Bachelor of Science (BS)

Information Technology

General Undergraduate Admission Requirements

Note: Not all Online Program offerings are available to residents of all U.S. states.  Please contact an admissions representative for further information.

To be admitted to any of the undergraduate programs at South University, the prospective student must provide proof of high school graduation as recognized by the state of residence on the date the degree was earned, or the equivalent (e.g. GED with no single test score below 145 or numeric score equivalent to 2.0 on old version or state-issued certificate designated as the equivalent of a High School Diploma) with a minimum CGPA of 2.0 on a 4.0 scale within 5 weeks of the start date (refer to Conditional Acceptance). The prospective student must also complete the university administered placement tests prior to the start of the first quarter for campus students and during the first session of attendance for online students. South University accepts the International Baccalaureate Program diploma as meeting the requirement for high school graduation. Credentials earned outside the United States must be evaluated by a NACES or AICE-member credential evaluation service.  Please speak with an admissions representative for more information.

Students with less than the minimum CGPA of 2.0 on a 4.0 scale may meet admissions requirements by submitting a minimum combined SAT (Evidence-Based Reading and Writing, and Math) score of 700 or 900 on the old SAT, a combined ACT score of 18, or meet the criteria established for acceptance as a transfer student.

Students with less than the minimum CGPA of 2.0 on a 4.0 scale may be admitted provisionally for two quarters. Failure to achieve a 1.5 CGPA in the first two quarters of attendance will result in dismissal.  Students may appeal the dismissal by following the Procedures for Appealing Academic/Financial Aid Dismissal Policy.

Acceptable verification of high school graduation or the equivalent would include a copy of the high school diploma, high school transcript (official or unofficial), GED certificate, or GED scores and state-authorized examination scores (ex. HiSET, TASC) or a state- issued certificate designated as the equivalent of a high school diploma. In states that maintain a database that serves as an official registry of high school and GED graduates, an excerpt from the official database documenting the student's graduation or GED completion may be used.

Campuses in South Carolina must be provided with official high school transcripts or GED scores or state-issued certificates designated as the equivalent of a high school diploma.

Please see the policy on GPA Calculation for Admission for additional information

Conditional Acceptance

Students may be conditionally accepted by submitting unofficial copies of documentation required for the admission requirements. Conditional acceptance is allowed for 5 weeks beyond the start of the student’s first session. Failure to provide acceptable, official documentation, as stated in the admissions requirements, within 5 weeks from the start date will result in the following:

  • Removal from class
  • Cancelation of enrollment
  • No final course grades
  • No transcript

Students who do not provide acceptable documents for full, unconditional acceptance within the 5 week period will not be responsible for tuition and related fees. South University may grant exceptions to the 5 week period for unusual situations or circumstances. All exceptions must be submitted to the Office of the University Registrar for approval.

Admission of Transfer Students

Note: Not all Online Program offerings are available to residents of all U.S. states.  Please contact an admissions representative for further information.

To be eligible for admission, transfer students must complete the application procedures and satisfy the following criteria:

  1. Submit a completed application for admission.
  2. Have earned 24 or more credit hours, or the equivalent (e.g. 16 semester hours), with a cumulative GPA of 2.00 from an acceptable accredited collegiate institution.
  3. Submit official transcripts (including verifiable faxed transcripts) from all colleges and universities attended.
  4. Submit self-certification of high school graduation or GED completion.

For transfer of credit practices refer to the applicable section under the Academic Affairs section of this catalog.

To be admitted as a Transfer student into South University the prospective student must have earned 24 or more quarter credit hours or the equivalent (e.g. 16 semester hours), with a cumulative GPA of 2.00 from an acceptable accredited collegiate institution. Official transcripts from the collegiate institution(s) must be received within 5 weeks of the start date (refer to Conditional Acceptance), and who are not required to take ENG0099 and/or MAT0099, will be exempt from taking the UVC1000 Strategies for Success. Students will select another 4 credit course in consultation with their Academic Advisor or Academic Counselor to fulfill the degree requirements.

