Information Technology with Emphasis in Cybersecurity


Program Description

The Bachelor Degree program in Information Technology with emphasis in Cybersecurity introduces students to a variety of topics, such as assessing the security vulnerability of computer and network systems, various computer and network safeguarding solutions, and managing the implementation and maintenance of security devices, systems, procedures and counter measures.  As a graduate of the program, students will be prepared for an entry-level career as an information support analyst, junior ethical hacker, or network and security support analyst related jobs.

Possible Employment Opportunities *

  • Computer and Information Systems Managers
  • Computer Systems Analysts
  • Information Security Analysts
  • Software Developers, Applications
  • Systems Software
  • Computer Network Architects

Credential Earned

  • Bachelor’s Degree in Information Technology with emphasis in Cyber Security

Related Certifications

  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+

Duration of the Program

36 Months
Quarter Credit hours : 183
Core Courses: 10.5 Credits
Concentration Courses: 112.5 Credits
General Education Courses: 54 Credits

Core Courses

Success Strategies

This course provides success strategies and support services to entry level students. The strategies and support services are threaded through three critical areas that enhance student success: academic skills, personal life management, and educational navigation.

Career Development Lecture

The course will provide the framework for the career decision making process. It stresses the connection between the student’s chosen academic field and career objective. Among techniques employed include resume writing, interview skill development and internet research.

Preparing for A+ Certification

This course helps the student learn, prepare, and practice for CompTIA A+ certification examinations by reviewing objectives and exam content. Lab included.

Computer Programming Design

This course is devoted to the process of design and evaluation of interactive systems, this part will combine teaching fundamental knowledge with teaching some applied skills that will help you in a variety of different careers – from software developer to usability engineer. A smaller part of the course will present a concise overview of human-computer interfaces. The goal of this part is to make you aware about a range of interfaces that can be a target of your design efforts right now and to prepare you to face the new generation of interfaces. The course also provides a brief overview of human information processing issues in the context of interactive system design and a small practical section on developing several kinds of interfaces with Java programming language.

Programming For Security (Python)

This course will cover from the basic concepts of programming with Python, to the use of advanced scripts with focus on Networking and Security for professionals. The student will learn about automating the information gathering of applications, network protocols, logs, etc.

Prerequisite: CIS 110

A+ Hardware

This course deals with A+ core hardware objective. The objectives include identification of basic terms, concepts and functions of system modules, and basic procedures for adding and removing field replaceable units. Also included is a review of portable system components, identification of system resources, and other detailed information concerning PC architecture, hardware and standards. Lab included.

A+ Software

This course provides the student with an in-depth explanation of the common computer configurations. In addition, the student will be introduced to diagnostic software and troubleshooting techniques. Lab included.

Routing and Switching

This course covers the components used to segment a LAN including bridges, switches, and routers. This will also include an understanding of the IPX/SPX, access control list, routing protocols, LAN and WAN design, switching and VLAN, PPP, ISDN, and Frame Relay. Lab included.

Networking Fundamentals

The goal of this course is to provide students with an introduction to wireless networking technologies and design. The student will receive training in wireless technology standards, governing bodies, hardware, security, troubleshooting, and site survey methodology. Lab Included.

Security Fundamentals

This course addresses system security issues in wireless systems, including satellite, terrestrial microwave, military tactical communications, public safety, cellular and wireless LAN networks. Security topics include confidentiality/privacy, integrity, availability, and control of fraudulent usage of networks. Issues addressed include jamming, interception and means to avoid them.

LAN Analysis and Design

This course studies the design and implementation of local area networks (LAN), including network topologies, hardware, software, and data communication modes.

Windows Professional

The course covers installing Windows XP and the most current Microsoft Windows client operating system; implementing and conducting administration of resources; implementing, managing and troubleshooting hardware devices and drivers, network protocols and security; monitoring and optimizing performance and reliability; and configuring and troubleshooting the desktop environment.

Windows Server

This course prepares the student to properly install, configure, and administrate a Windows server of a domain in an Active Directory environment. Lab included.

Prerequisite: PRG 2100

Windows Network Infrastructure

This course prepares the student to properly install, configure, monitor and troubleshoot the fundamental elements that allow for interoperability in a Windows-based LAN. Lab included.

