Information Technology with Emphasis in Cybersecurity
The Bachelor Degree program in Information Technology with emphasis in Cybersecurity introduces students to a variety of topics, such as assessing the security vulnerability of computer and network systems, various computer and network safeguarding solutions, and managing the implementation and maintenance of security devices, systems, procedures and counter measures. As a graduate of the program, students will be prepared for a career as a developer of security design, information assurance expert, computer forensic investigator, ethical hacker, and/or any digital security related jobs.
Possible Employment Opportunities *
- Information Support Analyst
- Junior Ethical Hacker
- Network Security Support Analyst
- Bachelor’s Degree in Information Technology with emphasis in Cyber Security
- CompTIA A+
- CompTIA Network+
- CompTIA Security+
“I’m a Student here at FTC I am currently working to obtain a Bachelor’s degree in Information Technology. The goal is to get Certifications and the best part to that the school gives you vouchers for the exams. The staff will make you feel at home and they are very understanding”
Bachelor’s Degree in Information Technology Networking, Web Design and Programming │ Orlando campus
Source: Google Reviews
Duration of the IT Cybersecurity Program
In this course, students will identify strategies and support services that will help them have a successful transition into college. They will also apply academic skills, such as critical thinking, time management, learning strategies, and goal setting. Finally, they will develop life-management skills, like ethical decision-making, self-care, and communication that can later be applied at both a personal and a professional level.
Career Development Lecture
In this course, students will be provided practical strategies to employ throughout the job searching process. They will establish connections between the chosen academic field and their career objective. Students taking this course will be able to focus on their career options while in college and after obtaining their program degree. Emphasis is placed on developing their personal brand, résumé, interview and networking skills, and online presence to improve their employability possibilities.
Preparing for A+ Certification
In this course, students will develop technical skills and knowledge on how to administer, maintain, and operate different computer information systems. They will learn to evaluate different computer system components in order to modify and assemble them based on industry standards and business requirements. Students will use simulation tools to assess and modify computer system configuration to improve the system security functionality. This course will enhance students’ knowledge of computer information systems and prepare them to challenge the CompTIA A+ Certification.
Prerequisites: EEL1101, EEL1111
Computer Programming Design
This programming course is devoted to the process of design and evaluation of interactive systems, this part will combine teaching fundamental knowledge with teaching some applied skills that will help you in a variety of different careers – from software developer to usability engineer. A smaller part of the course will present a concise overview of human-computer interfaces. The goal of this part is to make you aware about a range of interfaces that can be a target of your design efforts right now and to prepare you to face the new generation of interfaces. The course also provides a brief overview of human information processing issues in the context of interactive system design and a small practical section on developing several kinds of interfaces with Java programming language.
Programming For Security (Python)
In this course, students will explore the foundational concepts, theories, and technical skills of the Python programming language. They will also analyze algorithms and pseudocode that can be used to automate computer tasks and information processing. Students will use simulation tools and applications in the assessment, modification, and development of their own Python code. They will also apply these tools in the processing, storage, and automation of computer tasks. Furthermore, students will practice acquired skills by completing lab exercises.
A+ Hardware, Networking & Mobile Computer Systems
In this course, students will analyze computer hardware in a personal computer. They will also examine a personal computer’s components, protocols, and functions. Additionally, students will distinguish storage systems, power supplies, and I/O devices. They will compare local network configuration processes. Furthermore, students will explore mobile device types, printer configuration, and virtualization architecture.
A+ Software, Security & Operating Systems
In this course, students will examine common computer configurations, operating systems, and customer support skills. They will also practice the installation of Windows operating systems and the configuration of a local network. In addition, students will compare personal computer troubleshooting techniques. Moreover, they will discuss computer system security strategies. Furthermore, students will analyze mobile devices, multiuser operating systems, and scripting technologies.
The goal of this course is to provide students with an introduction to networking technologies and design. The student will receive training in technology standards, governing bodies, hardware, security, troubleshooting, and site survey methodology. Students will be able to assess the benefits and limitations of various cabling options, implementation of WLANs (wireless local area networks) and the use of virtual local area networks (VLANs). Lab Included.
LAN Analysis and Design
In this course, students will analyze the fundamental models of data networking, such as the Open Systems Interconnection (OSI) reference model and its protocols that function at various model layers. They will examine the structure, design, and maintenance requirements of a corporate computer network (LAN). In addition, students will design a network by applying scenario-based solutions.
This networking course prepares the Florida Technical College student to properly install, configure, and administrate a Windows server of a domain in an Active Directory environment. Lab included.
Windows Network Infrastructure
This networking course prepares the Florida Technical College student to properly install, configure, monitor and troubleshoot the fundamental elements that allow for interoperability in a Windows-based LAN. Lab included.
Course Prerequisite: PRG 2110
In this course, students will study all the functions and features of installing, configuring, and maintaining operating systems. In-depth details are presented on implementing, managing, and troubleshooting hardware devices and drivers, network protocols, and security; monitoring and optimizing performance and reliability; and configuring and troubleshooting the desktop environment. Students will implement, manage, and troubleshoot storage, display, and peripheral devices. Furthermore, students will be able to practice the skills acquired by completing practical lab exercises.
In this course, students will evaluate vulnerability issues that could affect systems, networks, software, and web security. Students will also describe information security methods, such as encryption, authentication, key generation, auditing, monitoring, and risk evaluation. They will discuss confidentiality, privacy, integrity, availability, and fraud prevention as part of information security policies. Additionally, students will learn techniques used to ensure secure equipment configuration and placement within the different types of networks. Furthermore, students will be able to practice the skills acquired by completing practical lab exercises.
