OCU’s Information Technology major prepares students for a career in the information technology field. The program integrates information technology with business and equips students to plan, implement, and support information systems.
Objectives:
Upon completion of this major, the student should be able to:
Students in technology majors must have access to computer hardware and that meets minimum recommendations for running MySQL Workbench and TestOut.
MAJOR69 Hours
-
The double-entry system of bookkeeping and the basic accounting cycle, including communicating financial information according to generally accepted accounting principles.Prerequisite: MAT1250 or higher
-
Introduction to economic analysis at the aggregate level, including the impact of both domestic and international policies on key economic indicators and on overall macroeconomic performance. Recommended: College-level economics course
-
Principles and practices of law, and their impact on business situations, emphasizing the dynamic interaction between the individual, organization, and society, in the context of Christian ethics and proper business conduct.
-
Computer hardware, software, and operating systems, including operating system configuration and maintenance, client systems, managing applications, networking concepts, and skills for a career in network support or administration. IST2001 Operating Systems Technician 3 Focuses on operating systems, including the installation, configuration, and maintenance of devices, PCs, and software for end users; understanding the basics of networking and security/forensics from the operating system view; properly and safely diagnose, resolve, and document common software issues; applying troubleshooting skills and providing appropriate customer support.
-
Application of skills and knowledge required for a career in network support or administration.Prerequisite: IST2000 IST2011 Hardware Systems Technician 3 Supplying foundational knowledge to install, configure, and support hardware systems, including the assembling of components based on customer requirements; installing, configuring, and maintaining devices, PCs, and servers; Understanding the fundamentals of networking and security/forensics; student will be introduced to wireless networks, mobile devices, and custom builds for end use deployment. Prerequisite: IST2001
-
The security threat environment for information systems with emphasis on the application of security tools to reduce threat exposure, prevention and detection technologies, planning, and development of policies that protect an organization from security risks.Prerequisite: IST2010 IST2101 Certified Security Principles 3 Understanding security across the entire environment of risk management, identity and access control, network and data security and how this applies in in new technologies such as loT and cloud services. Students will have access to the cyber range. Prerequisites: IST2051
-
The Windows operating system, including practical skills in installing, configuring, and maintaining this operating system, and an introduction to other popular operating systems, including OS X, iOS, Android, and Linux.
-
Relational databases, including basic relational database design and maintenance, design concepts such as records, tables, data types and table normalization, reading database data through queries using query functions and linked tables, an introduction to the SQL query language, popular relational database software, alternate database technologies, and interaction with these concepts using a relational database software program.
-
An introductory course in computer programming using the JAVA programming language, including the fundamentals of computer programming, program design, data types, program flow constructs, efficient program design, and techniques for processing data programmatically such as data arrays and data algorithms.
-
Fundamental concepts and technologies for business information systems, including data capture, processing, and communication, introduction to the integration of Microsoft Excel and Microsoft Access in business information systems, and basic data analytics.
-
This course will address how the increased complexity of business data and the timeliness and coordination of this data across a company is managed. Topics include data mining, business intelligence, mobile technology, computer networks, cybersecurity, semantic technology and search engines. IST3051 Cyber Security Analyst 3 Instructs students on how to prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.
-
Information systems security, including security for networks, applications, data, and host computers, compliance, operation security, access control, identity management, threats and vulnerabilities, and cryptography.Prerequisites: IST2000, IST2010
-
A survey of current topics in operating systems such as processors, memory, storage technology, virtualization, the virtual desktop, cloud computing, and targeted application of operating systems such as server, tablet, and mobile computing.Prerequisite: IST2300
-
Hands-on interaction with the MySQL database, including skills required to install, configure, secure and maintain an enterprise database system, designing and creating a simple database, and interacting with the database through applications and programming languages.Prerequisite: IST2400
-
Programing for the World Wide Web, including web page definition, scripting languages (HTML, Javascript), complex web pages, use of scripting to enhance web pages, mobile friendly web pages, automated web page creation tools, and the appropriate use of these tools.Prerequisite: IST2500
-
Principles and solutions for managing IT projects through all phases, including initiation, planning, executing, monitoring, and controlling, and closing. IST4011 Disaster Recovery Engineer 3 Students simulate how an organization should react when hit by a natural disaster, cybercrime, or any other disruptive tragedy. Students will answer dilemmas like what to do if the network infrastructure is taken down, can the business continue operations, or how much will it cost if the business is down during repairs. Students will learn how to prepare processes, policies, and procedures to follow in the event of a disruption by creating a disaster recovery and business continuity plan. Students will analyze the latest methodologies and best practices. Student will have access to the cyber range.
-
Application of the System Development Life Cycle (SDLC) framework to plan, analyze, design, implement, and maintain information technology systems, including methods and models for developing and documenting the requirements for an information system, processes and procedures to design, procure, implement, and maintain systems, and an introduction to industry standard methods and tools that support the SDLC process such as UML, Use Case analysis, Rapid Application Development and CASE.
-
This course examines managing the ethical and legal issues that arise in the use of the Internet. Emphasis is given to areas of privacy, intellectual property, freedom of expression, and e-commerce.
-
Decisions and activities required to implement an information system project, emphasizing strategic decisions based on technical, business, political and legal factors, vendor selection, relationship management, and human factors such as change management, education and training.
-
Concepts and skills for designing, installing, and maintaining a computer network with application to Microsoft Windows network.
-
This course provides the student an opportunity to investigate an area of Information Technology that is of special interest through research or experience.
-
This course integrates student learning from the Information Technology major courses requiring the synthesis of learned skills in IT systems, databases, networks, and security.Prerequisite: Completion of major courses
-
Statistics is the method of conducting a study about a topic by collecting, organizing, interpreting, and presenting data. This course prepares the student to perform statistical analysis of data sets. Topics include descriptive statistics, probability, sampling distributions, interval estimation, hypothesis testing and regression.
*Students may count this course as a Mathematics elective in the General Education Core.
Graduation Requirements:
In addition to the courses listed on this page, graduates must meet the requirements listed here, including:
- A General Education Core
- Associate degrees – 36 credit hours
- Bachelor’s degrees – 45 credit hours
- Minimum credit hours
- Associate degrees – 60 credit hours
- Bachelor’s degrees – 120 credit hours
-
Notes:
- Some majors require more credit hours than the listed minimums.
- Students choose elective courses to complete credit hour requirements.
- Electives may apply toward a minor, certificate, associate degree, or second major.
- Sometimes a course required in a student’s major can also fulfill a requirement in the GenEd core. (See notes on the individual major pages.)
Find complete information in the OCU Academic Catalog.
Contact the University Registrar's Office if you have graduation questions: 1 (740) 477-7780 or registrar@ohiochristian.edu