Students with 24 or more quarter credits with less than a 2.0 GPA may be admitted provisionally for two quarters.  Failure to achieve a 1.5 GPA in the first two quarters of attendance will result in dismissal.  Students may appeal the dismissal by following the Procedures for Appealing Academic/Financial Aid Dismissal Policy.

Students who are citizens of countries other than the United States should refer to the section entitled International Student Admissions Policy.

Students who are transferring from or to a school within the University of North Carolina or the North Carolina Community College System should be aware of the Comprehensive Articulation Agreement approved by both governing Boards on March 1, 1996 and revised in September of 2008. This agreement may be found in its entirety at the following website.

For additional admissions information please see the admissions section here

Offered at Austin, Columbia, Montgomery, Online Programs, Richmond, Savannah, Tampa, and Virginia Beach.

Note: Not all Online Program offerings are available to residents of all U.S. states. Please contact an admissions representative for further information.

The Bachelor of Science in Information Technology degree program focuses on preparing students with the knowledge and skills needed to understand the theoretical and applied uses of information technology in a variety of business settings. Case studies and hands-on lab projects can help students gain the communication skills, critical thinking and technical competencies required in the current technology-oriented workplace.

Building upon a strong set of Information Technology foundational courses, the program gives students the opportunity to choose one of three areas of emphasis: Comprehensive, Cybersecurity or Management. The emphasis options give students the ability to focus on a specific IT discipline of interest or to obtain a broader skill set across multiple IT disciplines.

The Bachelor of Science in Information Technology degree program culminates in a capstone project that focuses on the student's overall course of study and allows the student the opportunity to apply the concepts and skills learned in real and simulated business situations.

The comprehensive emphasis is intended for students who are interested in acquiring a broad skill set in essential IT disciplines. The comprehensive option covers the knowledge areas of database development and administration, information systems security, multimedia and web development, and network administration and management. This emphasis is well suited for students who which to develop across-the-board IT competencies, are not set on any specific IT professional work role and seek the flexibility to pursue different IT career opportunities upon graduation.

The cybersecurity emphasis targets a growing demand for IT experts specialized in cybersecurity, to operate, maintain, protect and defend the mission-critical assets of organizations. This emphasis track is designed per the guidelines of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (CWF), a partnership between government, academia, and the private sector focused on cybersecurity education and workforce development. The program learning outcomes are mapped to the NICE CWF work categories, specialty areas, work roles, and knowledge areas, to achieve direct relevancy with cybersecurity jobs in demand. The program also aligns its learning outcomes with best practices from prominent professional certifications, such as Certified Information Systems Security Professional (CISSP) from the International Information Systems Security Certification Consortium (ISC) ², and Certified Ethical Hacker (CEH) from EC-Council. Throughout the program, students combine theoretical and hands-on practice using a virtual-lab and cybersecurity resources, such as the IBM-cybersecurity technology suite.

The Information Technology Management emphasis combines the development of essential IT skills (systems lifecycle management, networking, data management, and helpdesk administration), IT security skills, IT governance skills and IT operational skills, to enable the planning and implementation of reliable IT in an organization (planning of capacity, continuity, availability, and security.) This program will prepare students to exercise a leadership role within the IT department of an organization by being able to apply an IT-as-a-service approach in the planning and management of the IT infrastructure and services.  

Modern enterprises have expressed a growing need for professionals with Information Technology Management (IT Management) skills, due to the strategic role IT plays in today's organization. The role of the IT Manager has evolved from being merely a technology specialist, to being a custodian of the enterprise's IT infrastructure and resources, and a steward of IT governance and strategy. The IT Manager is also responsible for interpreting and implementing rules and regulations like Sarbanes Oxley (SOX) and managing critical IT services for the enterprise at large, its partners, and its customers. 