Routing and Switching
This course covers the components used to segment a local-area network (LAN), including bridges, switches, and routers. It provides a greater understanding of access control lists, routing protocols, local-area network and wide-area network (WAN) design, switching, virtual local-area networks (VLANs), and frame relay. Furthermore, students will develop the skills required for implementing and configuring network devices. Finally, students will be able to practice the skills acquired by completing practical lab exercises.
Designing Security for a Windows Network Lecture / Lab
In this course, students will analyze and design security solutions that meet predetermined business requirements. They will also study threats and the tools used to combat them in order to safeguard networks and clients. Upon completion, students will be able to provide security and disaster recovery recommendations for a wide range of scenarios. Additionally, students will be able to practice the skills acquired by completing practical lab exercises.
Virtualization and Cloud Management
This networking course will help the student become proficient in architecting and managing complex virtualization technologies using virtual networks powerful tools on site or over the cloud integrating cloud management, and focusing on updated Microsoft technologies.
Course Prerequisite: PRG 2161
In this course, students will develop technical skills and knowledge on how to administer, maintain, and operate a Linux computer information system. Students will evaluate Linux operating systems, and learn to configure, secure, manage, and install Linux computer systems based on industry standards and business requirements.
In this course, students will evaluate the fundamental theories and principles of information security. They will implement best practices, policies, strategies, and techniques from the National Institute of Standard and Technology (NIST) Cybersecurity Framework. In addition, they will develop procedures related to defense-in-depth, layered security, vulnerability assessment, risk management, governance and compliance, and encryption. Furthermore, students will practice acquired skills by completing lab exercises in preparation for the CompTIA Security + Certification.
Cyber Laws and Compliance
In this course, students will analyze the legal framework governing electronic information management, focusing on privacy, ethical use of information, legislation, and compliance. They will assess current threats on data security and the importance of risk mitigation, within the context of enabling secure data management and access. Students will also examine prevailing laws, regulations, policies, and standards, as well as the role of regulatory organizations that guide and monitor data integrity, security compliance, and user education.
In this course, students will determine the steps required to implement fully secured elements to the network design. They will analyze tasks related to cybersecurity consultants, including software and computer security, automation, threat chasing, and IT governing compliance. Furthermore, students will apply hardening techniques in practical laboratory activities.
Web Applications and Social Network Security
In this course, students will analyze the origins of the internet, its evolution, infrastructure, and the diversity of web-based applications, along with the principles behind network security and risk mitigation. They will evaluate e-commerce, social media, email applications, and security compliance, as well as the importance of vulnerability assessments for network security. Students will further determine the effects of the human risk factor on cybersecurity, current social engineering techniques, and how to mitigate risk with data security education and best practices.
Cryptography and Network Security
In this course, students will analyze the fundamental theories and principles of network security. They will also evaluate network security applications, including firewalls, cryptography, defense in depth, intrusion detection systems (IDS), and intrusion prevention systems (IPS). In addition, students will develop technical skills on network security tools and defensive countermeasures. Furthermore, students will practice acquired skills by completing lab exercises.
Intrusion Detection and Incident response
Will address the topic of Intrusion Detection Systems and Intrusion Protection Systems in networks (IDS and IPS) focusing in how to monitor networks for intrusions and the steps necessary to provide a well-structured and systemized approach. Also it will discuss some of the specific technologies use in current network environments like wireless IDS, finalizing with an analysis on how to present the investment on security to businesses.
Course Prerequisite: SEC 3000
Digital Forensics I
In this course, students will analyze the basic concepts, theories, and legal aspects of digital forensics. They will also assess digital evidence tools and computer forensic methodologies for different operating systems. Additionally, students will evaluate Windows, MAC, and Linux operating systems, including correct evidence handling, chain of custody, documentation, and presentation of evidence procedures to support an investigation. Furthermore, they will practice acquired skills by completing lab exercises.
Digital Forensics II
In this course, students will examine evidence acquisition tools and methods used in digital forensics investigations. In addition, students will evaluate digital forensic software and applications used in the collection and analysis of digital artifacts pertinent to a network. Moreover, they will analyze information collected from web browser and email data as it relates to forensic investigations. Furthermore, students will practice acquired skills by completing lab exercises.
In this course, students will analyze the practice of ethical hacking and penetration testing. They will also examine techniques, tools, and technology that detect vulnerabilities. Additionally, students will evaluate cybersecurity attacks and threats, focusing on the ways in which organizations and individuals mitigate risk. Furthermore, they will be able to practice the skills acquired by completing practical lab exercises.
High school diploma or a recognized equivalent.
- Program Disclosures
- Information Technology Degree Bachelors Program Disclosure
· Career Outcome
Possible Employment Opportunities *
- Developer of Security Design
- Information Assurance Specialist
- Computer Forensic Investigator
- Ethical Hacker
- Digital Security related jobs
High school diploma or a recognized equivalent.
Possible Employment Opportunities *
- Information Support Analyst
- Junior Ethical Hacker, or Network
- Security Support Analyst related jobs
*These examples are intended to serve only as a general guide of possible employment opportunities. There are many factors that determine the job an individual may obtain and Florida Technical College cannot guarantee its graduates any particular job. Some positions may require a license or other certifications. We encourage you to research the requirements for the particular position you desire. Program Availability varies by campus.
What’s the next step?
Learn More About Information Technology Networking, Web Design, and Programming Today!
Explore if pursuing an information technology degree is right for you. Click on the button below or call your nearest FTC campus today to speak with a knowledgeable Florida Technical College admissions representative about this bachelor’s program.