Skip to Main Content

ODP.BSITIS - BS Information Technology - Information Systems Security (online)

Program Code

ODP.BSITIS

Program Title

BS Information Technology - Information Systems Security

Program Description

The B.S. program in Information Technology (IT) with a Concentration in Information Systems Security offers students a broad foundation in networks, network administration, and data management, along with specialized expertise in systems security, risk mitigation, and disaster recovery. The B.S. program is specifically designed to prepare students to earn four highly respected professional certifications from the Computing Technology Industry Association (CompTIA)-namely, CompTIA Linux, CompTIA A+, CompTIA Security+, and CompTIA Network+ (see details below). Graduates are prepared for mid- to senior-level positions in business, non-profit, church, or parachurch organizations. Examples include cybersecurity analyst, information management analyst, IT administrator, IT security consultant, and security operations center (SOC) analyst. They are also prepared to pursue graduate degrees, such as the M.S. in Information Technology or M.S. in IT Management.

Modality. Point University offers the B.S. in Information Technology/Information Systems Security in fully-online format. Point Online students engage in asynchronous Learning through a course website that facilitates interaction with their instructor and classmates.

Learning Outcomes

Program Purpose and Student Learning Objectives

Purpose. The B.S. program in Information Technology (IT) with a Concentration in Information Systems Security prepares students to glorify God through Christ-centered ethical leadership and vocational excellence in the IT field, with an emphasis on net-works, network administration, data management, systems security, risk mitigation, and disaster recovery.

This Information Technology Major builds on Point University’s mission, values, and Core Curriculum (General Studies and Character Formation) to accomplish the following student learning objectives:

Foundational knowledge and skills in information technology

Objective 1:   Students locate and survey industry-related tools and resources.

Objective 2:  Students identify and describe a variety of information technologies, support services, and operating systems.

Principles, methods, and legal and ethical standards for IT support

Objective 3:  Students describe the role of technology in the workplace.

Objective 4:  Students demonstrate effective, ethical, and secure practices for troubleshooting a variety of technologies.

Functions and components of a desktop personal computing devices

Objective 5:   Students employ critical thinking to diagnose and recommend the appropriate technology troubleshooting techniques or tool.

Objective 6:  Students demonstrate basic knowledge of information technology best practices, safety, security, and preventive measures.

Computer networks and troubleshooting

Objective 7:   Students identify network configurations, topologies, and protocols.

Objective 8:  Students explain connectivity and communication standards.

Objective 9:  Students apply troubleshooting techniques and tools to network installation, maintenance, and configuration of devices.

Objective 10: Students compare and contrast servers, administration (deployment, management, directories, storage), and recovery solutions.

Systems security, risk mitigation, and disaster recovery

Objective 11: Students identify network classifications (e.g. LAN, WAN, MAN) and net-work typologies.

Objective 12: Students recognize security vulnerabilities and preventive measures.

Objective 13: Students create effective, usable security policies and procedures for troubleshooting, maintenance, and prevention.

Objective 14: Students understand and describe the proper implementation of advanced security applications, such as Intrusion Detection and Prevention Systems, Network and System Firewalls, Anti-Virus, Security Information and Event Management (SIEM), and data encryption.

Objective 15: Students perform risk analyses and assessments to create disaster recovery and business continuity plans reflecting “best practices.”

Recommended Course Sequence

Choosing a Character Core Track. Students who complete all courses in the Theological Track graduate with a Biblical Studies Minor. If students want to combine elements of both tracks while meeting the program learning objectives, they must complete one course in each numbered category in sequence. In other words, they must complete one course labeled [1], and then one course labeled [2], and then one course labeled [3], and then one course labeled [4], and then one course labeled [5]. For details, see the “Character Core” described under the “Biblical Studies Department.”

Recommended Course Sequence. As online students prepare to enter their program, academic advisors prepare a customized course schedule, or “plan of study,” mapping out which courses students should complete in which sessions from start to graduation. These customized plans take into account degree requirements, transfer credits, pace of study, and other factors toward the goal of speeding students to the finish line in the shortest time possible.

Special Considerations

Professional Certifications. Courses within the Information Technology/Information Systems Security Major are specifically designed to prepare students to earn four highly respected professional certifications from the Computing Technology Industry Association (CompTIA), the leading IT industry trade organization described below). Point strongly urges students to complete the certification exams as they progress through the academic program because these high-demand industry certifications will give them a significant advantage in the job market. The certifications, the Point courses that support them, and the current exam costs appear below. Point does not guarantee that students will pass every exam. However, if they master the knowledge and skills taught in the Point courses, students should be well-prepared to complete the exams successfully.

IT exam prices

 

Students may also pursue additional security-related certifications from professional associations such as ISACA, (ISC)2, and the SANS Institute. Point encourages students to discuss the range of career options with the IT Program Coordinator.