Apply today: strayer.edu/apply

Transcription

Apply today: strayer.edu/apply
ON CAMPUS,
ONLINE,
ON YOUR SCHEDULE.
For a 120-year-old university, we’re pretty forward-thinking.
With 100 campuses spread across 25 states, we’re just about
anywhere you look. And we offer convenient class times to fit
GET A BETTER IDEA OF WHAT’S AHEAD.
You already know your goals, but may need a better idea of how much it could cost to reach them. These charts are designed
to provide you with a general overview of tuition, and the amount of time it could take to earn your degree. Since every Strayer
student brings their own unique experience, your costs and time to completion can vary depending on things like transferable
credits, loans, grants, scholarships, even life experience. For a clearer breakdown of your Strayer education, start by reviewing
the charts below. Then begin your Personal Education Plan for a more in-depth look.
IF YOU ARE:
NUMBER OF CLASSES
TIME TO GRADUATE
Full-time
3 or more classes per quarter
3.5 years or fewer
Part-time
2 or fewer classes per quarter
5 years or more
The times to graduate assume that students are enrolled in consecutive quarters. Transfer of college credit, challenge
exams, and other individual circumstances may allow you to complete your degree sooner. Students study at their own
pace and on their own schedule. Normal time for program completion is 6.5 years.
your busy life – including evenings and weekends. You can even
jump on your laptop or access Strayer’s mobile app, to participate
COURSES
REQUIRED
Whether you prefer learning online, on campus, or even both,
40
a Strayer education prepares you for the future by allowing you
to earn your degree on your schedule.
YOU’RE ALREADY QUALIFIED
TO LEARN. YOU MAY QUALIFY
TO SAVE.
There are many ways to cut the cost
on a premium education.
• Federal or private loans
• Grants
• Tuition assistance from your employer
in online classes wherever you are.
Go to strayer.edu to find a convenient
campus location near you.
RESOURCES AND SUPPORT? CHECK.
Just like pursuing higher education, finding a job can often require hours of preparation
and research – and a little support can go a long way. Our University Career Center (UCC)
offers a number of proven and go to market resources designed to boost your career
needs and professional development, while our Career Builder Elite can help give you
an edge over the competition. No matter what your career path is, we’re here to help
every step of the way.
With free Microsoft software and discounted HP hardware,
you’ll be able to save hundreds of dollars using Strayer’s Tech Pack.
TRANSFER CREDITS
ACCEPTED
YES
QUARTER LENGTH
COURSE COST
11 WEEKS
Full time – $1,700
Part time – $1,775
RECOGNIZED
PROVEN
RESPECTED
• Military tuition assistance
• Scholarships
*Textbooks and supplies are not included in the tuition rate and must be purchased by the student. You should allow
approximately $150 per course for textbooks and supplies. Does not include the application fee of $50 or the
technology fee of $45. In Tennessee, tuition for full-time undergraduate studets is $1775 per course.
MARKETABLE
FLEXIBLE
IT ONLY TAKES A FEW MINUTES
TO PLAN YOUR FUTURE.
Bryan Rolle
Student
At Strayer, we understand the thought of pursuing a higher
education can be overwhelming. That’s why we’ve created the
Personal Education Plan – a step-by-step planner that helps to
provide the estimates and answers to everything you want
to know, instantly. Strayer’s Personal Education Plan will even
answer your questions about tuition, scheduling, graduation dates,
and the most important question of all – “When do I start?”
SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
EARNING YOUR DEGREE IS CHALLENGING.
PLANNING FOR IT DOESN’T HAVE TO BE.
BUILD YOUR PERSONAL EDUCATION PLAN TODAY.
Visit STRAYER.EDU to build your education plan
Strayer’s convenient mobile app allows you to participate in classes, find a campus,
connect in social media, get help and more. It’s available for Apple and Android,
and a must-have for any Strayer student.
Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University’s academic programs, please go to www.strayer.edu/academic-program-information. Students may be
required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should
be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B, 0905-1898T 10-05-1934B, 10-05-1933B. Strayer University is regulated by the Indiana Commission on Higher Education, 402 W. Washington Street, Room W462, Indianapolis, IN 46204. (317) 464-4400. For licensure and certification information, please go to
https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org.
Program Length: Strayer University students are mostly working adults who earn
their degrees at their own pace and on their own schedule. Most students attend
part-time, and the normal time to complete this program is 6 years.
Note: The BSIT is a new program offered beginning with the Summer 2012 term,
and as a result On-Time Graduation Rates and Median Loan Debt information are
not yet available.
On-Time Graduation Rate: 80% of our students who graduated from this program
between July 1, 2011 and June 30, 2012, did so within 6.5 years.
Program Costs: Cost information for Strayer University programs is available at
www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program, at
current part-time tuition rates, are $72,400, and at current full-time tuition rates, are
$69,000. The tuition and fees for the entire program for all Tennessee students are
$72,400. The total estimated cost for books and supplies for the entire program is
$6,000. Strayer University does not offer on-campus housing.
Median Loan Debt: For all students completing this program between July 1, 2011
and June 30, 2012, the median cumulative loan debt for each of the following are:
Federal student loans: $0
Private loans: $0
Institutional finance loans: $0
Occupations: The following U.S. Department of Labor Standard Occupational
Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S.
Department of Education regulations, and correspond to the U.S. Department of
Education Classification of Instructional Programs (CIP) Code for this program.
