Fulfillment of other University Requirements, including 124 total credits, 45 upper division credits, and all General Education Core Outcomes (GECOs)
70 credits, 25 in residence, 40 upper division
– IST 101 – Introduction to Information Technology, 4 credits
[All courses below have a prerequisite of IST 101 and a co-requisite of MA 111]
– IST 130 – Computer Hardware, 4 credits
– IST 140 – Operating Systems, 4 credits
– IST 150 – Networking, 4 credits
– IST 160 – Server Administration, 4 credits
[Courses below have a prerequisite of IST 160]
– IST 210 – Introduction to Python Programming and Scripting, 4 credits
– IST 220 – Fundamentals of Information Security, 4 credits
– IST 221 – Cybersecurity Operations, 4 credits
– IST 290 – Cybersecurity Lab / Internship, 3 credits
– IST 330 – IT Project Management, 3 credits
– MA 251 – Calculus, 3 credits
[Courses below have a prerequisite of IST 221]
– IST 340 – Linux System Administration, 8 credits
– IST 321 – Ethical Hacking, 4 credits
– IST 350 – Cloud Computing, 4 credits
[Courses below have a prerequisite of IST 350]
– IST 421 – Enterprise Security, 3 credits
– IST 422 – Risk Management and Incident Response, 3 credits
– IST 423 – Security Research and Analysis, 2 credits
– IST 424 – Integration of Computing, Communications and Business, 2 credits
– IST 490 – Advanced Cybersecurity Lab / Internship, 3 credits
Recommended General Education Courses
– GECO-L2: Written Communication, 3 credits
– GECO-C2: Foundational Beliefs
– GECO-L5: Artistic Expression
– GECO-C3: Healthy Lifestyle
– GECO-C4: Ethical Worldview (HUM 210/BUS 290)
– GECO-C1: Spiritual Journey (REL 320)
– GECO-U1: Human Behavior and Social Systems (PSY 140)
– GECO-L9: Historical Context (HIS 211)
– GECO-L1: Connections among disciplines (HUM 310/HUM 410)
Upon completion of all degree requirements, students should be able to:
Communicate professionally and effectively with diverse constituents.
Configure, manage and maintain computer hardware and software.
Securely install a given OS, remove or shut down unnecessary components and services, close unnecessary ports, and ensure that all patches and updates are applied.
Install and configure network components, both hardware- and software-based, to support organizational objectives, including security.
Use a programming or scripting language to solve complex problems in a secure and robust manner.
Use common tools and techniques to protect information technology assets and infrastructure from external and internal threats.
Monitor systems for anomalies, vulnerabilities, proper updating, and patching.
Analyze problems, recommend solutions, products, and technologies to meet business objectives.
Select methods or tools appropriate to conduct different types of cybersecurity assessments and analyze the results.
Integrate PCs, servers, storage, networks, cloud services and applications into a secure enterprise architecture.
Identify the opportunities and barriers in the technology field for a just society.
Analyze the relationship of technology to emerging issues in faith, society, and ethics.
Demonstrate the connection between technology and holistic human development.
Solve new problems in a rapidly changing technological environment through the synthesis of existing knowledge and a process of continuous research and learning.