The Bachelor of Science in Information Technology (BSIT) provides students the opportunity to complete an undergraduate degree while continuing to work full time. The curriculum introduces students to the information technologies needed in businesses, government, healthcare, schools, and other kinds of organizations.
Tuition Rate:
$33,000
(including fees)
Monthly Payment Plan:
$295 per month
The curriculum facilitates learning by combining theoretical knowledge and practical hands-on expertise, to help students develop core competencies in technology infrastructure, including hardware, software, operating systems, applications, data storage and analytics, communication systems and information security. Students have the opportunity to both learn, plan and manage the entire technology lifecycle.
Admission requirements can be found here.
Please refer to the University Catalog for Tuition and Fees.
10 Semesters/40 months*
* Dependent on course load (i.e., Full-Time, Part-Time)
The following course list does not include general education courses required for the BSIT degree. Please refer to the University Catalog for information on general education requirements.
Core Requirements: | 45 |
Electives: | 15 |
Concentration Requirements: | 15 |
General Education Requirements | 45 |
An introduction to management information systems and the key role in business. A focus on applying information systems to business communication, data management, networking, e-commerce, ethics and security.
The course introduces students to structured programming techniques. Topics include different control statements (decision structures, loops, sequence, selection), functions, fundamental data types, and data structures (arrays and pointers). Upon successful completion of the course, students will apply principles of algorithm formulation and implementation, solve computer problems by using structured programming techniques and adequate tools (compiler, debugger and/or integrated development environment).
This course provides foundational skills for subsequent IT courses. It provides an overview of the discipline of IT, describes how it relates to other computing disciplines, and begins to instill an IT mindset. The goal is to help students understand the diverse contexts in which IT is used and the challenges inherent in the diffusion of innovative technology.
This two-part course series is designed to prepare students to pass the TestOut PC Pro and the optional CompTIA A+ certifications for exams 220-901 and 220-902. These certifications measure not just what students know, but what students can do. It measures student abilities to install, manage, repair, and troubleshoot PC hardware and Windows, Linux, and Mac operating systems.
This course covers the fundamentals of Web-Based Information Technology. Web-based technologies include distributed architecture, networking, database concepts, client and server development, infrastructure management, and web system integration.
This two-part course series is designed to prepare students to pass the TestOut PC Pro and the optional CompTIA A+ certifications for exams 220-901 and 220-902. These certifications measure not just what students know, but what students can do. In addition to covering everything a student needs to know in order to become certified, this course has been designed to help students gain real-world skills that you will use every day as a PC technician.
This course focuses on the foundations of information assurance and security from a business perspective. The course includes important topics related to information assurance and security, such as fundamentals of information assurance and information security, developing security policies, ethics, legal issues, risk management, disaster recovery, human factors, compliance with regulations, and vulnerability issues.
This course covers the IT governance framework and roadmap for planning and implementing a successful IT infrastructure. Key topics covered are: executive view of IT infrastructure, overview of Industry Best Practice Standards, Model and Guidelines covering some aspect of IT governance, principles of Business/IT Alignment Excellence, critical success factors and some select case studies.
This course focuses on database principles and applications, covering topics such as: database theory and architecture; data modeling; designing application databases; query languages; data security; and database applications on the Web.
This course reviews mobile and wireless networks. Key mobile networks topics covered are: basic architecture, mobile communications and mobile internet, mobile IP, and security and performance issues related to mobile computing. Key wireless networks topics covered are: wireless standards and protocols, wireless LANs and cellular networks, and security and performance issues related to wireless networks.
This course focuses on the human-computer interaction. The key topics covered are: user experience design techniques and best practices including requirements analysis, usability studies, prototyping methods, evaluation techniques, and cognitive, social, and emotional theories.
This course gives students a chance to apply their skills and knowledge obtained in previous computer hardware and systems administration, computer networking, information assurance and security, and programming classes to solve a challenging problem. Students will design, test, and manage an end-to-end converging and unified information and communication IT project, using a range of practices and techniques in solving a substantial problem.
