Apply today: strayer.edu/apply
Transcription
Apply today: strayer.edu/apply
ON CAMPUS, ONLINE, ON YOUR SCHEDULE. For a 120-year-old university, we’re pretty forward-thinking. With 100 campuses spread across 25 states, we’re just about anywhere you look. And we offer convenient class times to fit GET A BETTER IDEA OF WHAT’S AHEAD. You already know your goals, but may need a better idea of how much it could cost to reach them. These charts are designed to provide you with a general overview of tuition, and the amount of time it could take to earn your degree. Since every Strayer student brings their own unique experience, your costs and time to completion can vary depending on things like transferable credits, loans, grants, scholarships, even life experience. For a clearer breakdown of your Strayer education, start by reviewing the charts below. Then begin your Personal Education Plan for a more in-depth look. IF YOU ARE: NUMBER OF CLASSES TIME TO GRADUATE Full-time 3 or more classes per quarter 3.5 years or fewer Part-time 2 or fewer classes per quarter 5 years or more The times to graduate assume that students are enrolled in consecutive quarters. Transfer of college credit, challenge exams, and other individual circumstances may allow you to complete your degree sooner. Students study at their own pace and on their own schedule. Normal time for program completion is 6.5 years. your busy life – including evenings and weekends. You can even jump on your laptop or access Strayer’s mobile app, to participate COURSES REQUIRED Whether you prefer learning online, on campus, or even both, 40 a Strayer education prepares you for the future by allowing you to earn your degree on your schedule. YOU’RE ALREADY QUALIFIED TO LEARN. YOU MAY QUALIFY TO SAVE. There are many ways to cut the cost on a premium education. • Federal or private loans • Grants • Tuition assistance from your employer in online classes wherever you are. Go to strayer.edu to find a convenient campus location near you. RESOURCES AND SUPPORT? CHECK. Just like pursuing higher education, finding a job can often require hours of preparation and research – and a little support can go a long way. Our University Career Center (UCC) offers a number of proven and go to market resources designed to boost your career needs and professional development, while our Career Builder Elite can help give you an edge over the competition. No matter what your career path is, we’re here to help every step of the way. With free Microsoft software and discounted HP hardware, you’ll be able to save hundreds of dollars using Strayer’s Tech Pack. TRANSFER CREDITS ACCEPTED YES QUARTER LENGTH COURSE COST 11 WEEKS Full time – $1,700 Part time – $1,775 RECOGNIZED PROVEN RESPECTED • Military tuition assistance • Scholarships *Textbooks and supplies are not included in the tuition rate and must be purchased by the student. You should allow approximately $150 per course for textbooks and supplies. Does not include the application fee of $50 or the technology fee of $45. In Tennessee, tuition for full-time undergraduate studets is $1775 per course. MARKETABLE FLEXIBLE IT ONLY TAKES A FEW MINUTES TO PLAN YOUR FUTURE. Bryan Rolle Student At Strayer, we understand the thought of pursuing a higher education can be overwhelming. That’s why we’ve created the Personal Education Plan – a step-by-step planner that helps to provide the estimates and answers to everything you want to know, instantly. Strayer’s Personal Education Plan will even answer your questions about tuition, scheduling, graduation dates, and the most important question of all – “When do I start?” SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY EARNING YOUR DEGREE IS CHALLENGING. PLANNING FOR IT DOESN’T HAVE TO BE. BUILD YOUR PERSONAL EDUCATION PLAN TODAY. Visit STRAYER.EDU to build your education plan Strayer’s convenient mobile app allows you to participate in classes, find a campus, connect in social media, get help and more. It’s available for Apple and Android, and a must-have for any Strayer student. Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University’s academic programs, please go to www.strayer.edu/academic-program-information. Students may be required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B, 0905-1898T 10-05-1934B, 10-05-1933B. Strayer University is regulated by the Indiana Commission on Higher Education, 402 W. Washington Street, Room W462, Indianapolis, IN 46204. (317) 464-4400. For licensure and certification information, please go to https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org. Program Length: Strayer University students are mostly working adults who earn their degrees at their own pace and on their own schedule. Most students attend part-time, and the normal time to complete this program is 6 years. Note: The BSIT is a new program offered beginning with the Summer 2012 term, and as a result On-Time Graduation Rates and Median Loan Debt information are not yet available. On-Time Graduation Rate: 80% of our students who graduated from this program between July 1, 2011 and June 30, 2012, did so within 6.5 years. Program Costs: Cost information for Strayer University programs is available at www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program, at current part-time tuition rates, are $72,400, and at current full-time tuition rates, are $69,000. The tuition and fees for the entire program for all Tennessee students are $72,400. The total estimated cost for books and supplies for the entire program is $6,000. Strayer University does not offer on-campus housing. Median Loan Debt: For all students completing this program between July 1, 2011 and June 30, 2012, the median cumulative loan debt for each of the following are: Federal student loans: $0 Private loans: $0 Institutional finance loans: $0 Occupations: The following U.S. Department of Labor Standard Occupational Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S. Department