Applications for the fall 2017 semester are now closed.
Applications for the spring 2018 semester open September 1.
The program offers four concentrations, two of which are devoted to Information Systems (Integrated Application Development and Business Systems Analysis) – those applications that help enable a business to run. The third concentration is Information Technology – the management, care and feeding of the infrastructure on which information systems run. The fourth is Cybersecurity – the development, building and maintenance of secure systems and networks.
By 2020, the need for qualified information security professionals is expected to grow by nearly 30%. To help meet the need for more information security professionals, the Cybersecurity concentration is designed to prepare students for success in IT Security, Cybersecurity, Information Assurance, and Information System Security. Building off the core of the Applied Computing Bachelor’s program, the concentration covers key areas of cyber and computing security that impart the knowledge and skills needed to thwart malicious cyber activity and to build and maintain secure systems and networks.
The Integrated Application Development and Business Systems Analysis concentrations prepare students to design, build and implement information systems for business and other enterprises. By leading organizations in the development of information systems, IS professionals facilitate strategic planning, managerial decision making and operational management within the organization. Some common job titles in the field are Programmer, Systems Developer, Systems Analyst, Systems Integrator, Systems Engineer, Web Designer, Database Developer, Database Specialist, IS Manager, and Chief Information Officer.
The IT concentration prepares students to participate in decisions relative to the acquisition and operation of hardware and mission critical software within an organization. IT professionals guide the selection and integration of the hardware and software products that constitute the organizations' planning, decision making and operational infrastructure. They are involved in selecting and are responsible for installing, configuring and supporting the complete computing environment of an organization. Some common job titles in the field are Network Specialist, Support Specialist, Network Administrator, Security Specialist, System Administrator, Web Administrator, IT Managers, and Chief Technology Officer.