Follow Christ, Lead the Way

OCU’s Information Technology major prepares students for a career in information technology, by developing an understanding of the elements of information systems and the integration of information technology with business.

Objectives:

On completion of this major, a student should be able to:
  •  
    Identify technical concepts and practices in information technology.
  •  
    Examine the use of project planning in working with information technology.
  •  
    Apply appropriate use of information technology.
  •  
    Integrate Christian principles in critical thinking and decision-making.
Technology Requirements: 
Students in technology majors must have access to computer hardware and that meets minimum recommendations for running MySQL Workbench and TestOut.
This degree program is available in the following formats:

Explore the full enrichment of the traditional collegiate experience and make new friends on our lively campus in Circleville Ohio.

100% Online courses in a 5-week as-you-go flexible format for busy adults featuring forum discussions and weekly assignment deadlines.

MAJOR27 Hours

  •  
    Computer hardware, software, and operating systems, including operating system configuration and maintenance, client systems, managing applications, networking concepts, and skills for a career in network support or administration. IST2001 Operating Systems Technician 3 Focuses on operating systems, including the installation, configuration, and maintenance of devices, PCs, and software for end users; understanding the basics of networking and security/forensics from the operating system view; properly and safely diagnose, resolve, and document common software issues; applying troubleshooting skills and providing appropriate customer support.
     
  •  
    Application of skills and knowledge required for a career in network support or administration.
    Prerequisite: IST2000 IST2011 Hardware Systems Technician 3 Supplying foundational knowledge to install, configure, and support hardware systems, including the assembling of components based on customer requirements; installing, configuring, and maintaining devices, PCs, and servers; Understanding the fundamentals of networking and security/forensics; student will be introduced to wireless networks, mobile devices, and custom builds for end use deployment. Prerequisite: IST2001
  •  
    A study of computer networks, including the building blocks of the general network architecture, wired and wireless networking technologies, framework, design and configuration of a TCP/IP network, and application of networking concepts in a typical network of Windows computers.
    Prerequisite: IST2010 IST2051 Network Principles 3 A study of concepts and skills to plan, install, maintain, and troubleshoot today’s networks including wireless and server-based networks; new technologies such as virtual and SD networks found in many cloud architectures will be explored as well as physical components such as TCP/IP Stack, OSI Model, switches, routers, wireless, and Bluetooth; a study of performing day to day operations within an organization to secure and maintain an entire organization. Prerequisite: IST2011
  •  
    The security threat environment for information systems with emphasis on the application of security tools to reduce threat exposure, prevention and detection technologies, planning, and development of policies that protect an organization from security risks.
    Prerequisite: IST2010 IST2101 Certified Security Principles 3 Understanding security across the entire environment of risk management, identity and access control, network and data security and how this applies in in new technologies such as loT and cloud services. Students will have access to the cyber range. Prerequisites: IST2051
  •  
    The Windows operating system, including practical skills in installing, configuring, and maintaining this operating system, and an introduction to other popular operating systems, including OS X, iOS, Android, and Linux.
     
  •  
    Relational databases, including basic relational database design and maintenance, design concepts such as records, tables, data types and table normalization, reading database data through queries using query functions and linked tables, an introduction to the SQL query language, popular relational database software, alternate database technologies, and interaction with these concepts using a relational database software program.
     
  •  
    An introductory course in computer programming using the JAVA programming language, including the fundamentals of computer programming, program design, data types, program flow constructs, efficient program design, and techniques for processing data programmatically such as data arrays and data algorithms.
     
  •  
    Integration of student learning from the Information Technology major courses requiring the synthesis of learned skills in IT computer, networks, systems, databases, and programming.
    Prerequisite: Completion of major courses IST2801 Information Systems Certification and Accreditation Professional 3 Process of certifying, reviewing, and accrediting an information system is diagnosed; student provided with standards to measure the skills required of specific organizational members to certify, review and accredit the IS security in accordance with DIACAP Instruction 8510.01. Prerequisite: Completion of major courses IST2901 Digital Forensics Examiner 3 Designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting investigations. Students will examine the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. Through the use of a risk-based approach, students will be able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Students will have access to the cyber range.
  •  
    Rational expressions, systems of linear equations and inequalities, radicals and exponents, quadric functions, conic sections, and exponential functions. Students must have foundational knowledge of linear equations and polynomials.
    Prerequisite: MAT0960 or ACT math score of 19 or higher

*Students may count this course as a Mathematics elective in the General Education Core.