Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE



Similar documents
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu COLLEGE OF BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu COLLEGE OF BUSINESS MASTER OF SCIENCE IN ACCOUNTING RECOGNIZED MARKETABLE FLEXIBLE FLEXIBLE / AFFORDABLE / VALUABLE

RECOGNIZED MARKETABLE FLEXIBLE. Jeanetta Swanson Student COLLEGE OF BUSINESS MASTER OF SCIENCE IN HUMAN RESOURCE MANAGEMENT. Apply today: strayer.

RECOGNIZED MARKETABLE FLEXIBLE. Kenneth Pough Alumnus COLLEGE OF BUSINESS MASTER OF SCIENCE IN ACCOUNTING. Apply today: strayer.

Apply today: strayer.edu COLLEGE OF BUSINESS MASTER OF BUSINESS ADMINISTRATION RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE

Missouri Kansas City Campus December 27, Holmes Road Suite 100 Kansas City, MO

Strayer University Catalog 2014/2015 Spring 2015 Addendum March 16, 2015

Cyber threats are growing.

THE SCHOOL OF NURSING

Computer Information Technology

Software Applications Development Bachelor s Degree Program

Software Development

COMPUTERS. Working Conditions Teamwork is essential in most computer occupations and there is a strong need to adapt to the ever changing technology.

Information Systems Technology & Cybersecurity Programs

Associate s Degree Program

THE SCHOOL OF NURSING

Education for the Future.

Critical career expertise in the age of technology

Union County College Faculty Curriculum Committee. New Program Proposal Form

Recommended General Education Academic Core AAS Diploma Certificate Minimum General Education Hours Required: 15 SHC 6 SHC 0 SHC

Your guide to a better future.

Academic Programs INFORMATION TECHNOLOGY

College/University Transfer Programs

Table of Contents. Associate Degrees. Visit Our Website:

Triton College Transfer Guide Bachelor of Science in Computer Science

Provided by: Northeast Alabama Tech Prep Consortium. Name:

Transfer Articulation Agreement

Approved Electives. Approved Humanities Transfer Electives. Educational Information. Minimum Requirements for Associate Degrees in the VCCS

Associate of Applied Science Degree

The College of Information and Computer Technology

BRONX COMMUNITY COLLEGE OF THE CITY UNIVERSITY OF NEW YORK ARTICULATION AGREEMENT FORM

COURSE CATALOG

174 School of Business and Information Systems. Associate of Applied Business Degree

BRONX COMMUNITY COLLEGE OF THE CITY UNIVERSITY OF NEW YORK ARTICULATION AGREEMENT FORM

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

Table of Contents. Table of Contents... i University General Education... 1 College of Business Administration... 4

ONLINE BACHELOR DEGREE PROGRAMS

Cybersecurity AAS Program

STATE BOARD OF COMMUNITY COLLEGES NEW AND ARCHIVED CURRICULUM STANDARDS. Information Technology Alignment Project (ITAP) for

Two degrees of success:

COMPUTER AND INTERNETWORKING TECHNOLOGIES

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

Information Technology & Computer Science

EDUCATION FOR THE FUTURE.

Daymar Disclosures - Information Page

with a Concentration in Computer Information Systems

Course Equivalency Guide between Ashford University and MacCormac College

INFORMATION TECHNOLOGY

Provided by: Northeast Alabama Tech Prep Consortium. Name:

Welcome to Baruch College!

School of Management and Information Systems

Get Ahead This Summer Online Course Schedule

Provided by: Northeast Alabama Tech Prep Consortium. Name:

2014 CAA-UGETC Articulation Agreement

College of Professional Studies

Education for the Future.

Resource Room Document Certificates/Degrees: Business Paralegal Computer Science Art & New Media

Computer Information Systems Associate of Arts Degree Plans

Provided by: Northeast Alabama Tech Prep Consortium. Name:

Elizabeth City State University Elizabeth City, NC

technology-based careers

PROGRAMS STUDY. Information Technology

The Excelsior Master of Business Administration

SCHEDULE OF CLASSES FALL 2014

A Future Worth Investigating

MEDICAL ASSISTANT. programs offered. Associate of Applied Science Degree

UNION COUNTY COLLEGE ACADEMIC PROGRAM REVIEW. Business/Public Administration. Associate in Arts Degree

COMPUTER & INFORMATION TECHNOLOGY DEPARTMENT

2o013-20o14 GUILFORD TECHNICAL COMMUNITY COLLEGE

Charter Oak State College. Bachelor of Science in Business Administration [L]