Practical course intended for those interested in learning computer networking with an emphasis on earning the Computing Technology Industry Association’s certification Network+, a foundation-level, vendor-neutral international industry credential that validates the knowledge of networking professionals.
Basic concepts of probability and statistics. Includes sets and probability, random variables and probability distribution, sampling, estimation theories, tests of hypotheses.
This course covers mathematical structures, including discrete structures. Key concepts covered are: sets, functions and relations, proof techniques, logic, boolean algebra principles, minimization, graphs and trees, combinatorics, iteration and recursion, complexity analysis, and discrete information technology applications.
Although businesses are accustomed to using the standard financial statements (e.g., balance sheet, profit and loss statement, budget, accounts receivable and revenue and expenses) to report on financial activities, businesses seek additional targeted, timely, and actionable data. In this course, students will study tools and techniques that can be applied to accounting data to provide information for managing risk, improving business processes and efficiency, reducing operating costs, and optimizing the business.
Businesses must understand how their policies, processes and operations affect the organization’s performance. This course examines how businesses can use data to align supply and demand and to evaluate alternative courses of action. The course examines the tools and techniques available to collect, manage, and analyze data to achieve a clearer understanding of a company’s operations and processes.
This course is a basic introduction to data analysis and communication tools. It is intended to expand students’ skills and competencies in using software tools for analyzing data, converting data into information, and creating and delivering presentations to support decision-making.
This course provides the students with understanding of the concepts of data structures used in development of computer applications. The key topics covered include: abstraction and encapsulation through abstract data types, linked lists, stacks, queues, trees, and graphs; knowledge of basic algorithmic analysis; various sorting and searching algorithms.
This course focuses on perspectives, impact, concepts and fundamentals of cloud computing. Key topics include: security and data considerations, cloud computing applications, architecture, knowledge of development in the cloud, and cloud infrastructure and data. Also, reviews strategies for emerging technologies, including current emerging technologies and conceptual emerging technologies.
This course discusses current and past IT ethics issues, including ethical theories used to analyze problems encountered by computer professionals in today’s environment. Key topics covered are: social networking, government surveillance, and intellectual property, which ultimately prepares them to become responsible, ethical users of current and future information technologies.
This course is an opportunity for students to design and integrate project proposal and feasibility studies. The key topics introduced are: principles of project management, teamwork principles, supplier interactions, identifying and using professional technical literature, oral and written presentations.
This course provides a multi-disciplinary approach to health informatics. The course explores the informatics in healthcare delivery and focuses on the clinical applications. The focus is on information technology including hardware, software, systems, and conceptual models of information. Different data types and data models are explored across various functional aspects of healthcare disciplines.
Pre-calculus concepts, including key concepts of trigonometry; conic sections; vectors, matrices complex numbers, probability and combinatorics and series.
Operations are the engines of productivity and profitability of global firms. They produce outputs that satisfy customers, provide employment for employees, and produce returns for shareholders. Enterprises attempt to implement strategy and attain competitive advantage via the strength of their operations. They do so within a complex world of regulations, changing consumer demographics and expectations, and sustainability concerns. Fierce worldwide competition exists in the global environment for both customers and resources. Businesses must therefore strategically manage and optimize their operations to meet the demand of a complex marketplace. In this course, students learn about the stages of business operations, opportunities for improving processes, and the tools and techniques that are available to analyze operations.
This course introduces students to best practices in project management. Topics include definitions of project management and the environment. Students will also write proposals that cover the essential elements: project scope, work breakdown structure (WBS), the project schedule, project budget, and risk management, and project budgets. Group collaboration is emphasized to assist in understanding the effects of team/group dynamics in project management.
This course provides an introduction to the mechanics and politics of organizational and business communication. Contemporary theories and the evolving rules of business and how we communicate in the era of social media are explored. Preparing and delivering reports, messages, and presentations is reviewed with learners having an opportunity to develop documents and messages. Students will practice applying modern organizational communication strategies to internal and external business communication challenges from the lens of leadership with key constituents in mind.
Organizations require quality data that are readily available, in a standard format, and reliably accessible to permit analysis and reporting. Relational databases are one of the major repositories for data, and the Structured Query Language (SQL) is used to access, manipulate and manage that data. Students are taught to use SQL to store, retrieve, manipulate, and analyze data.