In addition to strong foundational course work focused on IT competencies, the program emphasizes the necessary management, business, and communication skills required for managing budgets, projects and IT operations. The program includes core and elective courses to help graduates build mastery in Industry Standards and prepare them for Industry Certifications: 

  • PMI Professional in Business Analysis
  • Certified Associate in Project management (CAPM) - PMI
  • Information Technology Infrastructure Library (ITIL)
  • ISO20000 Information Technology Service Management
  • Certified in the Governance of Enterprise IT (CGEIT)
  • NIST 800.xxx and ISO 2700x
  • ITIL, ISO 20000, COBIT

Program Student Learning Outcomes

Upon completion of the BSIT Program, graduates will be able to: 

  1. Articulate clear, accurate and precise solutions to IT and discipline-specific problems.
  2. Demonstrate effective teamwork and communication skills in various organizational situations.
  3. Recognize and explain the societal, legal and ethical factors impact on individuals and organizations in various information technology contexts.
  4. Demonstrate attainment of IT and discipline-specific body-of-knowledge competencies, by defining concepts, recognizing applied usage, describing methodologies, determining governance and technical measures, and applying best practices effectively and accurately in all phases of the IT delivery lifecycle.

    Graduates of the comprehensive emphasis will also be able to:
    1. Analyze information technology problems and use current technical concepts and critical thinking skills to devise technical solutions.
    2. Use and apply current techniques, tools, and practices in the core IT areas to implement solutions to IT problems. These include the areas of networking, database technology, Web-based applications, human-computer interface, computer security, and software development.

      Graduates of Cybersecurity emphasis will also be able to: 
      1. Assess cybersecurity threats and vulnerabilities of information systems and infrastructures and analyze the cybersecurity risk impacts on enterprises.
      2. Design robust, layered controls to safeguard mission-critical assets of enterprises.

        Graduates of the Management emphasis will also be able to: 
        1. Articulate processes for procurement, funding, and other information technology value-chain applications.
        2. Devise processes and controls to achieve information systems compliance and alliance with the organization's strategic goals.

Bachelor of Science in Information Technology with Emphasis: 180 credits

Area I General Education Requirements: 48 credits

Professional Development

Course Code
Title
Credits
This course is for students to obtain basic knowledge and skills in using computer office production software and Internet features. A broad range of software applications, such as word processing, spreadsheets, presentation software, and Internet usage concepts will be covered.

Credits : 4

View Full Course

Designed to help entering students develop a more effective approach to college success, this course emphasizes positive self-evaluation, goal-setting and motivation; practical skills of successful students; effective use of the library and the many sources of information available; and the concepts and tools of critical thinking, and their applications.

Credits : 4

View Full Course

Sub-Total Credits
8

Basic Communications

Course Code
Title
Credits
Students will be introduced to college-level writing processes, particularly planning, researching and writing essays. Emphasis will be placed on refining individual skills, writing styles and voices, types of essay and on effective writing procedures. Selected readings supplement the course and provide topics for discussion and writing assignments. A minimum grade of C is required to pass this course.

Credits : 4

View Full Course

Focusing on the construction of effective researched written argument, this course refines composition techniques, develops abstract thinking processes, and promotes critical thinking. By locating and evaluating sources and incorporating appropriately vetted academic sources into their work, students will create well-supported arguments within appropriately documented academic essays. A minimum grade of C is required to pass this course.

Credits : 4

View Full Course

Sub-Total Credits
8

Choose one additional course from the list below: 

Course Code
Title
Credits
This course examines the fundamental role of communication in establishing and maintaining relationships. By surveying leading research and theories in interpersonal communication, students explore scholarly perspectives on how individuals enter into, maintain, and terminate relationships. Conceptual perspectives examined will include communicative competence, relational development, interaction process, codes, and context. This course has a prescriptive orientation, meaning that it is geared toward learning how to be a more competent communicator by being oriented towards others.

