Bachelor of Science in Information Technology Concentrations

Further Customize Your Degree

When you enroll in the Bachelor of Science in Information Technology, you can select from four concentrations to personalize your education. A concentration is a grouping of courses designed to prepare you with specialized IT knowledge and skills. Learn more about the concentration area that best fits your desired career path.

Woman working at laptop

Information Security and Assurance Concentration

The Bachelor of Science in Information Technology with a concentration in information security and assurance is designed to expose you to the field of computer forensics. By gaining an understanding of basic network administrative principles, you can begin to grasp the subtleties within the operational field of cybersecurity.

  • Computer forensics is especially important to businesses. Digital forensic specialists are often called on to investigate, identify, and document the occurrence of computer crime.

    As a graduate of the program, you’ll be prepared for the workplace with practical skills, including:

    • Basic network administration
    • Data analysis to prevent identity theft and fraud
    • Installation and use of intrusion-detection system tools
    • Security threat analysis

    Real-World Connections

    Through exposure to incident response practices and procedures dedicated to analyzing and tracking intrusions, you will gain a practical understanding of the policies that govern information systems security, as well as the practices of computer forensics.

    Professional Competencies of Graduates

    Courses within the information security and assurance concentration could help students develop the following skills:

    • Formulate innovative solutions for identified initiatives.
    • Assess the value of multiculturalism and diversity in a global environment.
    • Contribute to team goals and objectives through active participation and collaboration.
    • Engage in career development and advancement strategies, including effective networking, mentoring, and creating a personal brand.
    • Achieve goals through planning and prioritization.
  • Network Administration

    • Examine the features, editions, roles, and installation methods of a network operating system.
    • Administer server roles, features, storage options, file and print services, and file and folder permissions.
    • Configure Active Directory including domains, organizational units, user accounts, and group policy while ensuring compatibility with global networks.
    • Configure TCP/IP, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol) on a network server.
    • Manage virtualization using Hyper-V.

    Networking With TCP/IP

    • Examine the TCP/IP networking model, IPv4 and IPv6 addressing, and basic IP packet structures.
    • Explore the protocols that operate at the lower layers of the TCP/IP model.
    • Analyze IPv6 Neighbor Discovery, addressing, and name resolution on IP networks.
    • Examine TCP/IP Transport Layer Protocols.
    • Differentiate between IPv4 and IPv6, regarding deployment, benefits, and IP security.

    Computer Forensics

    • Examine the relationship between computers and criminal behavior.
    • Describe the field of computer forensics and investigations as a profession.
    • Analyze the processes involved in computer forensics.
    • Examine various data acquisition methods.
    • Compare current computer forensic tools.
    • Describe techniques of data analysis and validation to recognize identity theft and fraud.

    Intrusion Detection and Incidence Response

    • Discuss intrusion detection and incident response principles and concepts.
    • Compare intrusion detection systems.
    • Analyze the security threat spectrum.
    • Demonstrate the ability to install and configure intrusion-detection system tools.
    • Interpret various security analytic measures.
    • Differentiate incident response strategies.

    Digital Forensics

    • Examine digital forensics concepts and techniques.
    • Plan appropriate methods to secure digital evidence.
    • Apply various types of forensic analysis tools for data recovery to forensic scenarios.
    • Prepare audits and investigations of electronic computing devices.
    • Analyze forensic data from computers to investigate security breaches.
    • Investigate current practices and trends in digital and network forensics.

    Information Systems Security

    • Examine information security concepts.
    • Analyze system vulnerabilities and threats.
    • Choose data encryption techniques and confidentiality best practices.
    • Employ solutions that provide protection against system attacks.
    • Develop information backup and data persistence procedures.
    • Design network security policies and procedures.

    Professional Certification Information Websites

    Learn more about external certifications associated with this concentration:

  • According to the Bureau of Labor Statistics, employment of information security analysts is projected to grow 10% from 2016 to 2026, much faster than the average for all occupations.

IT Management Concentration

This concentration provides you with the flexibility to customize your degree. You can select from a wide variety of courses to enhance your education.

  • As a graduate of the Bachelor of Science in Information Technology program with a concentration in IT management, you could be prepared for the workplace with advanced skills or certification preparation in several areas:

    • Preparation for CISSP or CEH certifications
    • Advanced skills in cloud computing, project management, Linux or Windows operating systems, routing and switching, computer forensics, and security

    Real-World Connections

    As part of the IT management concentration, you will become familiar with advanced concepts that build on the foundational skills learned in your degree plan and help you to specialize in specific areas of IT. The courses available in the concentration can provide you with skill sets that could prepare you for roles beyond entry-level positions.

    Professional Competencies of Graduates

    Courses within the IT management concentration can also help you develop the following skills:

    • Leadership and communication
    • Problem solving and critical thinking
    • Teamwork
    • Personal presentation
    • Appreciation of concepts of multiculturalism and diversity
  • (Students must choose at least four of the following to complete the concentration)

    Certified Ethical Hacking I

    • Interpret network and reconnaissance results.
    • Describe steps and techniques to perform enumeration, scanning, and packet capture.
    • Produce network and web server attacks.
    • Produce wireless attacks and malware.
    • Explain encryption and social engineering attacks.