Modern, data-driven organizations frequently require complex reporting of their processes and outcomes. This course covers advanced techniques, using popular analytic tools, to produce precise, unambiguous, clear analyses, including reports and visualizations.
The modern, data-driven enterprise requires complex analyses that exceed the capabilities of commercial desktop tools, like spreadsheets. This course introduces students to the best practices in using popular programming languages and environments that are more suitable to complex analyses. Additionally, students apply frameworks to create analyses that align with business needs, develop quality data, and include clear documentation for understanding and reproducing the analyses.
Data obtained within organizational departments and across the enterprise must be stored and organized in a structured environment that enables reliable access, analysis, and reporting. Students will learn the fundamentals of a modern database management tools used to access, analyze, report and modify data.
Increased regulatory and accrediting compliance, as well as a more competitive marketplace with demands for concomitant cost-control and improved outcomes, require robust methods of accessing, analyzing, and reporting. In this course, students examine the use of dedicated reporting applications as tools to produce sophisticated reports and data displays.
This course covers the concepts and principles of information security threats, attacks, and vulnerabilities. The course includes important topics related to indicators of compromise, types of malware, types of attacks, types of vulnerabilities; types of threat actor and attributes; penetration testing; vulnerability scanning and the impact associated with vulnerabilities. This course directly maps to the objectives and outcomes of the official CompTIA Security+ certification exam. This course is also designed based on DHS/NSA’s Center of Academic Excellence criteria and Knowledge Units (KUs), as indicated in parentheses after each course learning outcome (CLO).
This course prepares students to properly use and deploy information security Technologies and Tools. The course includes important topics related to installing and configuring network components, both hardware and software-based, as well as assessing software tools used in an organization to assess the security posture of that organization. This course directly maps to the objectives and outcomes of the official CompTIA Security+ certification exam, and is also designed based on DHS/NSA’s Center of Academic Excellence criteria and Knowledge Units (KUs) guidelines, as indicated in parentheses after each course learning outcome (CLO).
This course explores information security Architecture and Design. The course includes important topics related to use cases and purpose for frameworks, best practices, securing configuration, implementing secure network architectures, implementing secure systems designs, secure staging deployment, security implications of embedded systems; securing application development and deployment; cloud and virtualization concepts. This course also will explore how resiliency and automation strategies reduce risk and the importance of physical security controls. This course directly maps to the objectives and outcomes of the official CompTIA Security+ certification exam, and is also designed based on DHS/NSA’s Center of Academic Excellence criteria and Knowledge Units (KUs) guidelines, as indicated in parentheses after each course learning outcome (CLO).
This course examines information security, identity and Access Management. The course includes important topics related to identity and access management concepts, the installation and configuration of identity and access services; implementing identity and access management controls; and discussions about common account management practices. This course directly maps to the objectives and outcomes of the official CompTIA Security+ certification exam, and is also designed based on DHS/NSA’s Center of Academic Excellence criteria and Knowledge Units (KUs) guidelines, as indicated in parentheses after each course learning outcome (CLO).
This course explains information security Risk Management, Cryptography, and PKI. The course includes important topics related to organizational security risk policies, risk plans and procedures; business impact analysis (BIA), cryptography, algorithms, and their basic characteristics; installation and configuration of wireless security settings and implementation of public key infrastructure. This course directly maps to the objectives and outcomes of the official CompTIA Security+ certification exam, and is also designed based on DHS/NSA’s Center of Academic Excellence criteria and Knowledge Units (KUs) guidelines, as indicated in parentheses after each course learning outcome (CLO).
This course provides students with knowledge and skills to design, develop, and deploy cloud-based solutions; implement core services; maintain network architectures; and leverage tools to automate networking tasks. In addition, students configure, verify, and troubleshoot IPv4/IPv6 addressing and subnetting schemes to satisfy addressing requirements in a LAN/WAN environments.
