Information Technology - Information Systems Degree
Program Code: A25590
| First Year | ||
|---|---|---|
| Fall | Hours | |
| Session 1 | ||
| CIS-110 | Introduction to Computers | 3 |
| NOS-110 | Operating Systems Concepts | 3 |
| CTI-120 | Network and Security Foundations (16 Weeks ) | 3 |
| Session 2 | ||
| CTI-110 | Information Technology Foundations | 3 |
| CTI-120 (16 Weeks Continued) | ||
| CTS-115 | Information Systems Business Concepts | 3 |
| ENG-111 | Writing and Inquiry | 3 |
| Hours | 18 | |
| Spring | ||
| Session 1 | ||
| NET-125 | Introduction to Networks | 3 |
| NOS-130 | Windows Single User | 3 |
| SEC-110 | Security Concepts | 3 |
| Session 2 | ||
| NOS-120 | Linux Single User | 3 |
| ENG-112 or COM-231 |
Writing and Research in the Disciplines or Public Speaking |
3 |
| Hours | 15 | |
| Summer | ||
| NET-126 | Switching and Routing | 3 |
| CTS-120 | Hardware/Software Support | 3 |
| HUM-115 | Critical Thinking | 3 |
| Hours | 9 | |
| Second Year | ||
| Fall | ||
| Session 1 | ||
| NET-225 | Enterprise Networking | 3 |
| NOS-220 | Linux Administration I | 3 |
| Session 2 | ||
| NOS-230 | Windows Administration I | 3 |
| Math Elective 1 | 3-4 | |
| Hours | 12-13 | |
| Spring | ||
| Session 1 | ||
| NET-270 | Building Scalable Networks | 4 |
| NET-289 | Networking Capstone Project | 3 |
| CTI-141 | Cloud and Storage Concepts | 3 |
| Session 2 | ||
| NOS-231 | Windows Administration II | 3 |
| Social/Behavioral Science Elective 1 | 3 | |
| Hours | 16 | |
| Total Hours | 70-71 | |
| Code | Title | Hours |
|---|---|---|
| General Ed Courses | ||
| Science/Mathematics | ||
| MAT-110 | Mathematical Measurement and Literacy | 3 |
| MAT-121 | Algebra/Trigonometry I | 3 |
| MAT-143 | Quantitative Literacy | 3 |
| MAT-152 | Statistical Methods I | 4 |
| MAT-171 | Precalculus Algebra | 4 |
| English/Communications | ||
| ENG-111 | Writing and Inquiry | 3 |
| ENG-112 | Writing and Research in the Disciplines | 3 |
| ENG-114 | Professional Research & Reporting | 3 |
| ENG-116 | Technical Report Writing | 3 |
| COM-231 | Public Speaking | 3 |
| Social/Behavioral Science | ||
| PSY-150 | General Psychology | 3 |
| PSY-118 | Interpersonal Psychology | 3 |
| SOC-210 | Introduction to Sociology | 3 |
| ECO-151 | Survey of Economics | 3 |
| ECO-251 | Principles of Microeconomics | 3 |
| ECO-252 | Principles of Macroeconomics | 3 |
| POL-120 | American Government | 3 |
The following occupational information is provided by www.nccareers.org and is subject to change. The occupations list is not an exhaustive list and may include careers that require higher levels of education than those provided at NCCCS colleges.
-
Information Systems Security Officer (ISSO)
-
Security Analyst
-
Cyber Security Specialist
-
Information Security Specialist
-
Information Technology Security Analyst (IT Security Analyst)
-
Security Specialist
-
Data Security Analyst
-
Cloud Security Engineer
-
Cybersecurity Engineer
-
Cybersecurity Specialist
-
IT Auditor (Information Technology Auditor)
-
Security Consultant
-
Computer Security Specialist
-
Computer Systems Security Analyst
-
Network Security Analyst
-
Information Systems Security Analyst
-
Information Technology Analyst (IT Analyst)
-
Information Security Officer
-
Systems Analyst
-
Cyber Defense Analyst
-
Internet Security Specialist
-
AI Security Specialist (Artificial Intelligence Security Specialist)
-
All-Source Analyst
-
Application Security Analyst
-
Applications Security Analyst
-
Blue Team Member
-
Cloud Security Architect
-
Counterespionage Analyst
-
Cyber Defense Forensics Analyst
-
Cyber Intel Planner
-
Cyber Intelligence Specialist
-
Cyber Operations Planner (Cyber Ops Planner)
-
Cyber Operations Specialist
-
Cyber Operator
-
Cyber Policy and Strategy Planner
-
Cybersecurity All-Source Analyst
-
Cybersecurity Analyst
-
Cybersecurity Exploitation Analyst
-
Cybersecurity Multi-Disciplined Language Analyst
-
Cybersecurity Partner Integration Planner
-
Cybersecurity Target Developer
-
Cybersecurity Target Network Analyst
-
Cybersecurity Threat Analyst
-
Cybersecurity Warning Analyst
-
Exploitation Analyst
-
Incident Responder
-
Industrial Internet of Things Security Specialist (IIoT Security Specialist)
-
Information Technology Security Architect (IT Security Architect)
-
Internet of Things Security Specialist (IoT Security Specialist)
