SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Bachelor of Science in College of Arts &
Information Technology Sciences
The Information Technology (IT) degree from GSU takes you into the worlds of information
security, digital forensics, virtualization, and cloud computing. You will not only learn how to
use technology at GSU; you will learn how to create new uses for it.
FACT
Employment of computer systems analysts is expected to grow 22 percent from 2012 to 2022,
faster than the average of all occupations. A greater reliance on computer systems in
organizations through-out the economy will lead to an increased demand for this occupation.
Source: Bureau of Labor Statistics, Occupational Outlook Handbook, 2012-2013 Edition
Innovative Preparation
This IT program prepares you with cutting edge coursework and advanced real-world projects.
The program collaborates closely with related programs in Computer Science, Criminal
Justice, and Management Information Systems so you can tailor your degree to your career
goals.
As an IT undergraduate, you receive a balance of theory and application as you learn to use a
broad range of software and hardware to design and deploy various computer and network
systems; and to work independently and collaboratively to solve problems.
Outstanding Prospects
You will be prepared for a career in business, industry, and government as a computer
network administrator, computer system administrator, database administrator, computer
systems analyst, computer support specialist, and information security specialist.
You will also be prepared for graduate work in information technology, computer science, and
related fields.
Unlimited Opportunity
GSU offers a superior educational opportunity at an affordable tuition rate. GSU’s outstanding
faculty and quality programs prepare gradates to reach their goals and meet the demands of
the future.
For More Information:
Steve Hyzny Richard Manprisio
Faculty Advisor/ Faculty Advisor/
University Lecturer University Lecturer
708.534.4537 708.235.7636
shyzny@govst.edu rmanprisio@govst.edu
Bachelor of Science in College of Arts &
Information Technology Sciences
Degree Requirements
Students must meet all university requirements for a
bachelor's degree.
General Education Requirements (37-41 Hours)
See Bachelor's Degree Requirements for general
education requirements.
Foundation Courses (3 Hours)
The following course must be taken at the lower-
division level:
CPSC-2005 Introduction to Computer Technology (3)
Program Core Courses (12 Hours)
The following courses must be taken at either the
lower- or upper-division level:
IT-3310 IT Project Management (3)
CPSC-4342 Introduction to Computer Networks (3)
The following courses must be taken at upper-division
level:
IT-3099 Junior Seminar Information Technology (3)
IT-4810 IT Senior Seminar/Project (3)
Program General Selective Courses (15 Hours)
The following courses must be taken at upper-division
level.
Students must take 15 credit hours of general selective
courses from the following:
CPSC-4205 Computer Organization (3)
CPSC-4335 Operating Systems (3)
IT-3110 Fundamentals of Information Technology (3)
IT-3210 Introduction to Scripting Languages (3)
IT-3520 Cisco CCNA I (3)
IT-3521 Cisco CCNA II (3)
IT-4210 Wireless Networks and Security (3)
CPSC-4570 Windows Systems (3)
CPSC-4580 Information Security (3)
Program Concentration Selective Courses (27 Hours)
The following courses must be taken at upper-division
level.
Students must take 27 credit hours of concentration
selective courses from the following. Students may also
take courses in different concentrations.
A. Operating Systems
CPSC-4526 Intro to Microsoft SharePoint Server (3)
CPSC-4535 Introduction to the UNIX System (3)
CPSC-4572 Advanced Windows Administration (3)
IT-4455 Securing Operating Systems (3)
B. Information Security
CPSC - 4581 Information Security Policy & Mgmt.
(3)
CPSC - 4582 Cryptography and Network Security
(3)
CPSC - 4583 Laboratory in Information Security (3)
CPSC - 4584 Spec. Topics in Information Security
(3)
C. Network Infrastructure
IT - 4520 IP Routing (3)
IT - 4521 IP Switched Networks (3)
IT - 4522 Troubleshooting IP Networks (3)
D. Ethical Hacking
IT - 4540 Information Security and Assurance I (3)
IT - 4541 Information Security and Assurance II (3)
E. Digital Forensics
CPSC - 4540 Digital Forensics (3)
CPSC - 4542 Contemp. Issues-Digital Forensics (3)
CPSC - 4622 Special Topics in Digital Forensics (3)
F. Virtualization and Cloud Computing
IT - 4560 Introduction to Virtualization (3)
IT - 4561 Introduction to Cloud Computing (3)
IT - 4562 Spec. Topics in Virtual. & Cloud Comp. (3)
Electives (22-26 Hours)
Total - 120 Hours
Catalog Year 2015-2016

Weitere ähnliche Inhalte

Was ist angesagt?

Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionImproved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionConference Papers
 
Bachelor of it Meloburne
Bachelor of it MeloburneBachelor of it Meloburne
Bachelor of it Meloburneviteduau
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020IJNSA Journal
 
Course summary@bytes
Course summary@bytesCourse summary@bytes
Course summary@bytesprabhatjon
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 

Was ist angesagt? (9)

Cse ppt 2018
Cse ppt 2018Cse ppt 2018
Cse ppt 2018
 
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionImproved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryption
 
ICT BROUSHER
ICT BROUSHERICT BROUSHER
ICT BROUSHER
 
CSE
CSECSE
CSE
 
Bachelor of it Meloburne
Bachelor of it MeloburneBachelor of it Meloburne
Bachelor of it Meloburne
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
 
Course summary@bytes
Course summary@bytesCourse summary@bytes
Course summary@bytes
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 

Ähnlich wie GSU IT Program Fact Sheet

Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallMeg Weber
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study MetroAbhishek Bajaj
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university CybersecurityAbhishek Bajaj
 
cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014Mina Hatami
 
Subject Selection - Computer Studies*
Subject Selection - Computer Studies*Subject Selection - Computer Studies*
Subject Selection - Computer Studies*fairvalehigh
 
Module 3
Module 3 Module 3
Module 3 EX28
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfInfosec Train
 
MSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdfMSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdfSasinduLakshan2
 
Post Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data SciencePost Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data ScienceMamathaSharma4
 
Department of Computer Science - MIT SOE, MIT-ADT University, Pune
Department of Computer Science - MIT SOE, MIT-ADT University, PuneDepartment of Computer Science - MIT SOE, MIT-ADT University, Pune
Department of Computer Science - MIT SOE, MIT-ADT University, PuneVinodRajpurohit4
 
Research topic What is the impact of Gamification on security train.docx
Research topic What is the impact of Gamification on security train.docxResearch topic What is the impact of Gamification on security train.docx
Research topic What is the impact of Gamification on security train.docxbrittneyj3
 
NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003jmailen
 
Unit2_Cyber Security updated.pdf
Unit2_Cyber Security updated.pdfUnit2_Cyber Security updated.pdf
Unit2_Cyber Security updated.pdfMANOJKUMAR595172
 
IIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdf
IIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdfIIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdf
IIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdfaniketagarwal47
 
IIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud Computing
IIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud ComputingIIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud Computing
IIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud Computinganiketagarwal47
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeJcu Singapore
 

Ähnlich wie GSU IT Program Fact Sheet (20)

Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
Saint Leo University by Study Metro
Saint Leo University by Study MetroSaint Leo University by Study Metro
Saint Leo University by Study Metro
 
Saint leo university Cybersecurity
Saint leo university CybersecuritySaint leo university Cybersecurity
Saint leo university Cybersecurity
 
cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014
 
Subject Selection - Computer Studies*
Subject Selection - Computer Studies*Subject Selection - Computer Studies*
Subject Selection - Computer Studies*
 
Module 3
Module 3 Module 3
Module 3
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdf
 
MSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdfMSc-Course-Information-2023.pdf
MSc-Course-Information-2023.pdf
 
Top 5 Career Options After Completing IT Engineering in 2022
Top 5 Career Options After Completing IT Engineering in 2022 Top 5 Career Options After Completing IT Engineering in 2022
Top 5 Career Options After Completing IT Engineering in 2022
 
Post Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data SciencePost Graduate Certificate in Software Engineering for Data Science
Post Graduate Certificate in Software Engineering for Data Science
 
Department of Computer Science - MIT SOE, MIT-ADT University, Pune
Department of Computer Science - MIT SOE, MIT-ADT University, PuneDepartment of Computer Science - MIT SOE, MIT-ADT University, Pune
Department of Computer Science - MIT SOE, MIT-ADT University, Pune
 
Research topic What is the impact of Gamification on security train.docx
Research topic What is the impact of Gamification on security train.docxResearch topic What is the impact of Gamification on security train.docx
Research topic What is the impact of Gamification on security train.docx
 
NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003
 
Unit2_Cyber Security updated.pdf
Unit2_Cyber Security updated.pdfUnit2_Cyber Security updated.pdf
Unit2_Cyber Security updated.pdf
 
IIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdf
IIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdfIIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdf
IIT Jodhpur Postgraduate Diploma in Data Engineering & Cloud Computing.pdf
 
IIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud Computing
IIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud ComputingIIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud Computing
IIT Jodhpur Post Graduate Diploma in Data Engineering & Cloud Computing
 
Infobroschuere
InfobroschuereInfobroschuere
Infobroschuere
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU Singapore
 
