Applied Cybersecurity and Information Technology

Applied Cybersecurity and Information Technology (B.S.)

View all Illinois Tech Cybersecurity Programs

 

Gain a comprehensive understanding of cybersecurity and information technology through the cross-disciplinary Bachelor of Science in Applied Cybersecurity and Information Technology. Learn how cybersecurity, technology, management, compliance, and legal issues intersect through this well-rounded program. Experienced information technology professionals and those new to the field can prepare to become cybersecurity and information technology practitioners, investigators, managers, and leaders in one of the fastest growing job sectors. Additional mathematical skills prepare for research and entry into the Master of Science in Applied Cybersecurity and Digital Forensics program.

Study information security, information assurance, ethical hacking, vulnerability analysis and control, securing databases, steganography, mobile device forensics, operating system security, business continuity response, disaster recovery, legal and ethical issues, auditing, evidence, and intrusion detection. Work with forensic tools and techniques used to investigate and analyze network-related incidents and preserve digital evidence.

Program Overview

The cross-disciplinary Bachelor of Science in Applied Cybersecurity and Information Technology program places an emphasis on cybersecurity, technology, management, compliance, and legal issues. Develop the mathematical skills needed to prepare for research and entry into the Master of Science in Applied Cybersecurity and Digital Forensics program.

Career Opportunities

Graduates of the Bachelor of Science in Applied Cybersecurity and Information Technology will be prepared to fill a variety of roles within the industry, such as:

  • Information security officer
  • Security manager
  • Security administrator
  • Cybersecurity analyst
  • Cybersecurity specialist
  • Vulnerability researcher/exploit developer
Disclaimer for prospective students, please read.
The information provided is sourced from a third party, Lightcast, and is provided here for informational and educational purposes only. Please be advised that the inclusion of the Lightcast resource on this website does not imply endorsement by Illinois Institute of Technology (Illinois Tech), nor is it a guarantee of the accuracy of this information. Illinois Tech makes no representation, warranty or guarantee, express or implied, that the information presented herein is reflective of the outcomes you can expect if you enroll in or graduate from an Illinois Tech program. Illinois Tech expressly disclaims any liability regarding Lightcast, or in connection with any actual or potential employment opportunity stemming from information on this site and you hereby irrevocably waive any claim(s) against the Illinois Tech for the same. Your use of this web page is an acknowledgement of your understanding and acceptance of the terms and conditions set forth herein. You are encouraged to conduct your own thorough research into job opportunities and outcomes in your field of study.

Students of this program must be admitted to Illinois Tech. Previous coursework or experience in technology is helpful but not required.

Information Security Analyst Career Snapshot

Littlefield 1280x850

Cyber Scholarship Program

Mark Littlefield earned an award from the United States Department of Defense (DoD) Cyber Scholarship Program. Littlefield was eligible to apply for the scholarship because Illinois Tech has been designated as a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency (NSA) and the U.S. Department of Homeland Security.

Learn More

North American Defense and Security Academic Alliance (NADSAA)

The North American Aerospace Defense Command (NORAD) and US Northern Command (USNORTHCOM) North American Defense and Security Academic Alliance (NADSAA) exists as a collaborative information-based enterprise dedicated to strengthening and normalizing relationships between the two commands and academic institutions. This relationship stimulates and develops new thinking, examines cross-organizational solutions, and helps cultivate future generations of Defense and Security practitioners.

Internship Opportunities

The NORAD and USNORTHCOM Volunteer Student Internship Program (N&NC VSIP) is part of a larger effort by NORAD and USNORTHCOM to help cultivate future generations of Defense and Security practitioners. N&NC VSIP internships provide exposure to NORAD and USNORTHCOM missions and responsibilities, while working alongside current military and civilian professionals dedicated to the defense of North America.   

Gain valuable hands-on experience related to their education endeavors while working in a joint, interagency and international environment at NORAD and USNORTHCOM with a N&NC VSIP internship. Potentially earn academic credit for work performed, and some may qualify to receive a Department of Defense SECRET clearance.

NAD&S logo
USSTRATCOM logo

National Center of Academic Excellence in Cyber Defense Education

The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education.

nsa-logo-copy
DHS_Seal

Featured Faculty

Maurice Dawson
Assistant Professor Director, Center for Cyber Security and Forensics Education
Yong Zheng
Assistant Professor

Program Objectives and Outcomes

Bachelor of Science in Applied Cybersecurity and Information Technology Program Educational Objectives

The Bachelor of Science in Applied Cybersecurity and Information Technology degree produces graduates who are able to:

  • Problem solve, create, and effectively communicate innovative answers to provide technology solutions for the problems of business, industry, government, non-profit organizations, and individuals
  • Perform requirements analysis, design and administration of computer and network-based systems conforming to policy and best practices, and monitor and support continuing development of relevant policy and best practices as appropriate
  • Design and implement an enterprise security program using both policy and technology to implement technical, operational, and managerial controls, which will technically secure enterprise information assets and resources to deter, detect, and prevent the success of attacks and intrusions
  • Investigate information security incidents and violation of law using computer resources in a manner such that all evidence is admissible in a court of law
  • Apply current technical and mathematical concepts and practices in the core information technologies and recognize the need to engage in continuing professional development
Bachelor of Science in Applied Cybersecurity and Information Technology Student Outcomes

Bachelor of Science in Applied Cybersecurity and Information Technology graduates should be able to:

  1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions
  2. Design, implement, and evaluate a computer-based solution to meet a given set of computing requirements in the context of the program’s discipline
  3. Communicate effectively in a variety of professional contexts
  4. Recognize professional responsibility and make informed judgments in computing practice based on legal and ethical principles
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline
  6. Identify and analyze user needs and take them into account in the selection, creation, evaluation and administration of computing-based systems
  7. Assist in the creation of an effective project plan
  8. Apply security principles and practices to maintain operations in the presence of risks and threats

The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology as a National Center of Academic Excellence in Cyber Defense Education.