Computer and Information Systems Managers 11-3021.00; Computer and
Information Research Scientists 15-1111.00; Computer Network Architects 151143.00; Computer Systems Analysts 15-1121.00; Informatics Nurse Specialists
15-1121.01; Information Security Analysts 15-1122.00; Software Developers,
Applications 15-1132.00; Software Developers, Systems Software 15-1133.00;
Telecommunications Engineering Specialists 15-1143.01. For more information,
please visit: http://online.onetcenter.org/crosswalk
Apply today:
strayer.edu/apply
FLEXIBLE / AFFORDABLE / VALUABLE
OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT)
PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE
SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY’S
WORKPLACES.
PROGRAM CONCENTRATIONS
Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer
Become an authority on protecting data assets. You’ll explore the design,
implementation, and management of security initiatives in common and
complex computing environments. Learn the knowledge, skills, legal
background, and ethical principles necessary for sound and effective
policy development.
the sophisticated computer-based technologies that power today’s workplaces. For any organization to progress,
technology is vital—as are the well-trained professionals who understand how to manage, protect, and enhance it. At
Strayer University, you’ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions
and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career.
* The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire , providing a live,
networked environment, with anytime-anywhere access.
APPLY knowledge of computing and the current use of
ANALYZE the impact of computing on individuals,
technology techniques, skills, and tools necessary for the
organizations, and society.
computing practice.
UNDERSTAND the relevance of continuing professional
development requirements in the information technology domain.
solve business problems with technology solutions using
qualitative and quantitative information.
DEMONSTRATE the ability to identify and analyze user needs
in the selection, creation, evaluation, and administration of
DESIGN, implement, and evaluate computer-based systems,
computer-based systems.
processes, components, or programs to meet desired needs.
EXPLAIN the use of best practices and technology standards,
DEMONSTRATE an understanding of the professional, ethical,
and their application in an organizational context.
legal, security, and social issues and responsibilities in the
information technology domain.
DEMONSTRATE the ability to analyze and create effective
information technology project plans with graphic
DEMONSTRATE the ability to communicate and function
representations into the user environment.
effectively with a range of audiences to accomplish a common goal.
TRAYER UNIVERSITY IS
S
ACCREDITED BY THE MIDDLE
STATES COMMISSION
ON HIGHER EDUCATION
an institutional accrediting agency
recognized by the U.S. Secretary of Education and the
Council for Higher Education. Middle States Commission
on Higher Education, 3624 Market Street, Philadelphia, PA
19104. (267-284-5000)
Area I-Core Component
Cyber Security Management
Coursework prepares students for roles such as Information Technology
Specialist, Data Security Administrator, Information Security Analyst,
Information Security Officer, Computer Specialist, Information Security
Specialist, Information Systems
Cybersecurity Technology
Coursework prepares students for roles such as Information Technology
Specialist, Data Security Administrator, Information Security Analyst,
Information Security Officer, Computer Specialist, Information Security
Specialist, Information Systems Security Analyst, Computer Security
Specialist, Information Security Manager, and Information Technology
Security Analyst.
Database Technology
Learn to create and administer enterprise databases in support of practical
businesses problems. Focus on applying effective database security,
redundancy, and data transformation strategies to real-world situations.
Coursework provides graduates with competencies applicable to
database administration. Typical responsibilities include coordinating
changes to, testing, and implementing databases; and planning effective
security measures.
Digital Forensics Technology
Investigate the world of forensics related to digital evidence and devices.
Get applied knowledge, skills, and practice in identifying and creating
a digital forensic investigation, examination, and response. NSA/CNSS
certified security curriculum (NSTISSI No. 4011, 4013)
Coursework prepares students for roles with similar responsibilities
as Information Technology Specialist, Data Security Administrator,
Information Security Analyst, Information Security Officer, Computer
Specialist, Information Security Specialist, Information Systems Security
Analyst, Computer Security Specialist, Information Security Manager, and
Information Technology Security Analyst.
Enterprise Security Technology
Accreditations and Approvals
THE NATIONAL SECURITY AGENCY
(NSA) COMMITTEE ON NATIONAL
SECURITY SYSTEMS (CNSS)
certifies that Strayer University’s information
security curriculum meets the national training
standards for information systems security professionals and
system administrators (NSTISSI No. 4011, 4013). Additionally,
the BSIS curriculum aligns with curricular guidelines set by
the Association for Computing Machinery (ACM).
COURSE OF STUDY
Become adept at identifying and creating powerful, effective enterprise
security solutions as applied to practical business problems. You’ll develop
competencies for securing and administering digital assets in an organization.
NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
Coursework prepares students for roles with similar responsibilities
as Information Technology Specialist, Data Security Administrator,
Information Security Analyst, Information Security Officer, Computer
Specialist, Information Security Specialist, Information Systems Security
Analyst, Computer Security Specialist, Information Security Manager, and
Information Technology Security Analyst.
Concentration in Cyber Security Technology
Bachelor of Science in Information Technology
career and learning goals:
Get extensive tactical preparation in the design and protection of data
assets. You’ll focus on defending digital assets, systems, and information
from cybercrime attacks, including viruses, botnets, worms, and Trojans.
KEY LEARNING OBJECTIVES
DEMONSTRATE the ability to locate, critically evaluate, and
The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique
Internetworking Technology
Learn the ins and outs of administering and designing enterprise internetwork
environments for efficient information and resource management.
Coursework provides proficiencies for students interested in pursuing
roles such as Network Analyst, Systems Engineer/Analyst, Network
Specialist, System Programmer, or Telecommunications Manager.