of Education regulations, and correspond to the U.S. Department of Education Classification of Instructional Programs (CIP) Code for this program. Computer and Information Systems Managers 11-3021.00; Computer and Information Research Scientists 15-1111.00; Computer Network Architects 151143.00; Computer Systems Analysts 15-1121.00; Informatics Nurse Specialists 15-1121.01; Information Security Analysts 15-1122.00; Software Developers, Applications 15-1132.00; Software Developers, Systems Software 15-1133.00; Telecommunications Engineering Specialists 15-1143.01. For more information, please visit: http://online.onetcenter.org/crosswalk Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE / VALUABLE OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT) PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY’S WORKPLACES. PROGRAM CONCENTRATIONS Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer Become an authority on protecting data assets. You’ll explore the design, implementation, and management of security initiatives in common and complex computing environments. Learn the knowledge, skills, legal background, and ethical principles necessary for sound and effective policy development. the sophisticated computer-based technologies that power today’s workplaces. For any organization to progress, technology is vital—as are the well-trained professionals who understand how to manage, protect, and enhance it. At Strayer University, you’ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career. * The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire , providing a live, networked environment, with anytime-anywhere access. APPLY knowledge of computing and the current use of ANALYZE the impact of computing on individuals, technology techniques, skills, and tools necessary for the organizations, and society. computing practice. UNDERSTAND the relevance of continuing professional development requirements in the information technology domain. solve business problems with technology solutions using qualitative and quantitative information. DEMONSTRATE the ability to identify and analyze user needs in the selection, creation, evaluation, and administration of DESIGN, implement, and evaluate computer-based systems, computer-based systems. processes, components, or programs to meet desired needs. EXPLAIN the use of best practices and technology standards, DEMONSTRATE an understanding of the professional, ethical, and their application in an organizational context. legal, security, and social issues and responsibilities in the information technology domain. DEMONSTRATE the ability to analyze and create effective information technology project plans with graphic DEMONSTRATE the ability to communicate and function representations into the user environment. effectively with a range of audiences to accomplish a common goal. TRAYER UNIVERSITY IS S ACCREDITED BY THE MIDDLE STATES COMMISSION ON HIGHER EDUCATION an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education. Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA 19104. (267-284-5000) Area I-Core Component Cyber Security Management Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Cybersecurity Technology Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Database Technology Learn to create and administer enterprise databases in support of practical businesses problems. Focus on applying effective database security, redundancy, and data transformation strategies to real-world situations. Coursework provides graduates with competencies applicable to database administration. Typical responsibilities include coordinating changes to, testing, and implementing databases; and planning effective security measures. Digital Forensics Technology Investigate the world of forensics related to digital evidence and devices. Get applied knowledge, skills, and practice in identifying and creating a digital forensic investigation, examination, and response. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Enterprise Security Technology Accreditations and Approvals THE NATIONAL SECURITY AGENCY (NSA) COMMITTEE ON NATIONAL SECURITY SYSTEMS (CNSS) certifies that Strayer University’s information security curriculum meets the national training standards for information systems security professionals and system administrators (NSTISSI No. 4011, 4013). Additionally, the BSIS curriculum aligns with curricular guidelines set by the Association for Computing Machinery (ACM). COURSE OF STUDY Become adept at identifying and creating powerful, effective enterprise security solutions as applied to practical business problems. You’ll develop competencies for securing and administering digital assets in an organization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Concentration in Cyber Security Technology Bachelor of Science in Information Technology career and learning goals: Get extensive tactical preparation in the design and protection of data assets. You’ll focus on defending digital assets, systems, and information from cybercrime attacks, including viruses, botnets, worms, and Trojans. KEY LEARNING OBJECTIVES DEMONSTRATE the ability to locate, critically evaluate, and The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique Internetworking Technology Learn the ins and outs of administering and designing enterprise internetwork environments for efficient information and resource management. Coursework provides proficiencies for students interested in pursuing roles such as Network Analyst, Systems Engineer/Analyst, Network Specialist, System Programmer, or Telecommunications Manager. Networking Technology Understand how to create and administer enterprise computing environments that successfully address practical business problems. Coursework provides graduates with additional competencies to assume roles similar to Computer Software Engineers. Typical job responsibilities in computer software engineering include developing, creating, and modifying general computer applications software or specialized utility programs, analyzing user needs and developing software solutions, designing software or customizing software for client use with the aim of optimizing operational efficiency, analyzing and designing databases within an application area, and working individually or coordinating database development as part of a team. Programming Technology Prepare for you future role in designing, writing, documenting, developing, and implementing computer programs that generate real enterprise solutions for businesses and organizations. Coursework provides students with competencies applicable to Computer Programmers. Responsibilities may include converting project specifications and statements of problems/procedures to logical flow charts for coding; developing programs to store, locate, and retrieve documents, data, and information; and programming websites. Web Development Technology Build a strong knowledge and skill base in the design, coding, and development of Web applications as applied to practical business problems. Coursework prepares students to assume roles as Web Developers, with a focus on design and building Web applications and websites; creating and specifying architectural and technical parameters; and directing content creation, enhancement, and maintenance. ACC BUS CIS CIS ENG MAT 100 100 106 110 115 104 27.0 Credit Hours CIS SEC SEC Accounting I Introduction to Business Introduction to Information Technology Computer Programming Design English Composition Algebra with Applications Area II-Major Component 45.0 Credit Hours 13.5 Credit Hours Students must choose one of the following Area II Concentration Components to complete the Bachelor of Science in Information Systems. Area III-General Education Component ENG ENG ENG HIS POL HUM HUM MAT PHI PSY PSY REL SCI SCI SOC ECO POL SOC 215 315 316 105 110 111 112 311 210 100 105 212 110 115 100 405 300 300 54.0 Credit Hours Research and Writing Professional Communications OR Technical Writing (Required for IT) Contemporary U.S. History OR U.S. Government World Cultures I World Cultures II Discrete Math Critical Thinking Psychology of Adjustment OR Introduction to Psychology World Religions Introduction to Physical Science OR Introduction to Biology Introduction to Sociology Economic Problems and Issues OR Contemporary International Problems OR Sociology of Developing Countries Area IV-Elective Component 40.5 Credit Hours These courses are selected in consultation with the Academic Advisor; within this component it is possible for students to develop a minor in a second area of study (See “Minors”). Students attending New Jersey campuses must take five electives from the General Studies disciplines listed in the catalog: Economics, English, Foreign Language, History, Humanities, Mathematics, Philosophy, Political Science, Psychology, Religion, Science and Sociology. Minimum Total Quarter Hours Required for Completion 332 420 435 13.5 Credit Hours Network Server Administration Perimeter Defense Techniques Network Penetration Testing Concentration in Database Technology CIS 111 Introduction to Relational Database Management Systems CIS 175 Introduction to Networking CIS 210 Systems Analysis and Development CIS 273 Web Design & Development CIS 312 Computer Architecture CIS 329 Administering Desktop Clients OR CIS 337 Internetworking Basics CIS 333 Network Security Fundamentals CIS 375 Human Computer Interaction MAT200 Pre-Calculus CIS 498 Undergraduate Information Technology Capstone Area II-Concentration Component Area II-Concentration 180.0 Area II-Concentration CIS CIS CIS 267 424 428 13.5 Credit Hours Visual Basic Programming Database Administration I Database Administration II Concentration in Digital Forensics Technology Area II-Concentration CIS SEC SEC 332 340 435 13.5 Credit Hours Network Server Administration Computer Forensic Technology Network Penetration Testing Concentration in Enterprise Security Technology Area II-Concentration CIS SEC SEC 332 420 459 13.5 Credit Hours Network Server Administration Perimeter Defense Techniques Disaster Recovery & Virtualization Concentration in Internetworking Technology Area II-Concentration CIS CIS CIS 411 413 436 13.5 Credit Hours Advanced Routing Internetworking Switching Internetworking Troubleshooting Concentration in Networking Technology Area II-Concentration CIS CIS CIS CIS 332 401 409 442 13.5 Credit Hours Network Server Administration Network Server Administration II Directory Service Infrastructure OR Application Server Development Concentration in Programming Technology Area II-Concentration CIS CIS CIS CIS CIS 267 242 406 328 407 13.5 Credit Hours Visual Basic Programming C++ Programming OR Java Programming I C++ Programming II OR Java Programming II Concentration in Web Development Technology Area II-Concentration CIS CIS CIS 267 307 309 Visual Basic Programming Web Development I Web Development II All courses are 4.5 credits. Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative. 13.5 Credit Hours OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT) PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY’S WORKPLACES. PROGRAM CONCENTRATIONS Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer Become an authority on protecting data assets. You’ll explore the design, implementation, and management of security initiatives in common and complex computing environments. Learn the knowledge, skills, legal background, and ethical principles necessary for sound and effective policy development. the sophisticated computer-based technologies that power today’s workplaces. For any organization to progress, technology is vital—as are the well-trained professionals who understand how to manage, protect, and enhance it. At Strayer University, you’ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career. * The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire , providing a live, networked environment, with anytime-anywhere access. APPLY knowledge of computing and the current use of ANALYZE the impact of computing on individuals, technology techniques, skills, and tools necessary for the organizations, and society. computing practice. UNDERSTAND the relevance of continuing professional development requirements in the information technology domain. solve business problems with technology solutions using qualitative and quantitative information. DEMONSTRATE the ability to identify and analyze user needs in the selection, creation, evaluation, and administration of DESIGN, implement, and evaluate computer-based systems, computer-based systems. processes, components, or programs to meet desired needs. EXPLAIN the use of best practices and technology standards, DEMONSTRATE an understanding of the professional, ethical, and their application in an organizational context. legal, security, and social issues and responsibilities in the information technology domain. DEMONSTRATE the ability to analyze and create effective information technology project plans with graphic DEMONSTRATE the ability to communicate and function representations into the user environment. effectively with a range of audiences to accomplish a common goal. TRAYER UNIVERSITY IS S ACCREDITED BY THE MIDDLE STATES COMMISSION ON HIGHER EDUCATION an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education. Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA 19104. (267-284-5000) Area I-Core Component Cyber Security Management Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Cybersecurity Technology Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Database Technology Learn to create and administer enterprise databases in support of practical businesses problems. Focus on applying effective database security, redundancy, and data transformation strategies to real-world situations. Coursework provides graduates with competencies applicable to database administration. Typical responsibilities include coordinating changes to, testing, and implementing databases; and planning effective security measures. Digital Forensics Technology Investigate the world of forensics related to digital evidence and devices. Get applied knowledge, skills, and practice in identifying and creating a digital forensic investigation, examination, and response. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Enterprise Security Technology Accreditations and Approvals THE NATIONAL SECURITY AGENCY (NSA) COMMITTEE ON NATIONAL SECURITY SYSTEMS (CNSS) certifies that Strayer University’s information security curriculum meets the national training standards for information systems security professionals and system administrators (NSTISSI No. 4011, 4013). Additionally, the BSIS curriculum aligns with curricular guidelines set by the Association for Computing Machinery (ACM). COURSE OF STUDY Become adept at identifying and creating powerful, effective enterprise security solutions as applied to practical business problems. You’ll develop competencies for securing and administering digital assets in an organization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Concentration in Cyber Security Technology Bachelor of Science in Information Technology career and learning goals: Get extensive tactical preparation in the design and protection of data assets. You’ll focus on defending digital assets, systems, and information from cybercrime attacks, including viruses, botnets, worms, and Trojans. KEY LEARNING OBJECTIVES DEMONSTRATE the ability to locate, critically evaluate, and The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique Internetworking Technology Learn the ins and outs of administering and designing enterprise internetwork environments for efficient information and resource management. Coursework provides proficiencies for students interested in pursuing roles such as Network Analyst, Systems Engineer/Analyst, Network Specialist, System Programmer, or Telecommunications Manager. Networking Technology Understand how to create and administer enterprise computing environments that successfully address practical business problems. Coursework provides graduates with additional competencies to assume roles similar to Computer Software Engineers. Typical job responsibilities in computer software engineering include developing, creating, and modifying general computer applications software or specialized utility programs, analyzing user needs and developing software solutions, designing software or customizing software for client use with the aim of optimizing operational efficiency, analyzing and designing databases within an application area, and working individually or coordinating database development as part of a team. Programming Technology Prepare for you future role in designing, writing, documenting, developing, and implementing computer programs that generate real enterprise solutions for businesses and organizations. Coursework provides students with competencies applicable to Computer Programmers. Responsibilities may include converting project specifications and statements of problems/procedures to logical flow charts for coding; developing programs to store, locate, and retrieve documents, data, and information; and programming websites. Web Development Technology Build a strong knowledge and skill base in the design, coding, and development of Web applications as applied to practical business problems. Coursework prepares students to assume roles as Web Developers, with a focus on design and building Web applications and websites; creating and specifying architectural and technical parameters; and directing content creation, enhancement, and maintenance. ACC BUS CIS CIS ENG MAT 100 100 106 110 115 104 27.0 Credit Hours CIS SEC SEC Accounting I Introduction to Business Introduction to Information Technology Computer Programming Design English Composition Algebra with Applications Area II-Major Component 45.0 Credit Hours 13.5 Credit Hours Students must choose one of the following Area II Concentration Components to complete the Bachelor of Science in Information Systems. Area III-General Education Component ENG ENG ENG HIS POL HUM HUM MAT PHI PSY PSY REL SCI SCI SOC ECO POL SOC 215 315 316 105 110 111 112 311 210 100 105 212 110 115 100 405 300 300 54.0 Credit Hours Research and Writing Professional Communications OR Technical Writing (Required for IT) Contemporary U.S. History OR U.S. Government World Cultures I World Cultures II Discrete Math Critical Thinking Psychology of Adjustment OR Introduction to Psychology World Religions Introduction to Physical Science OR Introduction to Biology Introduction to Sociology Economic Problems and Issues OR Contemporary International Problems OR Sociology of Developing Countries Area IV-Elective Component 40.5 Credit Hours These courses are selected in consultation with the Academic Advisor; within this component it is possible for students to develop a minor in a second area of study (See “Minors”). Students attending New Jersey campuses must take five electives from the General Studies disciplines listed in the catalog: Economics, English, Foreign Language, History, Humanities, Mathematics, Philosophy, Political Science, Psychology, Religion, Science and Sociology. Minimum Total Quarter Hours Required for Completion 332 420 435 13.5 Credit Hours Network Server Administration Perimeter Defense Techniques Network Penetration Testing Concentration in Database Technology CIS 111 Introduction to Relational Database Management Systems CIS 175 Introduction to Networking CIS 210 Systems Analysis and Development CIS 273 Web Design & Development CIS 312 Computer Architecture CIS 329 Administering Desktop Clients OR CIS 337 Internetworking Basics CIS 333 Network Security Fundamentals CIS 375 Human Computer Interaction MAT200 Pre-Calculus CIS 498 Undergraduate Information Technology Capstone Area II-Concentration Component Area II-Concentration 180.0 Area II-Concentration CIS CIS CIS 267 424 428 13.5 Credit Hours Visual Basic Programming Database Administration I Database Administration II Concentration in Digital Forensics Technology Area II-Concentration CIS SEC SEC 332 340 435 13.5 Credit Hours Network Server Administration Computer Forensic Technology Network Penetration Testing Concentration in Enterprise Security Technology Area II-Concentration CIS SEC SEC 332 420 459 13.5 Credit Hours Network Server Administration Perimeter Defense Techniques Disaster Recovery & Virtualization Concentration in Internetworking Technology Area II-Concentration CIS CIS CIS 411 413 436 13.5 Credit Hours Advanced Routing Internetworking Switching Internetworking Troubleshooting Concentration in Networking Technology Area II-Concentration CIS CIS CIS CIS 332 401 409 442 13.5 Credit Hours Network Server Administration Network Server Administration II Directory Service Infrastructure OR Application Server Development Concentration in Programming Technology Area II-Concentration CIS CIS CIS CIS CIS 267 242 406 328 407 13.5 Credit Hours Visual Basic Programming C++ Programming OR Java Programming I C++ Programming II OR Java Programming II Concentration in Web Development Technology Area II-Concentration CIS CIS CIS 267 307 309 Visual Basic Programming Web Development I Web Development II All courses are 4.5 credits. Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative. 13.5 Credit Hours OUR BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT) PROGRAM PREPARES YOU TO DESIGN, IMPLEMENT, AND ADMINISTER THE SOPHISTICATED COMPUTER-BASED TECHNOLOGIES THAT POWER TODAY’S WORKPLACES. PROGRAM CONCENTRATIONS Our Bachelor of Science in Information Technology (BSIT) program prepares you to design, implement, and administer Become an authority on protecting data assets. You’ll explore the design, implementation, and management of security initiatives in common and complex computing environments. Learn the knowledge, skills, legal background, and ethical principles necessary for sound and effective policy development. the sophisticated computer-based technologies that power today’s workplaces. For any organization to progress, technology is vital—as are the well-trained professionals who understand how to manage, protect, and enhance it. At Strayer University, you’ll get a multidisciplinary perspective and hands-on practice* for deploying forward-thinking solutions and innovations. Build the critical-thinking skills you need, and learn effective strategies and processes. Power your career. * The School of Information Systems and Technology uses virtual, live labs such as MOAC Labs, EC-Council-ILabs, and Toolwire , providing a live, networked environment, with anytime-anywhere access. APPLY knowledge of computing and the current use of ANALYZE the impact of computing on individuals, technology techniques, skills, and tools necessary for the organizations, and society. computing practice. UNDERSTAND the relevance of continuing professional development requirements in the information technology domain. solve business problems with technology solutions using qualitative and quantitative information. DEMONSTRATE the ability to identify and analyze user needs in the selection, creation, evaluation, and administration of DESIGN, implement, and evaluate computer-based systems, computer-based systems. processes, components, or programs to meet desired needs. EXPLAIN the use of best practices and technology standards, DEMONSTRATE an understanding of the professional, ethical, and their application in an organizational context. legal, security, and social issues and responsibilities in the information technology domain. DEMONSTRATE the ability to analyze and create effective information technology project plans with graphic DEMONSTRATE the ability to communicate and function representations into the user environment. effectively with a range of audiences to accomplish a