworking Switching CIS 436 Internetworking Troubleshooting Concentration in Networking Technology CIS 401 Network Server Administration II CIS 409 Directory Service Infrastructure OR CIS 442 Application Server Development Concentration in Programming Technology CIS 267 Visual Basic Programming CIS 242 C++ Programming OR CIS 406 Java Programming I CIS 328 C++ Programming II OR CIS 407 Java Programming II Concentration in Web Development Technology CIS 267 Visual Basic Programming CIS 307 Web Development I CIS 309 Web Development II All courses are 4.5 credits. Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative.
5 ON CAMPUS, ONLINE, ON YOUR SCHEDULE. For a 120-year-old university, we re pretty forward-thinking. With 100 campuses spread across 25 states, we re just about anywhere you look. And we offer convenient class times to fit your busy life including evenings and weekends. You can even jump on your laptop or access Strayer s mobile app, to participate in online classes wherever you are. Whether you prefer learning online, on campus, or even both, a Strayer education prepares you for the future by allowing you to earn your degree on your schedule. Go to strayer.edu to find a convenient campus location near you. RESOURCES AND SUPPORT? CHECK. Just like pursuing higher education, finding a job can often require hours of preparation and research and a little support can go a long way. Our University Career Center (UCC) offers a number of proven and go to market resources designed to meet your career needs and boost your professional development giving you an edge over the competition. No matter what your career path is, we re here to help every step of the way. With free Microsoft software and discounted HP hardware, you ll be able to save hundreds of dollars using Strayer s Tech Pack. Strayer s convenient mobile app allows you to participate in classes, find a campus, connect in social media, get help and more. It s available for Apple and Android, and a must-have for any Strayer student. Program availability varies by state and campus. Please visit for program availability. For disclosures regarding Strayer University s academic programs, please go to Students may be required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: B, B, B, B, T B, B. This institution is approved by the Indiana Board for Proprietary Education, 101 W Ohio St., Ste. 670, Indianapolis, IN , Ext For licensure and certification information, please go to https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL ,
6 GET A BETTER IDEA OF WHAT S AHEAD. You already know your goals, but may need a better idea of how much it could cost to reach them. These charts are designed to provide you with a general overview of tuition, and the amount of time it could take to earn your degree. Since every Strayer student brings their own unique experience, your costs and time to completion can vary depending on things like transferable credits, loans, grants, scholarships, even life experience. For a clearer breakdown of your Strayer education, start by reviewing the charts below. Then begin your Personal Education Plan for a more in-depth look. IF YOU ARE: NUMBER OF CLASSES TIME TO GRADUATE Full-time 3 or more classes per quarter 3.5 years or fewer Part-time 2 or fewer classes per quarter 5 years or more The times to graduate assume that students are enrolled in consecutive quarters. Transfer of college credit, challenge exams, and other individual circumstances may allow you to complete your degree sooner. Students study at their own pace and on their own schedule. Normal time for program completion is 6.5 years. YOU RE ALREADY QUALIFIED TO LEARN. YOU MAY QUALIFY TO SAVE. There are many ways to cut the cost on a premium education. Federal or private loans Grants Tuition assistance from your employer COURSES REQUIRED TRANSFER CREDITS ACCEPTED QUARTER LENGTH 40 YES 11 WEEKS COURSE COST Full time $1,700 Part time $1,775 *Textbooks and supplies are not included in the tuition rate and must be purchased by the student. You should allow approximately $150 per course for textbooks and supplies. Does not include the application fee of $50 or the technology fee of $45. In Tennessee, tuition for full-time undergraduate studets is $1775 per course. Military tuition assistance Scholarships IT ONLY TAKES A FEW MINUTES TO PLAN YOUR FUTURE. At Strayer, we understand the thought of pursuing a higher education can be overwhelming. That s why we ve created the Personal Education Plan a step-by-step planner that helps to provide the estimates and answers to everything you want to know, instantly. Strayer s Personal Education Plan will even answer your questions about tuition, scheduling, graduation dates, and the most important question of all When do I start? EARNING YOUR DEGREE IS CHALLENGING. PLANNING FOR IT DOESN T HAVE TO BE. BUILD YOUR PERSONAL EDUCATION PLAN TODAY. Visit STRAYER.EDU to build your education plan Program Length: Strayer University students are mostly working adults who earn their degrees at their own pace and on their own schedule. Most students attend part-time, and the normal time to complete this program is 6 years. The applicable U.S. Department of Education regulation does not permit the disclosure of the on-time graduation rate or median debt amounts for this program. Program Costs: Cost information for Strayer University programs is available at The tuition and fees for the entire program, at current part-time tuition rates, are $72,400, and at current full-time tuition rates, are $69,000. The tuition and fees for the entire program for all Tennessee students are $72,400. The total estimated cost for books and supplies for the entire program is $6,000. Strayer University does not offer on-campus housing. Occupations: The following U.S. Department of Labor Standard Occupational Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S. Department of Education regulations, and correspond to the U.S. Department of Education Classification of Instructional Programs (CIP) Code for this program. Computer and Information Systems Managers ; Computer and Information Research Scientists ; Computer Network Architects ; Computer Systems Analysts ; Informatics Nurse Specialists ; Information Security Analysts ; Software Developers, Applications ; Software Developers, Systems Software ; Telecommunications Engineering Specialists For more information, please visit: