Follow Christ, Lead the Way

OCU’s Data Analytics major prepares students for a career in data analytics within the information technology area. Through this major, students define challenges in providing useful data acquired from multiple sources and resolving cross-organizational problems through analytics.


On completion of the major, students should be able to:
  • Identify the various analyses available from different data sets.
  • Communicate various aspects of analysis to IT and non-IT stakeholders.
  • Evaluate ethical issues in data analysis.
  • Integrate Christian principles in critical thinking and decision-making.
  • Apply management principles to work with people and processes within an organization.
Technology Requirements: 
Students in technology majors must have access to computer hardware and that meets minimum recommendations for running MySQL Workbench and TestOut.
This degree program is available in the following formats:

Explore the full enrichment of the traditional collegiate experience and make new friends on our lively campus in Circleville Ohio. Serves 17-24 year-old undergraduate students.

100% Online courses in a 5-week as-you-go flexible format for busy adults featuring forum discussions and weekly assignment deadlines. Serves both undergraduate and graduate students.

MAJOR69 Hours

  • The double-entry system of bookkeeping and the basic accounting cycle, including communicating financial information according to generally accepted accounting principles.
    Prerequisite: MAT1250 or higher
  • Introduction to economic analysis at the aggregate level, including the impact of both domestic and international policies on key economic indicators and on overall macroeconomic performance. Recommended: College-level economics course
  • Principles and practices of law, and their impact on business situations, emphasizing the dynamic interaction between the individual, organization, and society, in the context of Christian ethics and proper business conduct.
  • Computer hardware, software, and operating systems, including operating system configuration and maintenance, client systems, managing applications, networking concepts, and skills for a career in network support or administration. IST2001 Operating Systems Technician 3 Focuses on operating systems, including the installation, configuration, and maintenance of devices, PCs, and software for end users; understanding the basics of networking and security/forensics from the operating system view; properly and safely diagnose, resolve, and document common software issues; applying troubleshooting skills and providing appropriate customer support.
  • Application of skills and knowledge required for a career in network support or administration.
    Prerequisite: IST2000 IST2011 Hardware Systems Technician 3 Supplying foundational knowledge to install, configure, and support hardware systems, including the assembling of components based on customer requirements; installing, configuring, and maintaining devices, PCs, and servers; Understanding the fundamentals of networking and security/forensics; student will be introduced to wireless networks, mobile devices, and custom builds for end use deployment. Prerequisite: IST2001
  • The security threat environment for information systems with emphasis on the application of security tools to reduce threat exposure, prevention and detection technologies, planning, and development of policies that protect an organization from security risks.
    Prerequisite: IST2010 IST2101 Certified Security Principles 3 Understanding security across the entire environment of risk management, identity and access control, network and data security and how this applies in in new technologies such as loT and cloud services. Students will have access to the cyber range. Prerequisites: IST2051
  • The Windows operating system, including practical skills in installing, configuring, and maintaining this operating system, and an introduction to other popular operating systems, including OS X, iOS, Android, and Linux.
  • Relational databases, including basic relational database design and maintenance, design concepts such as records, tables, data types and table normalization, reading database data through queries using query functions and linked tables, an introduction to the SQL query language, popular relational database software, alternate database technologies, and interaction with these concepts using a relational database software program.
  • An introductory course in computer programming using the JAVA programming language, including the fundamentals of computer programming, program design, data types, program flow constructs, efficient program design, and techniques for processing data programmatically such as data arrays and data algorithms.
  • Fundamental concepts and technologies for business information systems, including data capture, processing, and communication, introduction to the integration of Microsoft Excel and Microsoft Access in business information systems, and basic data analytics.
  • This course will address how the increased complexity of business data and the timeliness and coordination of this data across a company is managed. Topics include data mining, business intelligence, mobile technology, computer networks, cybersecurity, semantic technology and search engines. IST3051 Cyber Security Analyst 3 Instructs students on how to prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.
  • Techniques and tools for analyzing large data sets. IST3101 Penetration Testing Engineer 3 Students imagine all the ways a hacker can penetrate a data system. This course explores technical and non-technical ways of breaching security to gain access to a system. The course is built on proven hands-on methods utilized by an international group of vulnerability consultants. Students will learn the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting. Students will acquire the skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs to reduce business risk. Students will have access to the cyber range.
  • Information systems security, including security for networks, applications, data, and host computers, compliance, operation security, access control, identity management, threats and vulnerabilities, and cryptography.
    Prerequisites: IST2000, IST2010
  • Hands-on interaction with the MySQL database, including skills required to install, configure, secure and maintain an enterprise database system, designing and creating a simple database, and interacting with the database through applications and programming languages.
    Prerequisite: IST2400
  • Programing for the World Wide Web, including web page definition, scripting languages (HTML, Javascript), complex web pages, use of scripting to enhance web pages, mobile friendly web pages, automated web page creation tools, and the appropriate use of these tools.
    Prerequisite: IST2500
  • Principles and solutions for managing IT projects through all phases, including initiation, planning, executing, monitoring, and controlling, and closing. IST4011 Disaster Recovery Engineer 3 Students simulate how an organization should react when hit by a natural disaster, cybercrime, or any other disruptive tragedy. Students will answer dilemmas like what to do if the network infrastructure is taken down, can the business continue operations, or how much will it cost if the business is down during repairs. Students will learn how to prepare processes, policies, and procedures to follow in the event of a disruption by creating a disaster recovery and business continuity plan. Students will analyze the latest methodologies and best practices. Student will have access to the cyber range.
  • Application of data management principles from Data Analytics I to solving business problems.
    Prerequisite: IST3100
  • Application of the System Development Life Cycle (SDLC) framework to plan, analyze, design, implement, and maintain information technology systems, including methods and models for developing and documenting the requirements for an information system, processes and procedures to design, procure, implement, and maintain systems, and an introduction to industry standard methods and tools that support the SDLC process such as UML, Use Case analysis, Rapid Application Development and CASE.
  • This course examines managing the ethical and legal issues that arise in the use of the Internet. Emphasis is given to areas of privacy, intellectual property, freedom of expression, and e-commerce.
  • Decisions and activities required to implement an information system project, emphasizing strategic decisions based on technical, business, political and legal factors, vendor selection, relationship management, and human factors such as change management, education and training.
  • Practical experience using the SQL language to write various queries to extract meaningful data from a relational database.
  • Integration of student learning from the Data Analytics major courses requiring the application of learned skills in analyzing data, making predictions, and identifying, evaluating, and capturing business analytic opportunities that create value.
    Prerequisite: Completion of major courses
  • Statistics is the method of conducting a study about a topic by collecting, organizing, interpreting, and presenting data. This course prepares the student to perform statistical analysis of data sets. Topics include descriptive statistics, probability, sampling distributions, interval estimation, hypothesis testing and regression.

*Students may count this course as a Mathematics elective in the General Education Core.

Request Information


We value your privacy