Remember that Walden’s Title IV Code is 025042.
In this concentration, you will:
Students may be eligible to transfer up to 135 credits. At least 45 credits must be completed at Walden.
Time to completion may vary by student, depending on individual progress and credits transferred, if applicable. For a personalized estimate of your time to completion, call an enrollment advisor at 1-866-492-5336.
*Click here for Required General Education Courses by Program.
Choose four courses from general education, B.S. in Information Technology, or other Walden bachelor’s degree programs. Your elective credits should total 20 to meet your program requirements. You may also be eligible to transfer previous credit to meet your elective requirements. Note on Minors: Electives can also be used to complete a 6-course minor. Although this program requires fewer than 6 elective courses, you have the option to complete a minor and graduate with more than the required number of credits for this program.
Imagine life without cell phones, television, or the Internet. Recent technological developments have significantly altered all aspects of human life: at work; in play; and in personal, family, and social interactions. In this course, students examine the advantages, disadvantages, and controversies of living and learning in an ever-changing technological environment. By exploring multiple perspectives, students discover how technology is changing media, culture, business, health, human behavior, and overall access to information. In a dynamic, reflective, and engaging classroom environment, students use a variety of audio, visual, literary, and artistic resources, to engage in open dialogue. Students are also introduced to the tools essential to success at Walden. Students complete the course with a personalized success plan that provides a customized roadmap and tools that they can use.
Information technology (IT) is essential to the function and success of nearly all businesses. Businesses whose systems are lacking or experience failure are at risk of significant loss; therefore, there will always be a need for IT support and innovation. This course introduces fundamental concepts of the IT infrastructure to prepare students for a role in the field of IT. Students learn about the structure and purpose of hardware components (computers, networks, and interface devices) and software components (operating systems, middleware, applications, and system software). They examine key issues of capacity, performance, reliability, scale, and obsolescence through the evaluation of IT’s role in supporting business and individuals. Students take a practical approach to understanding how IT infrastructure can relate to personal goals as they examine the various career options within the field. (Prerequisites: COMM 1001.)
More than ever, individuals, and businesses rely on Web surfing for variety of functions, including buying products, searching for jobs, sharing data, and entertainment. However, there are many threats involved if a network is not secure, which is why we value network administrators. This course provides students with the opportunity to gain the insight and skill of a network administrator. They examine concepts, components, and design of information and communication infrastructures. Students learn about the design of the Internet protocol stack, the structure and function of important Internet services and applications, and Internet governance. They engage in hands-on lab exercises involving configuration of settings, management of local user accounts, and the design of different types of networks. (Prerequisites: ITEC 1010.)
The cornerstone of modern software design is object-oriented programming (OOP), which is a methodology that uses objects to represent complex relationships and simplifies the development and management of information systems. This course provides students with current information on OPP and other prevailing techniques in programming. Students begin by studying foundational concepts and terminology of OPP. They examine programming paradigms, algorithmic thinking, and problem-solving techniques in Java. Students engage in coursework and share blogs on computer program design, constraints, variables, functions, procedures, logic and code control, error trapping, error handling, and interactive coding techniques. They gain hands-on, practical experience through lab work focusing on compiling and running applications, reading data interactively, and debugging. (Prerequisites: ITEC 1010 and MATH 1040.)
A data structure is a specialized layout for organizing and storing data. An integral part of the information technology arena, programmers work with many different types of data structures. Using fundamental programming knowledge, such as object-oriented programming (OOP), students continue their practice with OOP and have the opportunity to gain integral knowledge of advanced data structures, including lists, stacks, queues, and the functions of each. They also learn how to choose data structures that are appropriate for various types of information. They engage in blogs and discussions to work through ideas and gain various perspectives on topical issues, such as arrays, data collections, and recursion. Students gain hands-on experience as they solve complex word problems by writing a program and using tools to create, compile, debug, and run interactive programs. (Prerequisites: ITEC 1030.)
Did you ever wonder how many different valid passwords a computer system allows? Or perhaps you need to know how to encrypt a message so that only the intended recipient can decipher it. To answer such questions, programmers use discrete mathematics, which allows them to study sets and numbers, linear algebra, combinatorics, graphs, and probability. This course introduces students to discrete mathematics concepts and techniques used in information technology (IT). Students examine each concept in action and geared toward a specific application in IT. They engage in various application assignments focusing on elements of graph theory, coding, and probability. (Prerequisites: ITEC 1010 and MATH 1040.)
There are many important benefits from studying the different types operating systems, such as administering computers efficiently and structuring code more effectively, which lend to best practices in writing code. This course provides students with an overview of the concepts of computer operating systems, including the main functions, similarities, and differences. They explore a variety of topics, including configuration, file systems, security, administration, interfacing, multitasking, and performance analysis. Students contextualize their learning experience through hands-on activities, such as performing basic administrative tasks on Windows and Linux servers, including configuring networking parameters, administering user accounts and groups, setting access and application permissions, and locating and analyzing log files. (Prerequisites: ITEC 1010.)