Prerequisite: PRG 2110

Designing Security for a Windows Network Lecture / Lab

This course prepares the student to analyze business requirements for security and to design a security solution that meets these requirements. At completion, students should be able to provide network design services for enterprise level businesses.

Virtualization and Cloud Management

This course will help the student become proficient in architecting and managing complex virtualization technologies using virtual networks powerful tools on site or over the cloud integrating cloud management, and focusing in updated Microsoft technologies.

Prerequisite: PRG 2161

Linux Administration

This course will prepare the student to properly complete from the basic installation of a Linux operating system, passing through its regular operation with file system, network management, and system administration to the correct configuration of network security.

Information Assurance

This course will provide the student with an ample vision of the information assurance practice, policy, strategy and implementation. It will review the best practices for selecting the security officials, plan and execute risk management and mitigation as well as recovery plans and how this process vary according to different markets.

Prerequisite: PRG 2161

Network Hardening

This course will address the necessary steps to implement fully secured elements to the network design by applying hardening techniques including firewall, router, switch, perimeter and internal network configurations.

Prerequisite: SEC 3000

Cyber Laws and Compliance

This course will study the legal connotation in which the information is managed electronically, discussing privacy and information ethical usage, as well as the different laws that governs them; including regulatory organizations, and compliance, internal policies and user education.

Prerequisite: SEC 3000

Web Applications and Social Network Security

With this course the student will acquire instruction on the principles behind securing web based application, social media communications and e-commerce; identifying the special risk associated with Internet exposure and providing the tools to mitigate these risks effectively.

Prerequisite: SEC 3000

Cryptography and Network Security

Through this course the student will get familiar with cryptography, how it works and how it is used for network security. Also it will cover different cypher types and how they work internally, as well as hashing, symmetric and asymmetric algorithms, with their implementations in network security through PKI, IPSec etc.

Prerequisite: PRG 2161

Intrusion Detection and Incident response

Will address the topic of Intrusion Detection Systems and Intrusion Protection Systems in networks (IDS and IPS) focusing in how to monitor networks for intrusions and the steps necessary to provide a well-structured and systemized approach. Also it will discuss some of the specific technologies use in current network environments like wireless IDS, finalizing with an analysis on how to present the investment on security to businesses.

Prerequisite: SEC 3000

Digital Forensics I

The purpose of this course is to introduce the student into the proper procedures for collecting evidence with the intent to report a cybercrime, including advanced techniques in investigation and analysis that could generate legal evidence. The student will be able to identify evidence in computer related crimes and abuse cases as well to track the culprit. This course will focus on: investigation procedures and response and the investigation of file and operating systems, wireless networks and storage.

Prerequisite: SEC 3000

Digital Forensics II

This course complements the knowledge into the proper procedures for collecting evidence with the intent to report a cybercrime, including advanced techniques in investigation and analysis that could generate legal evidence. The student will be able to identify evidence in computer related crimes and abuse cases as well to track the culprit. This course will focus on: Investigating data, image files, network intrusions and cybercrime.

Prerequisite: SEC 4100

Ethical Hacking

This course provides the underlying principles and many of the techniques associated with the Cyber

Security practice known as penetration testing or ethical hacking. Students will learn about the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. The course will provide the fundamental information associated with each of the methods employed and vulnerabilities identified. In all cases, remedial techniques will be explored. Students will develop an excellent understanding of current cyber security issues and ways that user, administrator, and programmer errors can lead to exploitable vulnerabilities.

Prerequisite: SEC 3400

Related Programs

Campuses Available

Admission Requirements

High school diploma or a recognized equivalent.

Possible Employment Opportunities *

  • Information Support Analyst
  • Junior Ethical Hacker, or Network
  • Security Support Analyst related jobs

*These examples are intended to serve only as a general guide of possible employment opportunities. There are many factors that determine the job an individual may obtain and Florida Technical College cannot guarantee its graduates any particular job. Some positions may require a license or other certifications. We encourage you to research the requirements for the particular position you desire. Program Availability varies by campus.

I’m interested.
What’s the next step?

Learn More About Information Technology Networking, Web Design, and Programming Today!

Explore if pursuing an information technology degree is right for you. Click on the button below or call your nearest FTC campus today to speak with a knowledgeable Florida Technical College admissions representative about this bachelor’s program.