common goal. TRAYER UNIVERSITY IS S ACCREDITED BY THE MIDDLE STATES COMMISSION ON HIGHER EDUCATION an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education. Middle States Commission on Higher Education, 3624 Market Street, Philadelphia, PA 19104. (267-284-5000) Area I-Core Component Cyber Security Management Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Cybersecurity Technology Coursework prepares students for roles such as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Database Technology Learn to create and administer enterprise databases in support of practical businesses problems. Focus on applying effective database security, redundancy, and data transformation strategies to real-world situations. Coursework provides graduates with competencies applicable to database administration. Typical responsibilities include coordinating changes to, testing, and implementing databases; and planning effective security measures. Digital Forensics Technology Investigate the world of forensics related to digital evidence and devices. Get applied knowledge, skills, and practice in identifying and creating a digital forensic investigation, examination, and response. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Enterprise Security Technology Accreditations and Approvals THE NATIONAL SECURITY AGENCY (NSA) COMMITTEE ON NATIONAL SECURITY SYSTEMS (CNSS) certifies that Strayer University’s information security curriculum meets the national training standards for information systems security professionals and system administrators (NSTISSI No. 4011, 4013). Additionally, the BSIS curriculum aligns with curricular guidelines set by the Association for Computing Machinery (ACM). COURSE OF STUDY Become adept at identifying and creating powerful, effective enterprise security solutions as applied to practical business problems. You’ll develop competencies for securing and administering digital assets in an organization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013) Coursework prepares students for roles with similar responsibilities as Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst. Concentration in Cyber Security Technology Bachelor of Science in Information Technology career and learning goals: Get extensive tactical preparation in the design and protection of data assets. You’ll focus on defending digital assets, systems, and information from cybercrime attacks, including viruses, botnets, worms, and Trojans. KEY LEARNING OBJECTIVES DEMONSTRATE the ability to locate, critically evaluate, and The BSIT curriculum offers a choice of 8 different skill-based concentrations so you can tailor your degree to your unique Internetworking Technology Learn the ins and outs of administering and designing enterprise internetwork environments for efficient information and resource management. Coursework provides proficiencies for students interested in pursuing roles such as Network Analyst, Systems Engineer/Analyst, Network Specialist, System Programmer, or Telecommunications Manager. Networking Technology Understand how to create and administer enterprise computing environments that successfully address practical business problems. Coursework provides graduates with additional competencies to assume roles similar to Computer Software Engineers. Typical job responsibilities in computer software engineering include developing, creating, and modifying general computer applications software or specialized utility programs, analyzing user needs and developing software solutions, designing software or customizing software for client use with the aim of optimizing operational efficiency, analyzing and designing databases within an application area, and working individually or coordinating database development as part of a team. Programming Technology Prepare for you future role in designing, writing, documenting, developing, and implementing computer programs that generate real enterprise solutions for businesses and organizations. Coursework provides students with competencies applicable to Computer Programmers. Responsibilities may include converting project specifications and statements of problems/procedures to logical flow charts for coding; developing programs to store, locate, and retrieve documents, data, and information; and programming websites. Web Development Technology Build a strong knowledge and skill base in the design, coding, and development of Web applications as applied to practical business problems. Coursework prepares students to assume roles as Web Developers, with a focus on design and building Web applications and websites; creating and specifying architectural and technical parameters; and directing content creation, enhancement, and maintenance. ACC BUS CIS CIS ENG MAT 100 100 106 110 115 104 27.0 Credit Hours CIS SEC SEC Accounting I Introduction to Business Introduction to Information Technology Computer Programming Design English Composition Algebra with Applications Area II-Major Component 45.0 Credit Hours 13.5 Credit Hours Students must choose one of the following Area II Concentration Components to complete the Bachelor of Science in Information Systems. Area III-General Education Component ENG ENG ENG HIS POL HUM HUM MAT PHI PSY PSY REL SCI SCI SOC ECO POL SOC 215 315 316 105 110 111 112 311 210 100 105 212 110 115 100 405 300 300 54.0 Credit Hours Research and Writing Professional Communications OR Technical Writing (Required for IT) Contemporary U.S. History OR U.S. Government World Cultures I World Cultures II Discrete Math Critical Thinking Psychology of Adjustment OR Introduction to Psychology World Religions Introduction to Physical Science OR Introduction to Biology Introduction to Sociology Economic Problems and Issues OR Contemporary International Problems OR Sociology of Developing Countries Area IV-Elective Component 40.5 Credit Hours These courses are selected in consultation with the Academic Advisor; within this component it