Credits : 4

View Full Course

This course is designed to prepare the student to develop and improve the ability to communicate. Self-expression, preparation of effective speeches, and development of speaking and listening skills will be the focus.

Credits : 4

View Full Course

Sub-Total Credits
4

Mathematics and Statistics

Course Code
Title
Credits
The course is designed to develop the concepts needed for College Algebra II using graphs and applications to motivate students and provide real-world examples. The course covers the solution of systems of linear equations, exponents and polynomials, factoring, rational expressions, functions, and quadratic equations. MyMathLab or a comparable resource may be used for lecture, homework and assessment assignment delivery.

Credits : 4

View Full Course

College Algebra provides students with lecture and extensive practice in the concepts required as background for Pre-Calculus and Calculus. The course emphasizes the graphs and properties of functions in general, with emphasis on linear, quadratic, polynomial, rational, exponential, and logarithmic functions. MyMathLab or a comparable resource may be used for lecture, homework and assessment assignment delivery.

Credits : 4

View Full Course

College Mathematics covers the fundamentals of several areas of mathematics, including set theory, logic, geometry, graph theory, probability, and statistics. MyMathLab or a comparable resource may be used for lecture, homework and assessment assignment delivery.

Credits : 4

View Full Course

Statistics provides students with lecture and extensive practice in the concepts of descriptive and inferential statistics. The course emphasizes practical calculation and application. It begins with sample statistics and population parameters, proceeds to measures of central tendency, dispersion, and position, introduces the least-squares best-fit line and several key probability distributions, and concludes with the sampling distribution of sampling means, and hypothesis testing. MyStatLab or a comparable resource may be required in the course.

Credits : 4

View Full Course

Sub-Total Credits
16

Natural and Physical Sciences (choose one)

Course Code
Title
Credits

Principles of Biology I is the first in a two-course sequence in biology. The course introduces scientific methods, biological chemistry, cells, energy for life, basic genetics, biotechnology, and the principles of evolution. Students will also complete writing assignments that develop their skills as scientifically literate citizens.

Credits : 4

View Full Course

Principles of Biology II is the second course in a two course sequence in biology. This course continues the study of human biology with the role of endocrine and nervous systems in homeostatic regulation. Other topics covered are human reproduction, development, evolution, and advanced genetics. Ecological concepts are also discussed. The student will complete writing assignments that serve to increase knowledge of the scientific literature.

Credits : 4

View Full Course

CHM1010 is a survey course of general chemistry, organic chemistry and biochemistry. Fundamental concepts and principles will be presented including atomic theory, bonding, nomenclature, solutions, acids and bases, and an introduction to organic chemistry and biochemistry. Emphasis will be placed on the application of these topics in various health fields. This overview provides the health-care worker the ability to appreciate physiological and therapeutic processes at the molecular level. The course will also explore the role of chemistry in society today by applying a problem-solving approach to understanding chemistry.

Credits : 4

View Full Course

Sub-Total Credits
4

Arts and Humanities

Course Code
Title
Credits
This course introduces the study of human social development, social organizations and social institutions by looking at our own self as the investigated or member of the society. Students will apply sociological perspectives to examine themselves around the development of self-concept, group dynamics, gender equality, social class, racial and ethnic relations, demography and population, the family, religion, and education. Through open discussion of current societal events, students will explore the constructs and consequences of diversity, equity, and inclusion.

Credits : 4

View Full Course

Sub-Total Credits
4

Social and Behavioral Sciences (choose one)

Course Code
Title
Credits
Microeconomics is the study of how individuals, households and firms make decisions about consumption and production which affect the supply and demand of goods and services. Other topics include the costs of production, behavior of firms, organization of industries, economics of labor markets, and theories of consumer choice.

Credits : 4

View Full Course

The study of macroeconomics includes the basic aspects of economic analysis of the business world. Students will develop an understanding of the monetary system, recession, inflation, and the main cycles of business activity

Credits : 4

View Full Course

This course introduces students to the American Government. By examining the struggle for power-the participants, the stakes, the processes, and the institutional arenas — this course introduces the students to the political struggles that drive democracy.