Networking Technology
Understand how to create and administer enterprise computing
environments that successfully address practical business problems.
Coursework provides graduates with additional competencies to
assume roles similar to Computer Software Engineers. Typical job
responsibilities in computer software engineering include developing,
creating, and modifying general computer applications software or
specialized utility programs, analyzing user needs and developing
software solutions, designing software or customizing software for client
use with the aim of optimizing operational efficiency, analyzing and
designing databases within an application area, and working individually
or coordinating database development as part of a team.
Programming Technology
Prepare for you future role in designing, writing, documenting,
developing, and implementing computer programs that generate real
enterprise solutions for businesses and organizations.
Coursework provides students with competencies applicable to
Computer Programmers. Responsibilities may include converting project
specifications and statements of problems/procedures to logical flow
charts for coding; developing programs to store, locate, and retrieve
documents, data, and information; and programming websites.
Web Development Technology
Build a strong knowledge and skill base in the design, coding, and
development of Web applications as applied to practical business problems.
Coursework prepares students to assume roles as Web Developers, with
a focus on design and building Web applications and websites; creating
and specifying architectural and technical parameters; and directing
content creation, enhancement, and maintenance.
ACC
BUS
CIS
CIS
ENG
MAT
100
100
106
110
115
104
27.0 Credit Hours
CIS
SEC
SEC
Accounting I
Introduction to Business
Introduction to Information Technology
Computer Programming Design
English Composition
Algebra with Applications
Area II-Major Component
45.0 Credit Hours
13.5 Credit Hours
Students must choose one of the following Area II Concentration
Components to complete the Bachelor of Science in Information Systems.
Area III-General Education Component
ENG
ENG
ENG
HIS
POL
HUM
HUM
MAT
PHI
PSY
PSY
REL
SCI
SCI
SOC
ECO
POL
SOC
215
315
316
105
110
111
112
311
210
100
105
212
110
115
100
405
300
300
54.0 Credit Hours
Research and Writing
Professional Communications OR
Technical Writing (Required for IT)
Contemporary U.S. History OR
U.S. Government
World Cultures I
World Cultures II
Discrete Math
Critical Thinking
Psychology of Adjustment OR
Introduction to Psychology
World Religions
Introduction to Physical Science OR
Introduction to Biology
Introduction to Sociology
Economic Problems and Issues OR
Contemporary International Problems OR
Sociology of Developing Countries
Area IV-Elective Component
40.5 Credit Hours
These courses are selected in consultation with the Academic
Advisor; within this component it is possible for students to develop
a minor in a second area of study (See “Minors”). Students attending New Jersey campuses must take five electives from the General
Studies disciplines listed in the catalog: Economics, English, Foreign
Language, History, Humanities, Mathematics, Philosophy, Political
Science, Psychology, Religion, Science and Sociology.
Minimum Total Quarter Hours Required
for Completion
332
420
435
13.5 Credit Hours
Network Server Administration
Perimeter Defense Techniques
Network Penetration Testing
Concentration in Database Technology
CIS
111 Introduction to Relational Database
Management Systems
CIS
175 Introduction to Networking
CIS
210 Systems Analysis and Development
CIS
273 Web Design & Development
CIS
312 Computer Architecture
CIS
329 Administering Desktop Clients OR
CIS
337 Internetworking Basics
CIS
333 Network Security Fundamentals
CIS
375 Human Computer Interaction
MAT200 Pre-Calculus
CIS
498 Undergraduate Information Technology Capstone
Area II-Concentration Component
Area II-Concentration
180.0
Area II-Concentration
CIS
CIS
CIS
267
424
428
13.5 Credit Hours
Visual Basic Programming
Database Administration I
Database Administration II
Concentration in Digital Forensics Technology
Area II-Concentration
CIS
SEC
SEC
332
340
435
13.5 Credit Hours
Network Server Administration
Computer Forensic Technology
Network Penetration Testing
Concentration in Enterprise Security Technology
Area II-Concentration
CIS
SEC
SEC
332
420
459
13.5 Credit Hours
Network Server Administration
Perimeter Defense Techniques
Disaster Recovery & Virtualization
Concentration in Internetworking Technology
Area II-Concentration
CIS
CIS
CIS
411
413
436
13.5 Credit Hours
Advanced Routing
Internetworking Switching
Internetworking Troubleshooting
Concentration in Networking Technology
Area II-Concentration
CIS
CIS
CIS
CIS
332
401
409
442
13.5 Credit Hours
Network Server Administration
Network Server Administration II
Directory Service Infrastructure OR
Application Server Development
Concentration in Programming Technology
Area II-Concentration
CIS
CIS
CIS
CIS
CIS
267
242
406
328
407
13.5 Credit Hours
Visual Basic Programming
C++ Programming OR
Java Programming I
C++ Programming II OR
Java Programming II
Concentration in Web Development Technology
Area II-Concentration
CIS
CIS
CIS
267
307
309
Visual Basic Programming
Web Development I
Web Development II
All courses are 4.5 credits.
Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative.
13.5 Credit Hours
OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT)
PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE
SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY’S
WORKPLACES.
PROGRAM CONCENTRATIONS
Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer
Become an authority on protecting data assets. You’ll explore the design,
implementation, and management of security initiatives in common and
complex computing environments. Learn the knowledge, skills, legal
background, and ethical principles necessary for sound and effective
policy development.
the sophisticated computer-based technologies that power today’s workplaces. For any organization to progress,
technology is vital—as are the well-trained professionals who understand how to manage, protect, and enhance it. At
Strayer University, you’ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions
and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career.
* The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire , providing a live,
networked environment, with anytime-anywhere access.
APPLY knowledge of computing and the current use of
ANALYZE the impact of computing on individuals,
technology techniques, skills, and tools necessary for the
organizations, and society.
computing practice.
UNDERSTAND the relevance of continuing professional
development requirements in the information technology domain.
solve business problems with technology solutions using
qualitative and quantitative information.
DEMONSTRATE the ability to identify and analyze user needs
in the selection, creation, evaluation, and administration of
DESIGN, implement, and evaluate computer-based systems,
computer-based systems.
processes, components, or programs to meet desired needs.
EXPLAIN the use of best practices and technology standards,
DEMONSTRATE an understanding of the professional, ethical,
and their application in an organizational context.
legal, security, and social issues and responsibilities in the
information technology domain.
DEMONSTRATE the ability to analyze and create effective
information technology project plans with graphic
DEMONSTRATE the ability to communicate and function
representations into the user environment.
effectively with a range of audiences to accomplish a common goal.
TRAYER UNIVERSITY IS
S
ACCREDITED BY THE MIDDLE
STATES COMMISSION
ON HIGHER EDUCATION
an institutional accrediting agency
recognized by the U.S. Secretary of Education and the
Council for Higher Education. Middle States Commission
on Higher Education, 3624 Market Street, Philadelphia, PA
19104. (267-284-5000)
Area I-Core Component
Cyber Security Management
Coursework prepares students for roles such as Information Technology
Specialist, Data Security Administrator, Information Security Analyst,
Information Security Officer, Computer Specialist, Information Security
Specialist, Information Systems
Cybersecurity Technology
Coursework prepares students for roles such as Information Technology
Specialist, Data Security Administrator, Information Security Analyst,
Information Security Officer, Computer Specialist, Information Security
Specialist, Information Systems Security Analyst, Computer Security
Specialist, Information Security Manager, and Information Technology
Security Analyst.
Database Technology
Learn to create and administer enterprise databases in support of practical
businesses problems. Focus on applying effective database security,
redundancy, and data transformation strategies to real-world situations.
Coursework provides graduates with competencies applicable to
database administration. Typical responsibilities include coordinating
changes to, testing, and implementing databases; and planning effective
security measures.
Digital Forensics Technology
Investigate the world of forensics related to digital evidence and devices.
Get applied knowledge, skills, and practice in identifying and creating
a digital forensic investigation, examination, and response. NSA/CNSS
certified security curriculum (NSTISSI No. 4011, 4013)
Coursework prepares students for roles with similar responsibilities
as Information Technology Specialist, Data Security Administrator,
Information Security Analyst, Information Security Officer, Computer
Specialist, Information Security Specialist, Information Systems Security
Analyst, Computer Security Specialist, Information Security Manager, and
Information Technology Security Analyst.
Enterprise Security Technology
Accreditations and Approvals
THE NATIONAL SECURITY AGENCY
(NSA) COMMITTEE ON NATIONAL
SECURITY SYSTEMS (CNSS)
certifies that Strayer University’s information
security curriculum meets the national training
standards for information systems security professionals and
system administrators (NSTISSI No. 4011, 4013). Additionally,
the BSIS curriculum aligns with curricular guidelines set by
the Association for Computing Machinery (ACM).
COURSE OF STUDY
Become adept at identifying and creating powerful, effective enterprise
security solutions as applied to practical business problems. You’ll develop
competencies for securing and administering digital assets in an organization.
NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
Coursework prepares students for roles with similar responsibilities
as Information Technology Specialist, Data Security Administrator,
Information Security Analyst, Information Security Officer, Computer
Specialist, Information Security Specialist, Information Systems Security
Analyst, Computer Security Specialist, Information Security Manager, and
Information Technology Security Analyst.
Concentration in Cyber Security Technology
Bachelor of Science in Information Technology
career and learning goals:
Get extensive tactical preparation in the design and protection of data
assets. You’ll focus on defending digital assets, systems, and information
from cybercrime attacks, including viruses, botnets, worms, and Trojans.
KEY LEARNING OBJECTIVES
DEMONSTRATE the ability to locate, critically evaluate, and
The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique
Internetworking Technology
Learn the ins and outs of administering and designing enterprise internetwork
environments for efficient information and resource management.
Coursework provides proficiencies for students interested in pursuing
roles such as Network Analyst, Systems Engineer/Analyst, Network
Specialist, System Programmer, or Telecommunications Manager.
Networking Technology
Understand how to create and administer enterprise computing
environments that successfully address practical business problems.
Coursework provides graduates with additional competencies to
assume roles similar to Computer Software Engineers. Typical job
responsibilities in computer software engineering include developing,
creating, and modifying general computer applications software or
specialized utility programs, analyzing user needs and developing
software solutions, designing software or customizing software for client
use with the aim of optimizing operational efficiency, analyzing and
designing databases within an application area, and working individually
or coordinating database development as part of a team.
Programming Technology
Prepare for you future role in designing, writing, documenting,
developing, and implementing computer programs that generate real
enterprise solutions for businesses and organizations.
Coursework provides students with competencies applicable to
Computer Programmers. Responsibilities may include converting project
specifications and statements of problems/procedures to logical flow
charts for coding; developing programs to store, locate, and retrieve
documents, data, and information; and programming websites.
Web Development Technology
Build a strong knowledge and skill base in the design, coding, and
development of Web applications as applied to practical business problems.
Coursework prepares students to assume roles as Web Developers, with
a focus on design and building Web applications and websites; creating
and specifying architectural and technical parameters; and directing
content creation, enhancement, and maintenance.
ACC
BUS
CIS
CIS
ENG
MAT
100
100
106
110
115
104
27.0 Credit Hours
CIS
SEC
SEC
Accounting I
Introduction to Business
Introduction to Information Technology
Computer Programming Design
English Composition
Algebra with Applications
Area II-Major Component
45.0 Credit Hours
13.5 Credit Hours
Students must choose one of the following Area II Concentration
Components to complete the Bachelor of Science in Information Systems.
Area III-General Education Component
ENG
ENG
ENG
HIS
POL
HUM
HUM
MAT
PHI
PSY
PSY
REL
SCI
SCI
SOC
ECO
POL
SOC
215
315
316
105
110
111
112
311
210
100
105
212
110
115
100
405
300
300
54.0 Credit Hours
Research and Writing
Professional Communications OR
Technical Writing (Required for IT)
Contemporary U.S. History OR
U.S. Government
World Cultures I
World Cultures II
Discrete Math
Critical Thinking
Psychology of Adjustment OR
Introduction to Psychology
World Religions
Introduction to Physical Science OR
Introduction to Biology
Introduction to Sociology
Economic Problems and Issues OR
Contemporary International Problems OR
Sociology of Developing Countries
Area IV-Elective Component
40.5 Credit Hours
These courses are selected in consultation with the Academic
Advisor; within this component it is possible for students to develop
a minor in a second area of study (See “Minors”). Students attending New Jersey campuses must take five electives from the General
Studies disciplines listed in the catalog: Economics, English, Foreign
Language, History, Humanities, Mathematics, Philosophy, Political
Science, Psychology, Religion, Science and Sociology.
Minimum Total Quarter Hours Required
for Completion
332
420
435
13.5 Credit Hours
Network Server Administration
Perimeter Defense Techniques
Network Penetration Testing
Concentration in Database Technology
CIS
111 Introduction to Relational Database
Management Systems
CIS
175 Introduction to Networking
CIS
210 Systems Analysis and Development
CIS
273 Web Design & Development
CIS
312 Computer Architecture
CIS
329 Administering Desktop Clients OR
CIS
337 Internetworking Basics
CIS
333 Network Security Fundamentals
CIS
375 Human Computer Interaction
MAT200 Pre-Calculus
CIS
498 Undergraduate Information Technology Capstone
Area II-Concentration Component
Area II-Concentration
180.0
Area II-Concentration
CIS
CIS
CIS
267
424
428
13.5 Credit Hours
Visual Basic Programming
Database Administration I
Database Administration II
Concentration in Digital Forensics Technology
Area II-Concentration
CIS
SEC
SEC
332
340
435
13.5 Credit Hours
Network Server Administration
Computer Forensic Technology
Network Penetration Testing
Concentration in Enterprise Security Technology
Area II-Concentration
CIS
SEC
SEC
332
420
459
13.5 Credit Hours
Network Server Administration
Perimeter Defense Techniques
Disaster Recovery & Virtualization
Concentration in Internetworking Technology
Area II-Concentration
CIS
CIS
CIS
411
413
436
13.5 Credit Hours
Advanced Routing
Internetworking Switching
Internetworking Troubleshooting
Concentration in Networking Technology
Area II-Concentration
CIS
CIS
CIS
CIS
332
401
409
442
13.5 Credit Hours
Network Server Administration
Network Server Administration II
Directory Service Infrastructure OR
Application Server Development
Concentration in Programming Technology
Area II-Concentration
CIS
CIS
CIS
CIS
CIS
267
242
406
328
407
13.5 Credit Hours
Visual Basic Programming
C++ Programming OR
Java Programming I
C++ Programming II OR
Java Programming II
Concentration in Web Development Technology
Area II-Concentration
CIS
CIS
CIS
267
307
309
Visual Basic Programming
Web Development I
Web Development II
All courses are 4.5 credits.
Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative.
13.5 Credit Hours
OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT)
PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE
SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY’S
WORKPLACES.
PROGRAM CONCENTRATIONS
Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer
Become an authority on protecting data assets. You’ll explore the design,
implementation, and management of security initiatives in common and
complex computing environments. Learn the knowledge, skills, legal
background, and ethical principles necessary for sound and effective
policy development.
the sophisticated computer-based technologies that power today’s workplaces. For any organization to progress,
technology is vital—as are the well-trained professionals who understand how to manage, protect, and enhance it. At
Strayer University, you’ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions
and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career.
* The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire , providing a live,
networked environment, with anytime-anywhere access.
APPLY knowledge of computing and the current use of
ANALYZE the impact of computing on individuals,
technology techniques, skills, and tools necessary for the
organizations, and society.
computing practice.
UNDERSTAND the relevance of continuing professional
development requirements in the information technology domain.
solve business problems with technology solutions using
qualitative and quantitative information.
DEMONSTRATE the ability to identify and analyze user needs
in the selection, creation, evaluation, and administration of
DESIGN, implement, and evaluate computer-based systems,
computer-based systems.
processes, components, or programs to meet desired needs.
EXPLAIN the use of best practices and technology standards,
DEMONSTRATE an understanding of the professional, ethical,
and their application in an organizational context.
legal, security, and social issues and responsibilities in the
information technology domain.
DEMONSTRATE the ability to analyze and create effective
information technology project plans with graphic
DEMONSTRATE the ability to communicate and function
representations into the user environment.
effectively with a range of audiences to accomplish a common goal.
TRAYER UNIVERSITY IS
S
ACCREDITED BY THE MIDDLE
STATES COMMISSION
ON HIGHER EDUCATION
an institutional accrediting agency
recognized by the U.S. Secretary of Education and the
Council for Higher Education. Middle States Commission
on Higher Education, 3624 Market Street, Philadelphia, PA
19104. (267-284-5000)
Area I-Core Component
Cyber Security Management
Coursework prepares students for roles such as Information Technology
Specialist, Data Security Administrator, Information Security Analyst,
Information Security Officer, Computer Specialist, Information Security
Specialist, Information Systems
Cybersecurity Technology
Coursework prepares students for roles such as Information Technology
Specialist, Data Security Administrator, Information Security Analyst,
Information Security Officer, Computer Specialist, Information Security
Specialist, Information Systems Security Analyst, Computer Security
Specialist, Information Security Manager, and Information Technology
Security Analyst.
Database Technology
Learn to create and administer enterprise databases in support of practical
businesses problems. Focus on applying effective database security,
redundancy, and data transformation strategies to real-world situations.
Coursework provides graduates with competencies applicable to
database administration. Typical responsibilities include coordinating
changes to, testing, and implementing databases; and planning effective
security measures.
Digital Forensics Technology
Investigate the world of forensics related to digital evidence and devices.
Get applied knowledge, skills, and practice in identifying and creating
a digital forensic investigation, examination, and response. NSA/CNSS
certified security curriculum (NSTISSI No. 4011, 4013)
Coursework prepares students for roles with similar responsibilities
as Information Technology Specialist, Data Security Administrator,
Information Security Analyst, Information Security Officer, Computer
Specialist, Information Security Specialist, Information Systems Security
Analyst, Computer Security Specialist, Information Security Manager, and
Information Technology Security Analyst.
Enterprise Security Technology
Accreditations and Approvals
THE NATIONAL SECURITY AGENCY
(NSA) COMMITTEE ON NATIONAL
SECURITY SYSTEMS (CNSS)
certifies that Strayer University’s information
security curriculum meets the national training
standards for information systems security professionals and
system administrators (NSTISSI No. 4011, 4013). Additionally,
the BSIS curriculum aligns with curricular guidelines set by
the Association for Computing Machinery (ACM).
COURSE OF STUDY
Become adept at identifying and creating powerful, effective enterprise
security solutions as applied to practical business problems. You’ll develop
competencies for securing and administering digital assets in an organization.
NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)
Coursework prepares students for roles with similar responsibilities
as Information Technology Specialist, Data Security Administrator,
Information Security Analyst, Information Security Officer, Computer
Specialist, Information Security Specialist, Information Systems Security
Analyst, Computer Security Specialist, Information Security Manager, and
Information Technology Security Analyst.
Concentration in Cyber Security Technology
Bachelor of Science in Information Technology
career and learning goals:
Get extensive tactical preparation in the design and protection of data
assets. You’ll focus on defending digital assets, systems, and information
from cybercrime attacks, including viruses, botnets, worms, and Trojans.
KEY LEARNING OBJECTIVES
DEMONSTRATE the ability to locate, critically evaluate, and
The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique
Internetworking Technology
Learn the ins and outs of administering and designing enterprise internetwork
environments for efficient information and resource management.
Coursework provides proficiencies for students interested in pursuing
roles such as Network Analyst, Systems Engineer/Analyst, Network
Specialist, System Programmer, or Telecommunications Manager.
Networking Technology
Understand how to create and administer enterprise computing
environments that successfully address practical business problems.
Coursework provides graduates with additional competencies to
assume roles similar to Computer Software Engineers. Typical job
responsibilities in computer software engineering include developing,
creating, and modifying general computer applications software or
specialized utility programs, analyzing user needs and developing
software solutions, designing software or customizing software for client
use with the aim of optimizing operational efficiency, analyzing and
designing databases within an application area, and working individually
or coordinating database development as part of a team.
Programming Technology
Prepare for you future role in designing, writing, documenting,
developing, and implementing computer programs that generate real
enterprise solutions for businesses and organizations.
Coursework provides students with competencies applicable to
Computer Programmers. Responsibilities may include converting project
specifications and statements of problems/procedures to logical flow
charts for coding; developing programs to store, locate, and retrieve
documents, data, and information; and programming websites.
Web Development Technology
Build a strong knowledge and skill base in the design, coding, and
development of Web applications as applied to practical business problems.
Coursework prepares students to assume roles as Web Developers, with
a focus on design and building Web applications and websites; creating
and specifying architectural and technical parameters; and directing
content creation, enhancement, and maintenance.
ACC
BUS
CIS
CIS
ENG
MAT
100
100
106
110
115
104
27.0 Credit Hours
CIS
SEC
SEC
Accounting I
Introduction to Business
Introduction to Information Technology
Computer Programming Design
English Composition
Algebra with Applications
Area II-Major Component
45.0 Credit Hours
13.5 Credit Hours
Students must choose one of the following Area II Concentration
Components to complete the Bachelor of Science in Information Systems.