is possible for students to develop a minor in a second area of study (See “Minors”). Students attending New Jersey campuses must take five electives from the General Studies disciplines listed in the catalog: Economics, English, Foreign Language, History, Humanities, Mathematics, Philosophy, Political Science, Psychology, Religion, Science and Sociology. Minimum Total Quarter Hours Required for Completion 332 420 435 13.5 Credit Hours Network Server Administration Perimeter Defense Techniques Network Penetration Testing Concentration in Database Technology CIS 111 Introduction to Relational Database Management Systems CIS 175 Introduction to Networking CIS 210 Systems Analysis and Development CIS 273 Web Design & Development CIS 312 Computer Architecture CIS 329 Administering Desktop Clients OR CIS 337 Internetworking Basics CIS 333 Network Security Fundamentals CIS 375 Human Computer Interaction MAT200 Pre-Calculus CIS 498 Undergraduate Information Technology Capstone Area II-Concentration Component Area II-Concentration 180.0 Area II-Concentration CIS CIS CIS 267 424 428 13.5 Credit Hours Visual Basic Programming Database Administration I Database Administration II Concentration in Digital Forensics Technology Area II-Concentration CIS SEC SEC 332 340 435 13.5 Credit Hours Network Server Administration Computer Forensic Technology Network Penetration Testing Concentration in Enterprise Security Technology Area II-Concentration CIS SEC SEC 332 420 459 13.5 Credit Hours Network Server Administration Perimeter Defense Techniques Disaster Recovery & Virtualization Concentration in Internetworking Technology Area II-Concentration CIS CIS CIS 411 413 436 13.5 Credit Hours Advanced Routing Internetworking Switching Internetworking Troubleshooting Concentration in Networking Technology Area II-Concentration CIS CIS CIS CIS 332 401 409 442 13.5 Credit Hours Network Server Administration Network Server Administration II Directory Service Infrastructure OR Application Server Development Concentration in Programming Technology Area II-Concentration CIS CIS CIS CIS CIS 267 242 406 328 407 13.5 Credit Hours Visual Basic Programming C++ Programming OR Java Programming I C++ Programming II OR Java Programming II Concentration in Web Development Technology Area II-Concentration CIS CIS CIS 267 307 309 Visual Basic Programming Web Development I Web Development II All courses are 4.5 credits. Programs and concentrations vary by state. For more information about what is available in your state, contact an Admissions Representative. 13.5 Credit Hours ON CAMPUS, ONLINE, ON YOUR SCHEDULE. For a 120-year-old university, we’re pretty forward-thinking. With 100 campuses spread across 25 states, we’re just about anywhere you look. And we offer convenient class times to fit your busy life – including evenings and weekends. You can even jump on your laptop or access Strayer’s mobile app, to participate in online classes wherever you are. Whether you prefer learning online, on campus, or even both, a Strayer education prepares you for the future by allowing you to earn your degree on your schedule. Go to strayer.edu to find a convenient campus location near you. RESOURCES AND SUPPORT? CHECK. Just like pursuing higher education, finding a job can often require hours of preparation and research – and a little support can go a long way. Our University Career Center (UCC) offers a number of proven and go to market resources designed to meet your career needs and boost your professional development – giving you an edge over the competition. No matter what your career path is, we’re here to help every step of the way. With free Microsoft software and discounted HP hardware, you’ll be able to save hundreds of dollars using Strayer’s Tech Pack. Strayer’s convenient mobile app allows you to participate in classes, find a campus, connect in social media, get help and more. It’s available for Apple and Android, and a must-have for any Strayer student. Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University’s academic programs, please go to www.strayer.edu/academic-program-information. Students may be required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B, 09-05-1898T 10-05-1934B, 10-05-1933B. This institution is approved by the Indiana Board for Proprietary Education, 101 W Ohio St., Ste. 670, Indianapolis, IN 46204-1985, 317.464.4400 Ext. 138. For licensure and certification information, please go to https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org. ON CAMPUS, ONLINE, ON YOUR SCHEDULE. For a 120-year-old university, we’re pretty forward-thinking. With 100 campuses spread across 25 states, we’re just about anywhere you look. And we offer convenient class times to fit GET A BETTER IDEA OF WHAT’S AHEAD. You already know your goals, but may need a better idea of how much it could cost to reach them. These charts are designed to provide you with a general overview of tuition, and the amount of time it could take to earn your degree. Since every Strayer student brings their own unique experience, your costs and time to completion can vary depending on things like transferable credits, loans, grants, scholarships, even life experience. For a clearer breakdown of your Strayer education, start by reviewing the charts below. Then begin your Personal Education Plan for a more in-depth look. IF YOU ARE: NUMBER OF CLASSES TIME TO GRADUATE Full-time 3 or more classes per quarter 3.5 years or fewer Part-time 2 or fewer classes per quarter 5 years or more The times to graduate assume that students are enrolled in consecutive quarters. Transfer of college credit, challenge exams, and other individual circumstances may allow you to complete your degree sooner. Students study at their own pace and on their own schedule. Normal time for program completion is 6.5 years. your busy life – including evenings and weekends. You can even jump on your laptop or access Strayer’s mobile app, to participate COURSES