There are many roles involved in creating and managing an organization’s information system, including the systems analyst. The analyst helps to ensure that the software development process is successful by understanding its purpose, scope, and resource requirements. This course provides students with the prospect of understanding the field from the perspective of a systems analyst. Students focus on the definition and examination of system requirements, both functional and nonfunctional, for an information system (IS) project. Through the review of videos, case, studies, and supplemental websites, they learn about the identification of stakeholders and techniques for requirement elicitation, representation, and life cycles. Students sharpen their communication and practical skills through group projects during which they apply concepts learned in the course to an actual information system. (Prerequisites: ITEC 1010.)
This course is an introduction to the approaches used to specify details during the design phase of a systems development life cycle (SDLC). Students explore the discipline of reducing requirements to the structural and functional design of organizational information technology solutions. They examine conceptual modeling, design patterns, and application frameworks. Students learn the basics of modeling, design representations, and the use of design tools. Through discussion with their peers, students confer and debate over the different approaches to systems design, security aspects of interfaces, and documentation. Students work toward gaining collaborative and critical-thinking skills through group projects focusing on the specifics of system design, including planning and implementation. (Prerequisites: ITEC 2040.)
All types of businesses rely on systems to manage their data and to keep that data secure, accurate, and reliable. A database is a system designed to do just this as well as to simplify the processes of data entry, search, and retrieval. In this course, students learn about database management through the examination of the life cycle of a database. Students focus on the representation and manipulation of information in relational database management systems. They learn how to map real-world concepts onto relational representations and how to manipulate them through relational queries to implement data-intensive applications. They also discuss related issues, such as database storage, data validation, sorting, grouping, and nesting data. Students learn to use a core subset of the Structured Query Language (SQL) as well as the fundamentals of database administration. (Prerequisites: ITEC 2050.)
This course is an overview of human perception and cognitive performance, computer processes, and system design approaches for successful human-computer interaction. Topic include human factors, usability evaluation, and principles of interface design. (Prerequisites: ITEC 2050 or CMIS 3004.)
Every day, we are learning to adapt to 21st-century technology. More importantly, we are beginning to rely on it for daily needs, such as obtaining the news, shopping, communicating, banking, and full-scale education. The need for developers of static and dynamic Web pages of all kinds is in demand. In this course, students consider the many factors of developing Web applications for a specific purpose or audience, such as optimization, accessibility, and appeal. They also examine the tools and techniques needed to develop and manage these applications. Through discussions and application assignments, students explore dynamic Web page implementations, elements of client-server and server-side processing, data validation, and concurrency issues. (Prerequisites: ITEC 2010 or CMIS 2002.)
Mobile computing was developed in the early 1990’s with the introduction of laptop computers. Since then, devices have become smaller, more intuitive and assessable, and have worked their way into businesses, homes, hospitals, and children’s backpacks. The basic principles of system design for such technologies are not entirely different from larger-scale development, but designers must make different considerations and use special techniques for mobile and pervasive technologies. In this course, students examine the technical, business, legal, and sociocultural benefits and challenges of mobile devices and wireless communication technologies. Through discussion and written assignments, students explore wireless protocols and business and consumer applications, such as portable computing, communication, and multimedia devices; telemetry and monitoring systems; and context-aware services. (Prerequisites: ITEC 2080.)
Insecure security systems can cause major risks and vulnerabilities for companies. Breaches in personal employee information, financial information, or company secrets can elicit the downfall of an organization. In this course, students learn the importance of such concerns as well as key concepts of computer and information security, including technical, privacy, organizational, social, and policy issues. They examine fundamental notions of authentication, authorization, and encryption. Students learn about economic and human impact issues through the analysis of case studies of security and privacy breaches. Through discussions, applications, and group projects, students also examine risk management, informal system security methods, and corporate governance. (Prerequisites: ITEC 2030.)
The process of creation, from conception through completion, is complicated and requires a diverse set of management skills. This course introduces students to the knowledge, tools, and techniques needed to successfully manage information technology (IT) projects throughout a project life cycle. Students in this course focus on the IT project management process and development of the project team as key to the successful achievement of IT projects. Students analyze the role of the project manager as an integral administrator overseeing the execution, progress, and interaction of all parties involved. Students learn the intricacies of managing projects and programs that may span multiple organizations. They engage in coursework through which they examine the project management cycle, sourcing strategy, third-party provider selection, and management of third-party providers. (Prerequisites: ITEC 2050.)
In this course, students learn about the role of a network administrator, the many considerations of operating a modern system, and the tools and technologies that are available to meet the requirements and demands of an organization’s network. They explore the structure of the Internet and examine protocols, routers, and client/server architecture related to configuring network services. Students also learn about software platforms, control, shared resources, and security from a practical perspective. Through a series of virtual lab assignments, students practice administrative tasks using applications as network tools, routing, securing ports, configuring network address translations, and confirming reconfigurations. (Prerequisites: ITEC 1020.)