Get Ahead This Summer

OVERVIEW DEGREES & CERTIFICATES

ARTICULATION AGREEMENT IN BUSINESS ADMINISTRATION BETWEEN JAMESTOWN COMMUNITY COLLEGE AND ALFRED UNIVERSITY

Paralegal Associate s Degree Program

Proposal for a BA in Applied Computing

TRANSFER ARTICULATION AGREEMENT BETWEEN BERGEN COMMUNITY COLLEGE AND FELICIAN COLLEGE

Interdisciplinary Studies with Emergency Services Administration Emphasis

UNIVERSITY OF HARGEISA

COMPUTER INFORMATION SYSTEMS

INDIANAPOLIS, IN 2011 CATALOG Volume 78

How To Study At The Collat School Of Business Online

Dual Credit in Indiana Q & A. Version 7.8 October 30, 2012

UNION COUNTY COLLEGE ACADEMIC PROGRAM REVIEW. Business Associate in Arts Degree

Information Technology Management Bachelor of Science Degree (B.S.)

Associate of Applied Science Degrees

Doctor of Architecture and Master of Architecture

Associate of Applied Science Degrees. Associate of Arts & Sciences Degrees. Administration of Justice. Business Administration

Types of Engineering and Natural Science Courses

UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY

Bachelor of Business Administration Degree

TECHNICAL STUDIES & INDIVIDUALIZED STUDIES

Associate of Arts and Sciences Degree in Business Administration

Morningside College Northeast Iowa Community College Transfer Guide

Information Technology Networking Specialist Microsoft Enterprise Administrator

Computer and Information Science Division xxx

ONLINE BACHELOR DEGREE PROGRAMS

Transcription:

RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE / VALUABLE

OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT) PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY S WORKPLACES. Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer the sophisticated computer-based technologies that power today s workplaces. For any organization to progress, technology is vital as are the well-trained professionals who understand how to manage, protect, and enhance it. At Strayer University, you ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career. * The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire, providing a live, networked environment, with anytime-anywhere access. KEY LEARNING OBJECTIVES APPLY knowledge of computing and the current use of technology techniques, skills, and tools necessary for the computing practice. DEMONSTRATE the ability to locate, critically evaluate, and solve business problems with technology solutions using qualitative and quantitative information. DESIGN, implement, and evaluate computer-based systems, processes, components, or programs to meet desired needs. DEMONSTRATE an understanding of the professional, ethical, legal, security, and social issues and responsibilities in the information technology domain. DEMONSTRATE the ability to communicate and function effectively with a range of audiences to accomplish a common goal. ANALYZE the impact of computing on individuals, organizations, and society. UNDERSTAND the relevance of continuing professional development requirements in the information technology domain. DEMONSTRATE the ability to identify and analyze user needs in the selection, creation, evaluation, and administration of computer-based systems. EXPLAIN the use of best practices and technology standards, and their application in an organizational context. DEMONSTRATE the ability to analyze and create effective information technology project plans with graphic representations into the user environment. Accreditations and Approvals STRAYER UNIVERSITY IS ACCREDITED BY THE MIDDLE STATES COMMISSION ON HIGHER EDUCATION an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education. Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA 19104. (267-284-5000) THE NATIONAL SECURITY AGENCY (NSA) COMMITTEE ON NATIONAL SECURITY SYSTEMS (CNSS) certifies that Strayer University s information security curriculum meets the national training standards for information systems security professionals and system administrators (NSTISSI No. 4011, 4013). Additionally, the BSIS curriculum aligns with curricular guidelines set by the Association for Computing Machinery (ACM).

PROGRAM CONCENTRATIONS The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique career and learning goals: Cyber Security Management Become an authority on protecting data assets. You ll explore the design, implementation, and management of security initiatives in common and complex computing environments. Learn the knowledge, skills, legal background, and ethical principles necessary for sound and effective policy development. Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Cybersecurity Technology Get extensive tactical preparation in the design and protection of data assets. You ll focus on defending digital assets, systems, and information from cybercrime attacks, including viruses, botnets, worms, and Trojans. Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Database Technology Learn to create and administer enterprise databases in support of practical businesses problems. Focus on applying effective database security, redundancy, and data transformation strategies to real-world situations. Coursework provides graduates with competencies applicable to database administration. Typical responsibilities include coordinating changes to, testing, and implementing databases; and planning effective security measures. Digital Forensics Technology Investigate the world of forensics related to digital evidence and devices. Get applied knowledge, skills, and practice in identifying and creating a digital forensic investigation, examination, and response. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Internetworking Technology Learn the ins and outs of administering and designing enterprise internetwork environments for efficient information and resource management. Coursework provides proficiencies for students interested in pursuing roles such as Network Analyst, Systems Engineer/Analyst, Network Specialist, System Programmer, or Telecommunications Manager. Networking Technology Understand how to create and administer enterprise computing environments that successfully address practical business problems. Coursework provides graduates with additional competencies to assume roles similar to Computer Software Engineers. Typical job responsibilities in computer software engineering include developing, creating, and modifying general computer applications software or specialized utility programs, analyzing user needs and developing software solutions, designing software or customizing software for client use with the aim of optimizing operational efficiency, analyzing and designing databases within an application area, and working individually or coordinating database development as part of a team. Programming Technology Prepare for you future role in designing, writing, documenting, developing, and implementing computer programs that generate real enterprise solutions for businesses and organizations. Coursework provides students with competencies applicable to Computer Programmers. Responsibilities may include converting project specifications and statements of problems/procedures to logical flow charts for coding; developing programs to store, locate, and retrieve documents, data, and information; and programming websites. Web Development Technology Build a strong knowledge and skill base in the design, coding, and development of Web applications as applied to practical business problems. Coursework prepares students to assume roles as Web Developers, with a focus on design and building Web applications and websites; creating and specifying architectural and technical parameters; and directing content creation, enhancement, and maintenance. Enterprise Security Technology Become adept at identifying and creating powerful, effective enterprise security solutions as applied to practical business problems. You ll develop competencies for securing and administering digital assets in an organization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst.