Computer engineer
Computer engineerComputer engineer
Computer engineer
 
Some of the Online Computer Courses
Some of the Online Computer Courses Some of the Online Computer Courses
Some of the Online Computer Courses
 

GSU IT Program Fact Sheet

  • 1. Bachelor of Science in College of Arts & Information Technology Sciences The Information Technology (IT) degree from GSU takes you into the worlds of information security, digital forensics, virtualization, and cloud computing. You will not only learn how to use technology at GSU; you will learn how to create new uses for it. FACT Employment of computer systems analysts is expected to grow 22 percent from 2012 to 2022, faster than the average of all occupations. A greater reliance on computer systems in organizations through-out the economy will lead to an increased demand for this occupation. Source: Bureau of Labor Statistics, Occupational Outlook Handbook, 2012-2013 Edition Innovative Preparation This IT program prepares you with cutting edge coursework and advanced real-world projects. The program collaborates closely with related programs in Computer Science, Criminal Justice, and Management Information Systems so you can tailor your degree to your career goals. As an IT undergraduate, you receive a balance of theory and application as you learn to use a broad range of software and hardware to design and deploy various computer and network systems; and to work independently and collaboratively to solve problems. Outstanding Prospects You will be prepared for a career in business, industry, and government as a computer network administrator, computer system administrator, database administrator, computer systems analyst, computer support specialist, and information security specialist. You will also be prepared for graduate work in information technology, computer science, and related fields. Unlimited Opportunity GSU offers a superior educational opportunity at an affordable tuition rate. GSU’s outstanding faculty and quality programs prepare gradates to reach their goals and meet the demands of the future. For More Information: Steve Hyzny Richard Manprisio Faculty Advisor/ Faculty Advisor/ University Lecturer University Lecturer 708.534.4537 708.235.7636 shyzny@govst.edu rmanprisio@govst.edu
  • 2. Bachelor of Science in College of Arts & Information Technology Sciences Degree Requirements Students must meet all university requirements for a bachelor's degree. General Education Requirements (37-41 Hours) See Bachelor's Degree Requirements for general education requirements. Foundation Courses (3 Hours) The following course must be taken at the lower- division level: CPSC-2005 Introduction to Computer Technology (3) Program Core Courses (12 Hours) The following courses must be taken at either the lower- or upper-division level: IT-3310 IT Project Management (3) CPSC-4342 Introduction to Computer Networks (3) The following courses must be taken at upper-division level: IT-3099 Junior Seminar Information Technology (3) IT-4810 IT Senior Seminar/Project (3) Program General Selective Courses (15 Hours) The following courses must be taken at upper-division level. Students must take 15 credit hours of general selective courses from the following: CPSC-4205 Computer Organization (3) CPSC-4335 Operating Systems (3) IT-3110 Fundamentals of Information Technology (3) IT-3210 Introduction to Scripting Languages (3) IT-3520 Cisco CCNA I (3) IT-3521 Cisco CCNA II (3) IT-4210 Wireless Networks and Security (3) CPSC-4570 Windows Systems (3) CPSC-4580 Information Security (3) Program Concentration Selective Courses (27 Hours) The following courses must be taken at upper-division level. Students must take 27 credit hours of concentration selective courses from the following. Students may also take courses in different concentrations. A. Operating Systems CPSC-4526 Intro to Microsoft SharePoint Server (3) CPSC-4535 Introduction to the UNIX System (3) CPSC-4572 Advanced Windows Administration (3) IT-4455 Securing Operating Systems (3) B. Information Security CPSC - 4581 Information Security Policy & Mgmt. (3) CPSC - 4582 Cryptography and Network Security (3) CPSC - 4583 Laboratory in Information Security (3) CPSC - 4584 Spec. Topics in Information Security (3) C. Network Infrastructure IT - 4520 IP Routing (3) IT - 4521 IP Switched Networks (3) IT - 4522 Troubleshooting IP Networks (3) D. Ethical Hacking IT - 4540 Information Security and Assurance I (3) IT - 4541 Information Security and Assurance II (3) E. Digital Forensics CPSC - 4540 Digital Forensics (3) CPSC - 4542 Contemp. Issues-Digital Forensics (3) CPSC - 4622 Special Topics in Digital Forensics (3) F. Virtualization and Cloud Computing IT - 4560 Introduction to Virtualization (3) IT - 4561 Introduction to Cloud Computing (3) IT - 4562 Spec. Topics in Virtual. & Cloud Comp. (3) Electives (22-26 Hours) Total - 120 Hours Catalog Year 2015-2016