Evaluation of software quality depends on statistics for many functions, such as assessing the number of bugs in different software routines and evaluating the efficiency of a program. This course provides students with an introduction to statistics in assessing the quality of software. Students synthesize theory with practical applications to learn the fundamentals of statistical reasoning, use of numeric and graphical descriptive statistics, parameter estimation and inferential methods, research design, and linear regression. Students also have the opportunity to practice using a statistical software package to solve statistics problems. (Prerequisites: ITEC 2020)
Students in this course examine the systems integration approaches used by today’s information technology organizations to learn what makes them more effective, efficient, and competitive. They explore the functions of enterprise application integration (EAI) practices, middleware models, commercial off-the-shelf (COTS) integration challenges, service-oriented architecture (SOA), and integration using cloud computing. Through a hands-on approach, students learn to solve an integration problem by designing an appropriate architecture. (Prerequisites: ITEC 2050 and ITEC 2080.)
The job of an information security specialist is to oversee enterprise operations that follow industry best practices for security and data integrity to ensure that systems are free from external threats and risks that may jeopardize or harm the organization. Students in this course investigate the responsibilities of the security specialist, including the security of operating systems and other system software, such as database management systems. Through a variety of assignments, including hands-on lab work, students explore components of a networked operating system, architectural designs for secure usage, system administration tasks, and tools for security. Students examine the real effects that security threats have on systems. They address such threats through exercises in administrative tasks using tools vital for implementing security policies on Linux and Windows systems. (Prerequisites: ITEC 3020.)
Technological innovation has led us to store all types of information on the Web, such as medical records, financial data, and personal communications. We rely on this information to be safe from external attacks. Preventing such threats is a vital role in the field of information technology. This course provides an overview of network security defense techniques and countermeasures. Students sharpen their communication and analytical skills through the discussion and debate of a variety of topics, such as cryptanalysis and attacks, safety of wireless connections, intrusion detection methods, and access control. They engage in assignments designed to provide them with practical applications of content, such as the design and configuration of firewalls, traffic analysis and filtering, intrusion detection, statistical anomaly detection, and wireless security. (Prerequisites: ITEC 2020 and ITEC 3020.)
In the past, security measures were merely supplemental to software design, but with the increasing threat of hackers who manipulate applications and steal or modify important data, countermeasures are vital to protect applications from vulnerability. This course provides students with an overview of best practices in developing secure software applications and the tools for investigating anomalies and vulnerabilities in application software. Students engage in a variety of course assignments focusing on related topics, including buffer overflow, structured query language (SQL) injections, selected programming and scripting languages, and the security of Web applications on both the client and server side. (Prerequisites: ITEC 2080 and ITEC 3020.)
As we adapt to the digital revolution, an increasing number of cases, both civil and high-profile, rely on data identification, recovery, and preservation of digital evidence. We also rely on computer forensics for the prevention and prosecution of criminal activity, such as child pornography, financial fraud, and personal identify theft. In this course, students learn procedures and tools for collecting and investigating evidence from illegal or inappropriate computer use. They also engage in a range of assignments and activities focusing on the legal, ethical, and policy implications of various forensic techniques and monitoring practices. (Prerequisites: ITEC 3101, ITEC 4101, and ITEC 4102.)
The synergistic bond between technology and culture has existed from the beginning of civilization with the invention of simple tools to stay warm and store goods, to more complex, contemporary inventions, such as computers. This relationship is vital to our existence, but also warrants both social and ethical consideration, monitoring, and regulation. In this course, students examine the relationship between information technologies and core social concerns, such as privacy, democracy, equity, security, economic progress, and intellectual property rights. Using relevant articles and classic literature in the field, students evaluate existing and emerging technologies taking into account the social, ethical, and legal considerations inherent in the design and use of these technologies. (Prerequisites: ITEC 1020.)
In this capstone course, students review the work they have collected in their portfolios and reflect on their educational experience. They revisit the career priorities they expressed upon entry into the program and consider their professional goals in the context of their education. They also develop plans for continued learning and career development in the context of their personal objectives and priorities.
In this capstone project course, students complete an integrative IT project that combines multiple aspects of their information technology program. The project requires collaboration with a team of students to manage, analyze, design, implement, and evaluate a computer-based information system. The system development process is initiated with a case study included within the course structure. Students will develop a project charter that will guide them through the discovery of functional and nonfunctional requirements, the creation of a system design based on those requirements, and the development and testing of a functional computer application. Students will develop a management presentation to describe the project design and justify the continuation of the project. The implementation of the final project will require students to draw on their technical concentration-based knowledge of information security and assurance, networking, database design, interface design, and website design.
Apply Now | Live Chat | Call Us
© 2014 Walden University