    Certified Information Systems Security Professional I

    • Examine the three pillars of cybersecurity: confidentiality, integrity, availability.
    • Explain information and asset classification.
    • Differentiate multi-level data security controls.
    • Distinguish access control, integrity, and information flow security models.
    • Differentiate various security evaluation criteria.

    Certified Information Systems Security Professional II

    • Examine engineering processes and secure design principles.
    • Analyze symmetric and asymmetric cryptosystem fundamentals.
    • Apply secure design principles to network architecture.
    • Identify network attacks and mitigation responses.
    • Describe security in the software development lifecycle.

    Linux Security

    • Configure a Linux installation.
    • Explain rules and procedures of a penetration testing program.
    • Illustrate the scope and information gathering processes for a target environment.
    • Apply the target discovery process.
    • Apply the target enumeration process.
    • Analyze the security vulnerabilities in a targeted environment.

    Windows Enterprise Administration

    • Install Windows 2012 operating system into a virtual machine or hardware chassis.
    • Configure Windows 2012 operating system including administration tools.
    • Configure Active Directory and policy functions in a new domain on Windows 2012 operating system.
    • Configure network services and components.
    • Implement network policy and monitoring to specific situations.
    • Apply security functions in Windows 2012 operating system.

    Intrusion Detection and Incidence Response

    • Discuss intrusion detection and incident response principles and concepts.
    • Compare intrusion detection systems.
    • Analyze the security threat spectrum.
    • Demonstrate the ability to install and examine intrusion detection system tools.
    • Interpret various security analytic measures.
    • Differentiate incident response strategies.

    Certified Ethical Hacking II

    • Conduct social engineering and physical security attacks.
    • Illustrate Trojans, malware, and cryptology attacks.
    • Devise web server and web application attacks.
    • Prepare wireless network attacks.
    • Formulate organizational cyber threat mitigation procedures.
    • Develop an ethical hacking plan to test an organization’s cybersecurity posture.

    Project Management II

    • Plan project resources.
    • Examine the project management knowledge areas.
    • Assess project work.
    • Demonstrate the ability to manage project teams.

    Certified Information Systems Security Professional III

    • Discriminate assessment and test strategies.
    • Analyze security control testing.
    • Examine foundational security operations concepts.
    • Determine incident prevention and response strategies.
    • Generalize key issues related to disaster recovery planning and physical security.
    • Distinguish legal issues and professional ethics in information security.

    Digital Forensics

    • Examine digital forensic concepts and techniques.
    • Plan appropriate methods to secure digital evidence.
    • Apply various types of forensic analysis tools for data recovery to forensic scenarios.
    • Prepare audits and investigations of electronic computing devices.
    • Analyze forensic data from computers to investigate security breaches.
    • Investigate current practices and trends in digital and network forensics.

    Information Systems Security

    • Examine information security concepts.
    • Analyze system vulnerabilities and threats.
    • Choose data encryption techniques and confidentiality best practices.
    • Employ solutions that provide protection against system attacks.
    • Develop information backup and data persistence procedures.
    • Design network security policies and procedures.

    Routing and Switching II

    • Prepare an IP scheme for a small network to submit for management approval.
    • Configure routing and switching devices per plans and specifications.
    • Explore advanced network routing and switching concepts.
    • Prepare network designs based on specific criteria.
    • Prepare a disaster recovery plan for a routed infrastructure.
    • Prepare routing and switching proposals for management approval.

  • The Bureau of Labor Statistics projects that employment of computer and information systems managers is projected to grow 12% from 2016 to 2026, faster than the average for all occupations. Demand for computer and information systems managers may increase as firms expand their use of wireless and mobile networks.

Network Administration Concentration

The Bachelor of Science in Information Technology with a concentration in network administration is designed to help you understand the main features, roles, and design of a network operating system.

  • As a student, you’ll explore the critical functions of network and system administrators, including how to configure Active Directory, creating and monitoring user accounts, group policies, and domains. You will gain a solid foundation in the basic concepts, protocols, and functions of network routers and switches.

    Upon graduation, you will be prepared for the workplace with practical skills, including:

    • Installing and configuring network servers
    • Select-analyzing and troubleshooting TCP/IP protocol suite
    • Implementing network security and broad-based monitoring
    • Designing, configuring, and maintaining network routing and switching

    Real-World Connections

    With the background provided by the network administration concentration, you’ll be equipped to perform essential network support tasks. Possible positions include Level 1 and Level 2 tech support, as well as entry-level membership into network administrator teams. As part of this concentration, you will complete hands-on labs and projects that help you develop the skills you’ll need for the workplace.

    Professional Competencies of Graduates

    Courses within the network administration concentration could help students develop the following skills:

    • Formulate innovative solutions for identified initiatives.
    • Achieve goals through planning and prioritization.
  • Network Administration

    • Examine the features, editions, roles, and installation methods of a network operating system.
    • Administer server roles, features, storage options, file and print services, and file and folder permissions.
    • Configure Active Directory including domains, organizational units, user accounts, and group policy while ensuring compatibility with global networks.
    • Configure TCP/IP, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol) on a network server.
    • Manage virtualization using Hyper-V.