Area III-General Education Component
ENG
ENG
ENG
HIS
POL
HUM
HUM
MAT
PHI
PSY
PSY
REL
SCI
SCI
SOC
ECO
POL
SOC
215
315
316
105
110
111
112
311
210
100
105
212
110
115
100
405
300
300
54.0 Credit Hours
Research and Writing
Professional Communications OR
Technical Writing (Required for IT)
Contemporary U.S. History OR
U.S. Government
World Cultures I
World Cultures II
Discrete Math
Critical Thinking
Psychology of Adjustment OR
Introduction to Psychology
World Religions
Introduction to Physical Science OR
Introduction to Biology
Introduction to Sociology
Economic Problems and Issues OR
Contemporary International Problems OR
Sociology of Developing Countries
Area IV-Elective Component
40.5 Credit Hours
These courses are selected in consultation with the Academic
Advisor; within this component it is possible for students to develop
a minor in a second area of study (See “Minors”). Students attending New Jersey campuses must take five electives from the General
Studies disciplines listed in the catalog: Economics, English, Foreign
Language, History, Humanities, Mathematics, Philosophy, Political
Science, Psychology, Religion, Science and Sociology.
Minimum Total Quarter Hours Required
for Completion
332
420
435
13.5 Credit Hours
Network Server Administration
Perimeter Defense Techniques
Network Penetration Testing
Concentration in Database Technology
CIS
111 Introduction to Relational Database
Management Systems
CIS
175 Introduction to Networking
CIS
210 Systems Analysis and Development
CIS
273 Web Design & Development
CIS
312 Computer Architecture
CIS
329 Administering Desktop Clients OR
CIS
337 Internetworking Basics
CIS
333 Network Security Fundamentals
CIS
375 Human Computer Interaction
MAT200 Pre-Calculus
CIS
498 Undergraduate Information Technology Capstone
Area II-Concentration Component
Area II-Concentration
180.0
Area II-Concentration
CIS
CIS
CIS
267
424
428
13.5 Credit Hours
Visual Basic Programming
Database Administration I
Database Administration II
Concentration in Digital Forensics Technology
Area II-Concentration
CIS
SEC
SEC
332
340
435
13.5 Credit Hours
Network Server Administration
Computer Forensic Technology
Network Penetration Testing
Concentration in Enterprise Security Technology
Area II-Concentration
CIS
SEC
SEC
332
420
459
13.5 Credit Hours
Network Server Administration
Perimeter Defense Techniques
Disaster Recovery & Virtualization
Concentration in Internetworking Technology
Area II-Concentration
CIS
CIS
CIS
411
413
436
13.5 Credit Hours
Advanced Routing
Internetworking Switching
Internetworking Troubleshooting
Concentration in Networking Technology
Area II-Concentration
CIS
CIS
CIS
CIS
332
401
409
442
13.5 Credit Hours
Network Server Administration
Network Server Administration II
Directory Service Infrastructure OR
Application Server Development
Concentration in Programming Technology
Area II-Concentration
CIS
CIS
CIS
CIS
CIS
267
242
406
328
407
13.5 Credit Hours
Visual Basic Programming
C++ Programming OR
Java Programming I
C++ Programming II OR
Java Programming II
Concentration in Web Development Technology
Area II-Concentration
CIS
CIS
CIS
267
307
309
Visual Basic Programming
Web Development I
Web Development II
All courses are 4.5 credits.
Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative.
13.5 Credit Hours
ON CAMPUS,
ONLINE,
ON YOUR SCHEDULE.
For a 120-year-old university, we’re pretty forward-thinking.
With 100 campuses spread across 25 states, we’re just about
anywhere you look. And we offer convenient class times to fit
your busy life – including evenings and weekends. You can even
jump on your laptop or access Strayer’s mobile app, to participate
in online classes wherever you are.
Whether you prefer learning online, on campus, or even both,
a Strayer education prepares you for the future by allowing you
to earn your degree on your schedule.
Go to strayer.edu to find a convenient
campus location near you.
RESOURCES AND SUPPORT? CHECK.
Just like pursuing higher education, finding a job can often require hours of
preparation and research – and a little support can go a long way. Our University
Career Center (UCC) offers a number of proven and go to market resources
designed to meet your career needs and boost your professional development –
giving you an edge over the competition. No matter what your career path is, we’re
here to help every step of the way.
With free Microsoft software and discounted HP hardware,
you’ll be able to save hundreds of dollars using Strayer’s Tech Pack.
Strayer’s convenient mobile app allows you to participate in classes, find a campus,
connect in social media, get help and more. It’s available for Apple and Android,
and a must-have for any Strayer student.
Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University’s academic programs, please go to www.strayer.edu/academic-program-information. Students may be
required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should
be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B,
09-05-1898T 10-05-1934B, 10-05-1933B. This institution is approved by the Indiana Board for Proprietary Education, 101 W Ohio St., Ste. 670, Indianapolis, IN 46204-1985, 317.464.4400 Ext. 138. For licensure and certification information, please go to
https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org.
ON CAMPUS,
ONLINE,
ON YOUR SCHEDULE.
For a 120-year-old university, we’re pretty forward-thinking.
With 100 campuses spread across 25 states, we’re just about
anywhere you look. And we offer convenient class times to fit
GET A BETTER IDEA OF WHAT’S AHEAD.
You already know your goals, but may need a better idea of how much it could cost to reach them. These charts are designed
to provide you with a general overview of tuition, and the amount of time it could take to earn your degree. Since every Strayer
student brings their own unique experience, your costs and time to completion can vary depending on things like transferable
credits, loans, grants, scholarships, even life experience. For a clearer breakdown of your Strayer education, start by reviewing
the charts below. Then begin your Personal Education Plan for a more in-depth look.