COURSE OF STUDY Bachelor of Science in Information Technology Area I-Core Component 27.0 Credit Hours ACC 100 Accounting I BUS 100 Introduction to Business CIS 106 Introduction to Information Technology CIS 110 Computer Programming Design ENG 115 English Composition MAT 104 Algebra with Applications Area II-Major Component 45.0 Credit Hours CIS 111 Introduction to Relational Database Management Systems CIS 175 Introduction to Networking CIS 210 Systems Analysis and Development CIS 273 Web Design & Development CIS 312 Computer Architecture CIS 329 Administering Desktop Clients OR CIS 337 Internetworking Basics CIS 333 Network Security Fundamentals CIS 375 Human Computer Interaction MAT 200 Pre-Calculus CIS 498 Undergraduate Information Technology Capstone Component Students must choose one of the following Area II Concentration Components to complete the Bachelor of Science in Information Systems. Area III-General Education Component 54.0 Credit Hours ENG 215 Research and Writing ENG 315 Professional Communications OR ENG 316 Technical Writing (Required for IT) HIS 105 Contemporary U.S. History OR POL 110 U.S. Government HUM 111 World Cultures I HUM 112 World Cultures II MAT 311 Discrete Math PHI 210 Critical Thinking PSY 100 Psychology of Adjustment OR PSY 105 Introduction to Psychology REL 212 World Religions SCI 110 Introduction to Physical Science OR SCI 115 Introduction to Biology SOC 100 Introduction to Sociology ECO 405 Economic Problems and Issues OR POL 300 Contemporary International Problems OR SOC 300 Sociology of Developing Countries Area IV-Elective Component 40.5 Credit Hours These courses are selected in consultation with the Academic Advisor; within this component it is possible for students to develop a minor in a second area of study (See Minors ). Students attending New Jersey campuses must take five electives from the General Studies disciplines listed in the catalog: Economics, English, Foreign Language, History, Humanities, Mathematics, Philosophy, Political Science, Psychology, Religion, Science and Sociology. Minimum Total Quarter Hours Required for Completion 180.0 Concentration in Cyber Security Technology SEC 420 Perimeter Defense Techniques SEC 435 Network Penetration Testing Concentration in Database Technology CIS 267 Visual Basic Programming CIS 424 Database Administration I CIS 428 Database Administration II Concentration in Digital Forensics Technology SEC 340 Computer Forensic Technology SEC 435 Network Penetration Testing Concentration in Enterprise Security Technology SEC 420 Perimeter Defense Techniques SEC 459 Disaster Recovery & Virtualization Concentration in Internetworking Technology CIS 411 Advanced Routing CIS 413 Internetworking Switching CIS 436 Internetworking Troubleshooting Concentration in Networking Technology CIS 401 Network Server Administration II CIS 409 Directory Service Infrastructure OR CIS 442 Application Server Development Concentration in Programming Technology CIS 267 Visual Basic Programming CIS 242 C++ Programming OR CIS 406 Java Programming I CIS 328 C++ Programming II OR CIS 407 Java Programming II Concentration in Web Development Technology CIS 267 Visual Basic Programming CIS 307 Web Development I CIS 309 Web Development II All courses are 4.5 credits. Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative.