    Networking With TCP/IP

    • Examine the TCP/IP networking model, IPv4, and IPv6 addressing and basic IP packet structures.
    • Analyze the protocols that operate at the lower layers of the TCP/IP model.
    • Analyze IPv6 Neighbor Discovery, and addressing and name resolution on IP networks.
    • Examine TCP/IP Transport Layer Protocols.
    • Differentiate between IPv4 and IPv6, regarding deployment, benefits, and IP security.

    Windows Enterprise Administration

    • Install Windows 2012 operating system into a virtual machine or hardware chassis.
    • Configure Windows 2012 operating system including administration tools.
    • Configure Active Directory and policy functions in a new domain on Windows 2012.
    • Configure network services and components.
    • Implement network policy and monitoring to specific situations.
    • Apply security functions in Windows 2012 operating system.

    Routing and Switching I
    Routing and Switching II

    • Explain network routing and switching concepts.
    • Estimate an IP addressing scheme based on business needs.
    • Apply router and switching configurations to meet business needs.
    • Investigate network routing protocols to meet business requirements.
    • Design VLANs based on specific situations.
    • Prepare routing and switching proposals for management approval.
    • Prepare network designs based on specific criteria.
    • Prepare a disaster recovery plan for a routed infrastructure.

    Professional Certifications Information Websites

    Learn more about external certifications associated in this area:

  • According to the Bureau of Labor Statistics, employment of computer network architects is projected to increase 6% from 2016 to 2026.

Programming and Software Development Concentration

The Bachelor of Science in Information Technology with a concentration in programming and software development provides you with an in-depth understanding of software development practices. You’ll study a wide variety of platforms, including web, mobile, and traditional applications.

  • As a student, you’ll learn the fundamental, intermediate, and advanced concepts of software development. In each course, you’ll have the chance to apply these concepts in one or more programming languages, including C#, Java, JavaScript, PHP, and HTML/CSS.

    This concentration includes a mini-capstone where teams of students use their software development skills to create a real-world application.

    Upon graduation, you’ll be prepared for the workplace with practical skills, including:

    • Developing stand-alone computer programs
    • Developing mobile applications
    • Developing websites
    • Debugging computer programs
    • Maintaining computer programs
    • Working with teams to create applications

    Real-World Connections

    Students who complete this program will have created a working mobile application and have worked with a team to create an application that may be marketed to the general public.

    Professional Competencies of Graduates

    Courses within the concentration could help students develop the following skills:

    • Leadership and communication
    • Problem solving and critical thinking
    • Personal presentation
    • Understand concepts of multiculturalism and diversity
    • Develop fundamental programs using concepts such as declaring and initializing variables and constants.
    • Create fundamental programs using concepts such as decision statements and iteration.
    • Devise plans for programs using an understanding of historical development of programming techniques and appropriate modeling techniques.
    • Build fundamental programs using concepts such as functions and arrays.
    • Apply the debugging and testing processes to programs containing fundamental concepts such as decision statements, iteration, functions, and arrays.
    • Explore various software process models.
    • Compose software using advanced interface and program design techniques.
    • Select appropriate secure data handling techniques.
    • Construct software test plan for validation and verification of design requirements.
    • Examine object-oriented programming concepts.
    • Apply the common linear structures of lists, stacks, and queues.
    • Develop procedures to solve data structures and algorithm problems.
    • Analyze best practices for interactive user interface design.
    • Analyze the client/server relationship.
    • Evaluate web services.
    • Design interactive web applications or mobile applications.
    • Describe distributed and collaborative development concepts.
    • Implement a database schema with security and optimization.
    • Plan system testing and quality assurance activities.
    • Implement algorithms that allow analysis and optimization.
    • Integrate the best practices of software development.
    • Prepare software for distribution.
    • Determine agile development practices.
    • Engage in agile project teamwork and communication.
    • Demonstrate software development skills in a continuous integration environment.
    • Apply integration and system testing skills in an agile environment.
    • Create a software application from a concept to a finished product.
    • Create a distribution package of software product for release to end-users.

    Professional Certifications

    Learn more about external certifications associated with this concentration:

    • C#—Microsoft Certified System Developer
    • Java—Oracle Certification
    • Web Languages—W3Schools Certification
  • According to the Bureau of Labor Statistics:

NOTES AND CONDITIONS

Purdue Global cannot guarantee employment or career advancement. Students are responsible for understanding the requirements of optional certification exams. The University cannot guarantee students will be eligible to sit for or pass exams. In some cases, work experience, additional coursework beyond the Purdue Global program, fieldwork, and/or background checks may be necessary to be eligible to take or to successfully pass the exams. You must pass an additional exam offered by independent certification agencies to become certified in this field. For more information consult an Admissions Advisor.

National long-term projections may not reflect local and/or short-term economic or job conditions, and do not guarantee actual job growth