IF YOU ARE:
NUMBER OF CLASSES
TIME TO GRADUATE
Full-time
3 or more classes per quarter
3.5 years or fewer
Part-time
2 or fewer classes per quarter
5 years or more
The times to graduate assume that students are enrolled in consecutive quarters. Transfer of college credit, challenge
exams, and other individual circumstances may allow you to complete your degree sooner. Students study at their own
pace and on their own schedule. Normal time for program completion is 6.5 years.
your busy life – including evenings and weekends. You can even
jump on your laptop or access Strayer’s mobile app, to participate
COURSES
REQUIRED
Whether you prefer learning online, on campus, or even both,
40
a Strayer education prepares you for the future by allowing you
to earn your degree on your schedule.
YOU’RE ALREADY QUALIFIED
TO LEARN. YOU MAY QUALIFY
TO SAVE.
There are many ways to cut the cost
on a premium education.
• Federal or private loans
• Grants
• Tuition assistance from your employer
in online classes wherever you are.
Go to strayer.edu to find a convenient
campus location near you.
RESOURCES AND SUPPORT? CHECK.
Just like pursuing higher education, finding a job can often require hours of preparation
and research – and a little support can go a long way. Our University Career Center (UCC)
offers a number of proven and go to market resources designed to boost your career
needs and professional development, while our Career Builder Elite can help give you
an edge over the competition. No matter what your career path is, we’re here to help
every step of the way.
With free Microsoft software and discounted HP hardware,
you’ll be able to save hundreds of dollars using Strayer’s Tech Pack.
TRANSFER CREDITS
ACCEPTED
YES
QUARTER LENGTH
COURSE COST
11 WEEKS
Full time – $1,700
Part time – $1,775
RECOGNIZED
PROVEN
RESPECTED
• Military tuition assistance
• Scholarships
*Textbooks and supplies are not included in the tuition rate and must be purchased by the student. You should allow
approximately $150 per course for textbooks and supplies. Does not include the application fee of $50 or the
technology fee of $45. In Tennessee, tuition for full-time undergraduate studets is $1775 per course.
MARKETABLE
FLEXIBLE
IT ONLY TAKES A FEW MINUTES
TO PLAN YOUR FUTURE.
Bryan Rolle
Student
At Strayer, we understand the thought of pursuing a higher
education can be overwhelming. That’s why we’ve created the
Personal Education Plan – a step-by-step planner that helps to
provide the estimates and answers to everything you want
to know, instantly. Strayer’s Personal Education Plan will even
answer your questions about tuition, scheduling, graduation dates,
and the most important question of all – “When do I start?”
SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
EARNING YOUR DEGREE IS CHALLENGING.
PLANNING FOR IT DOESN’T HAVE TO BE.
BUILD YOUR PERSONAL EDUCATION PLAN TODAY.
Visit STRAYER.EDU to build your education plan
Strayer’s convenient mobile app allows you to participate in classes, find a campus,
connect in social media, get help and more. It’s available for Apple and Android,
and a must-have for any Strayer student.
Program Length: Strayer University students are mostly working adults who earn
their degrees at their own pace and on their own schedule. Most students attend
part-time, and the normal time to complete this program is 6 years.
The applicable U.S. Department of Education regulation does not permit the
disclosure of the on-time graduation rate or median debt amounts for this program.
Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University’s academic programs, please go to www.strayer.edu/academic-program-information. Students may be
required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should
be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B, 0905-1898T 10-05-1934B, 10-05-1933B. Strayer University is regulated by the Indiana Commission on Higher Education, 402 W. Washington Street, Room W462, Indianapolis, IN 46204. (317) 464-4400. For licensure and certification information, please go to
https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org.
Program Costs: Cost information for Strayer University programs is available at
www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program, at
current part-time tuition rates, are $72,400, and at current full-time tuition rates, are
$69,000. The tuition and fees for the entire program for all Tennessee students are
$72,400. The total estimated cost for books and supplies for the entire program is
$6,000. Strayer University does not offer on-campus housing.
Occupations: The following U.S. Department of Labor Standard Occupational
Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S.
Department of Education regulations, and correspond to the U.S. Department of
Education Classification of Instructional Programs (CIP) Code for this program.
Computer and Information Systems Managers 11-3021.00; Computer and
Information Research Scientists 15-1111.00; Computer Network Architects 151143.00; Computer Systems Analysts 15-1121.00; Informatics Nurse Specialists
15-1121.01; Information Security Analysts 15-1122.00; Software Developers,
Applications 15-1132.00; Software Developers, Systems Software 15-1133.00;
Telecommunications Engineering Specialists 15-1143.01. For more information,
please visit: http://online.onetcenter.org/crosswalk
Apply today:
strayer.edu/apply
FLEXIBLE / AFFORDABLE / VALUABLE

Similar documents

Apply today: strayer.edu

Apply today: strayer.edu Sociology of Developing Countries

More information

Apply today: strayer.edu/apply

Apply today: strayer.edu/apply anywhere you look. And we offer convenient class times to fit your busy life – including evenings and weekends. You can even jump on your laptop or access Strayer’s mobile app, to participate in on...

More information

Apply today: strayer.edu/apply

Apply today: strayer.edu/apply Introduction to Biology Introduction to Sociology Economic Problems and Issues OR Contemporary International Problems OR Sociology of Developing Countries

More information