REQUIRED Whether you prefer learning online, on campus, or even both, 40 a Strayer education prepares you for the future by allowing you to earn your degree on your schedule. YOU’RE ALREADY QUALIFIED TO LEARN. YOU MAY QUALIFY TO SAVE. There are many ways to cut the cost on a premium education. • Federal or private loans • Grants • Tuition assistance from your employer in online classes wherever you are. Go to strayer.edu to find a convenient campus location near you. RESOURCES AND SUPPORT? CHECK. Just like pursuing higher education, finding a job can often require hours of preparation and research – and a little support can go a long way. Our University Career Center (UCC) offers a number of proven and go to market resources designed to boost your career needs and professional development, while our Career Builder Elite can help give you an edge over the competition. No matter what your career path is, we’re here to help every step of the way. With free Microsoft software and discounted HP hardware, you’ll be able to save hundreds of dollars using Strayer’s Tech Pack. TRANSFER CREDITS ACCEPTED YES QUARTER LENGTH COURSE COST 11 WEEKS Full time – $1,700 Part time – $1,775 RECOGNIZED PROVEN RESPECTED • Military tuition assistance • Scholarships *Textbooks and supplies are not included in the tuition rate and must be purchased by the student. You should allow approximately $150 per course for textbooks and supplies. Does not include the application fee of $50 or the technology fee of $45. In Tennessee, tuition for full-time undergraduate studets is $1775 per course. MARKETABLE FLEXIBLE IT ONLY TAKES A FEW MINUTES TO PLAN YOUR FUTURE. Bryan Rolle Student At Strayer, we understand the thought of pursuing a higher education can be overwhelming. That’s why we’ve created the Personal Education Plan – a step-by-step planner that helps to provide the estimates and answers to everything you want to know, instantly. Strayer’s Personal Education Plan will even answer your questions about tuition, scheduling, graduation dates, and the most important question of all – “When do I start?” SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY EARNING YOUR DEGREE IS CHALLENGING. PLANNING FOR IT DOESN’T HAVE TO BE. BUILD YOUR PERSONAL EDUCATION PLAN TODAY. Visit STRAYER.EDU to build your education plan Strayer’s convenient mobile app allows you to participate in classes, find a campus, connect in social media, get help and more. It’s available for Apple and Android, and a must-have for any Strayer student. Program Length: Strayer University students are mostly working adults who earn their degrees at their own pace and on their own schedule. Most students attend part-time, and the normal time to complete this program is 6 years. The applicable U.S. Department of Education regulation does not permit the disclosure of the on-time graduation rate or median debt amounts for this program. Program availability varies by state and campus. Please visit www.strayer.edu for program availability. For disclosures regarding Strayer University’s academic programs, please go to www.strayer.edu/academic-program-information. Students may be required to take courses in an online format in order to complete a degree program. In Ohio, Associate of Arts degree programs are called Associate of Applied Business. Transfer of Course/Degree Credit to Other Institutions in Arkansas: The student should be aware that these degree programs may not transfer. The transfer of course/degree credit is determined by the receiving institution. Certified to operate by SCHEV. Ohio registration numbers: 08-09-1877B, 08-09-1878B, 08-09-1879B, 08-09-1880B, 0905-1898T 10-05-1934B, 10-05-1933B. Strayer University is regulated by the Indiana Commission on Higher Education, 402 W. Washington Street, Room W462, Indianapolis, IN 46204. (317) 464-4400. For licensure and certification information, please go to https://icampus.strayer.edu/student-services/student-consumer-information/licensed-careers. Strayer University is authorized for operation by the Illinois Board of Higher Education, 431 East Adams, 2nd Floor, Springfield, IL 62701-1404, info@ibhe.org. Program Costs: Cost information for Strayer University programs is available at www.strayer.edu/tuition-and-fees. The tuition and fees for the entire program, at current part-time tuition rates, are $72,400, and at current full-time tuition rates, are $69,000. The tuition and fees for the entire program for all Tennessee students are $72,400. The total estimated cost for books and supplies for the entire program is $6,000. Strayer University does not offer on-campus housing. Occupations: The following U.S. Department of Labor Standard Occupational Classification (SOC) Codes and occupational titles are disclosed pursuant to U.S. Department of Education regulations, and correspond to the U.S. Department of Education Classification of Instructional Programs (CIP) Code for this program. Computer and Information Systems Managers 11-3021.00; Computer and Information Research Scientists 15-1111.00; Computer Network Architects 151143.00; Computer Systems Analysts 15-1121.00; Informatics Nurse Specialists 15-1121.01; Information Security Analysts 15-1122.00; Software Developers, Applications 15-1132.00; Software Developers, Systems Software 15-1133.00; Telecommunications Engineering Specialists 15-1143.01. For more information, please visit: http://online.onetcenter.org/crosswalk Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE / VALUABLE
Similar documents
Apply today: strayer.edu/apply
anywhere you look. And we offer convenient class times to fit your busy life – including evenings and weekends. You can even jump on your laptop or access Strayer’s mobile app, to participate in on...
More informationApply today: strayer.edu/apply
Introduction to Biology Introduction to Sociology Economic Problems and Issues OR Contemporary International Problems OR Sociology of Developing Countries
More information