This is the first of two courses preparing students for the Interconnecting Cisco Network Devices (ICND1) exam. This exam tests a candidate’s knowledge and skills related to network fundamentals, LAN switching technologies, routing technologies, infrastructure services, and infrastructure maintenance. Cisco offers two options for obtaining Cisco Certified Network Associate (CCNA) certification: Pass the 200-125 CCNA exam, which covers both ICND1 and ICND2 or pass both the 100-105 ICND1 AND the 200-105 ICND2 exams.
This is the second of two courses preparing students for the Interconnecting Cisco Network Devices (ICND2) exam. This exam tests a candidate’s knowledge and skills related to LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, and infrastructure maintenance. Cisco offers two options for obtaining Cisco Certified Network Associate (CCNA) certification: Pass the 200-125 CCNA exam, which covers both ICND1 and ICND2 or pass both the 100-105 ICND1 AND the 200-105 ICND2 exams.
The focus of this course is the study of WAN topology and WAN access connectivity options. The students learn to configure, verify, and troubleshoot PPP and MLPPP on WAN interfaces using local authentication, PPPoE client-side interfaces using local authentication, GRE tunnel connectivity, single-homed branch connectivity using eBGP IPv4 and basic QoS concepts.
The CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam is required for the CCNA Security certification. The prerequisite for CCNA Security is the CCNA Route/Switch certification (or any CCIE certification). The CCNA Security exam tests your knowledge of securing Cisco routers and switches and their associated networks. This course prepares you for that exam.
This course examines how managers use large amounts of data to solve business problems. Students will be introduced to basic statistics and data analysis, and learn how to use data to make forecasts and support business decisions. As part of the course requirements, students will practice gathering, organizing, analyzing, data, and presenting their findings.
Conflict is inherent in all organizations and is often driven by the competition for limited resources and power. This course is an introduction to the sources and types of internal and external conflicts, and the strategies for understanding and managing these conflicts.
We have become a global economy, and as a result are operating across different time zones and cultures. Future leaders will need to have skills to create and lead both diverse and dispersed workforces. In this course, students will learn about the challenges of managing in a global economy by reading case studies demonstrating how some organizations have successfully addressed these new leadership challenges.
In this course, students study the following supply chain functions: logistics, operations, purchasing/sourcing, transportation, inventory, and warehouse management. The use of analytical tools to guide decision-making is emphasized.
This course is an examination of strategic management concepts. Students will study the strategic planning process, which includes creating goals, making decisions, taking actions, and analyzing results. The benefits of strategic planning will be identified and distinguished from operational planning. Through discussions, exercises and assignments, students will practice using analytical tools to critically assess an organization’s internal and external environments, competitive opportunities, and threats. Students will be expected to recommend an appropriate organizational strategy, while at the same time critically analyzing other strategic approaches.
This course covers functional and logic programming, concepts of programming language design, and formal reasoning about programs and programming languages. The key topics include: ML/OCaml, operational, axiomatic and denotational semantics, fixpoints and logic programming.
This course emphasize mobile internet application basic and features; Android application basics; UI design; data storage; networking application design; advanced application design (sensors, camera, GPS, Audio etc.); graphics and games; web-based hybrid application design.
This course introduces the field of human-computer interaction (HCI). Students will examine human performance, components of technology, methods and techniques used in design and evaluation of IT as well as the societal impacts of HCI such as accessibility. The course also provides an introduction and evaluation of user-centered design methods, including the contemporary technologies used in empirical evaluation methods.
This course is an introduction to data visualization, non-photorealistic renderings, and perception in virtual environments. It draws from and contributes to work in algorithms, human perception, art, animation, computer vision, and image processing. Key concepts include information visualization, visualization of 2-D and 3-D flow data, multivariate visualization, non-photorealistic rendering, volume visualization, point based modeling and rendering, physically and perceptually-based image synthesis, color appearance design and reproduction, and the investigation of perceptual issues in virtual environments.
Introduction to applications and techniques of Calculus. Key topics include: limits and continuity, derivatives, chain rules and their applications, analyzing functions, integrals, differential equations and applications of integrals.