ON CAMPUS, ONLINE, ON YOUR SCHEDULE. For a 120-year-old university, we re pretty forward-thinking. With 100 campuses spread across 25 states, we re just about anywhere you look. And we offer convenient class times to fit your busy life including evenings and weekends. You can even jump on your laptop or access Strayer s mobile app, to participate in online classes wherever you are. Whether you prefer learning online, on campus, or even both, a Strayer education prepares you for the future by allowing you to earn your degree on your schedule. Go to strayer.edu to find a convenient campus location near you. RESOURCES AND SUPPORT? CHECK. Just like pursuing higher education, finding a job can often require hours of preparation and research and a little support can go a long way. Our University Career Center (UCC) offers a number of proven and go to market resources designed to meet your career needs and boost your professional development giving you an edge over the competition. No matter what your career path is, we re here to help every step of the way. With free Microsoft software and discounted HP hardware, you ll be able to save hundreds of dollars using Strayer s Tech Pack. Strayer s convenient mobile app allows you to participate in classes, find a campus, connect in social media, get help and more. It s available for Apple and Android, and a must-have for any Strayer student. Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University s academic programs, please go to www.strayer.edu/academic-program-information. Students may be required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B, 09-05-1898T 10-05-1934B, 10-05-1933B. This institution is approved by the Indiana Board for Proprietary Education, 101 W Ohio St., Ste. 670, Indianapolis, IN 46204-1985, 317.464.4400 Ext. 138. For licensure and certification information, please go to https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org.

GET A BETTER IDEA OF WHAT S AHEAD. You already know your goals, but may need a better idea of how much it could cost to reach them. These charts are designed to provide you with a general overview of tuition, and the amount of time it could take to earn your degree. Since every Strayer student brings their own unique experience, your costs and time to completion can vary depending on things like transferable credits, loans, grants, scholarships, even life experience. For a clearer breakdown of your Strayer education, start by reviewing the charts below. Then begin your Personal Education Plan for a more in-depth look. IF YOU ARE: NUMBER OF CLASSES TIME TO GRADUATE Full-time 3 or more classes per quarter 3.5 years or fewer Part-time 2 or fewer classes per quarter 5 years or more The times to graduate assume that students are enrolled in consecutive quarters. Transfer of college credit, challenge exams, and other individual circumstances may allow you to complete your degree sooner. Students study at their own pace and on their own schedule. Normal time for program completion is 6.5 years. YOU RE ALREADY QUALIFIED TO LEARN. YOU MAY QUALIFY TO SAVE. There are many ways to cut the cost on a premium education. Federal or private loans Grants Tuition assistance from your employer COURSES REQUIRED TRANSFER CREDITS ACCEPTED QUARTER LENGTH 40 YES 11 WEEKS COURSE COST Full time $1,700 Part time $1,775 *Textbooks and supplies are not included in the tuition rate and must be purchased by the student. You should allow approximately $150 per course for textbooks and supplies. Does not include the application fee of $50 or the technology fee of $45. In Tennessee, tuition for full-time undergraduate studets is $1775 per course. Military tuition assistance Scholarships IT ONLY TAKES A FEW MINUTES TO PLAN YOUR FUTURE. At Strayer, we understand the thought of pursuing a higher education can be overwhelming. That s why we ve created the Personal Education Plan a step-by-step planner that helps to provide the estimates and answers to everything you want to know, instantly. Strayer s Personal Education Plan will even answer your questions about tuition, scheduling, graduation dates, and the most important question of all When do I start? EARNING YOUR DEGREE IS CHALLENGING. PLANNING FOR IT DOESN T HAVE TO BE. BUILD YOUR PERSONAL EDUCATION PLAN TODAY. Visit STRAYER.EDU to build your education plan Program Length: Strayer University students are mostly working adults who earn their degrees at their own pace and on their own schedule. Most students attend part-time, and the normal time to complete this program is 6 years. The applicable U.S. Department of Education regulation does not permit the disclosure of the on-time graduation rate or median debt amounts for this program. Program Costs: Cost information for Strayer University programs is available at www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program, at current part-time tuition rates, are $72,400, and at current full-time tuition rates, are $69,000. The tuition and fees for the entire program for all Tennessee students are $72,400. The total estimated cost for books and supplies for the entire program is $6,000. Strayer University does not offer on-campus housing. Occupations: The following U.S. Department of Labor Standard Occupational Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S. Department of Education regulations, and correspond to the U.S. Department of Education Classification of Instructional Programs (CIP) Code for this program. Computer and Information Systems Managers 11-3021.00; Computer and Information Research Scientists 15-1111.00; Computer Network Architects 15-1143.00; Computer Systems Analysts 15-1121.00; Informatics Nurse Specialists 15-1121.01; Information Security Analysts 15-1122.00; Software Developers, Applications 15-1132.00; Software Developers, Systems Software 15-1133.00; Telecommunications Engineering Specialists 15-1143.01. For more information, please visit: http://online.onetcenter.org/crosswalk