This course is designed to prepare students to pass the AWS certification for exam SOA-C01. Students will be able to: deploy, manage, and operate scalable, highly available, and fault-tolerant systems on AWS; implement and control the flow of data to and from AWS; select the appropriate AWS service based on compute, data, or security requirements; identify appropriate use of AWS operational best practices; estimate AWS usage costs; identify operational cost control mechanisms and migrate on-premises workloads to AWS.
This course is designed to introduce students to important cloud concepts including the benefits of cloud services, the financial implications, availability and fault tolerance, and disaster recovery. This course also introduces services supported by cloud architecture such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Students will also compare and contrast cloud models including public, private, and hybrid clouds.
This course is designed to prepare students to Manage Azure subscriptions and resources; implement and manage storage; deploy and manage virtual machines; configure and manage virtual networks; manage identities, and creating simple applications.
This course is designed to prepare students to pass the MS Azure certification for exam AZ-102. Key topics covered include: evaluate and perform server migration to Azure; implement and manage application services; implement advanced virtual networking; and secure identities.
This course is designed to prepare students to pass the Google certification for Associate Cloud Engineer exam. The student learns how to deploy applications, monitor operations, and manages enterprise solutions. Also, they will be able to use Google Cloud Console and the command-line interface to perform common platform-based tasks to maintain one or more deployed solutions that leverage Google-managed or self-managed services on Google Cloud.
In this course students will learn to write programs that use data structures; analyze the performance of different implementations of data structures; and decide on appropriate data structures for modeling a given problem. Also, students will be able to create and describe why and how algorithms solve computational problems; explain how programs implement algorithms in terms of instruction processing, program execution, and running processes; apply appropriate mathematical concepts in programming and formal reasoning on algorithm’s efficiency and correctness and evaluate empirically the efficiency of an algorithm.
In this course students create web and mobile apps with effective interfaces that respond to events generated by rich user interactions, sensors, and other capabilities of the computing device. Students will also be able to collaborate in the creation of interesting and relevant apps; build and debug app programs using standard libraries, unit testing tools, and debuggers; evaluate readability and clarity of app programs based on program style, documentation, pre- and post-conditions, and procedural abstractions.
This course covers functional and logic programming, concepts of programming language design, and formal reasoning about programs and programming languages. The key topics include: ML/OCaml, operational, axiomatic and denotational semantics, fixpoints and logic programming.
This course introduce the student to the concepts of object oriented programming. Programming topics include data hiding/encapsulation and abstraction using classes and objects, inheritance, polymorphism, generic programming using template, operator overloading and file I/O.
Introduction to applications and techniques of Calculus. Key topics include: limits and continuity, derivatives, chain rules and their applications, analyzing functions, integrals, differential equations and applications of integrals.
This course introduce the student to the concepts of object oriented programming. Programming topics include data hiding/encapsulation and abstraction using classes and objects, inheritance, polymorphism, generic programming using template, operator overloading and file I/O.
In this course students learn to apply principles of User Experience Design (UXD) to enhance the user experience of a web site or mobile application; express constraints that mobile platforms put on developers, including the performance vs. power tradeoff; contrast mobile programming, web programming, and general-purpose programming; evaluate the design and architecture of a web or mobile system, including issues such as design patterns (including MVC), layers, tradeoffs between redundancy and scalability, state management, and search engine optimization.
In this course students learn to build a simple web site that uses valid HTML and CSS, and apply appropriate web standards from standards bodies such as W3C. They will also be able to develop a web or mobile application that uses industry-standard technologies, integrates serialized data in a structured format such as XML or JSON both synchronously and asynchronously, validates data inputs on the client- and server-side as appropriate, uses cookies, and reads or modifies data in a server-side database.
This course focuses on characteristics such as color depth, compression, codec, and server requirements for graphic media file formats and streaming media formats. Students will learn to propose a graphic file type for a given set of image characteristics and provide metaphors for issues involved in deploying and serving media content.
In this course students learn to use industry-standard tools and technologies for web and mobile development; use a development framework such as jQuery, Angular, Laravel, ASP.NET MVC, Django, or WordPress; and use collaboration tools such as GitHub to work with a team on a web or mobile application.