Credits : 4

View Full Course

An introduction and overview of the major principles in the field of Psychology including: mental disorders, personality, social understanding, stress and coping, learning, memory, neuroscience, and consciousness. Students will also gain a broad understanding of how these areas are interconnected from a theoretical and practical worldview in addition to scientific modes of thought about behavior. This course contains a component of the Quality Enhancement Plan (QEP) initiative, "Keeping it Real: Classroom to Career," whose overarching goals are student success and early career engagement.

Credits : 4

View Full Course

This course introduces the study of human social development and social organizations and social institutions. Students will apply sociological perspectives to examine topics such as the development of self-concept, group dynamics, social deviance, gender equality, social class, racial and ethnic relations, demography and population, the family, religion, and education.

Credits : 4

View Full Course

This course exposes the student to social problems in the United States and globally. The student will learn the structural causes of social problems, the role that race/ethnicity, gender, and class play in social inequalities and the position the United States holds with respect to global social problems. Topics may include economic problems, environmental issues, problems of social inequality, deviance, and institutional problems. The student will also learn how to develop solutions to social problems.

Credits : 4

View Full Course

Sub-Total Credits
4

Area II Foundation Requirements: 52 credits

Course Code
Title
Credits
This course introduces students to the fundamental areas of Information Technology, including computer organization, computer system hardware and software, operating systems, and current computing technologies. This course is designed as a general framework for information technology and serves as a foundation for the Information Technology major.

Credits : 4

View Full Course

This course introduces students to the study of basic networking terminology, concepts, components (hardware) and basic network design. Investigation of functions required to operate computer communications networks will also be addressed.

Credits : 4

View Full Course

This course introduces the beginning programmer to structured program logic without focusing on any particular language. Much emphasis is placed on developing sound programming techniques including flowcharting and naming conventions.

Credits : 4

View Full Course

This course builds on the foundation developed in ITS2104 Programming Logic. Students are introduced to the elements of structured programming-related components, such as overall program design, data types, variables, arrays, operators, control statements, classes, objects, methods, and inheritance. The course also introduces the concepts of packages and interfaces, as well as exception handling.

Credits : 4

View Full Course

This course introduces students to database basic concepts, conceptual data models with case studies, common data manipulation languages, logical data models, database design, facilities for database security/integrity, and applications.

Credits : 4

View Full Course

Sub-Total Credits
20

Elective Pool (eight courses or 32 credit hours)

Transfer students may transfer any course to help fulfill the elective pool requirements, provided the course meets the standards of the Credit for Transcripted and Non-transcripted Work policy found in the Academic Affairs section of this catalog.

Non-transfer students, with their advisor's consultation and approval may choose courses from any department recommended and listed course or more broadly from any course offered by South University. Work from other fields must include any required prerequisite courses in the elective field.

A course can be used to meet only one requirement in the program across Areas I, II, III and IV. For example, if a course from the Area III Specialization group is completed, it cannot be used to meet an Elective requirement. Also, students should be sure to select elective courses for which they will have met the required prerequisites. Students should work with their academic advisor or counselor to be sure they are making appropriate course choices. 

Course Code
Title
Credits
This course examines ethical dilemmas specific to the IT industry through a systematic approach of the basic principles of ethics and the relationship of these principles to a technological and global society. Ethical decision-making and practical applications of ethics in a contemporary society are also explored.

Credits : 4

View Full Course

This is the second course covering the in-depth process of the System Development Life Cycle (SDLC). This course focuses on development strategies, validation and verification testing, deployment, maintenance, and revision. Additional topics include quality management, fault tolerance, requirements feedback, and system assessment.

Credits : 4

View Full Course

This course is designed to provide students with a guide to future research in the field of information technology. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study.

Credits : 4

View Full Course

This course provides an overview of implementing Local Area Network (LAN) network management tools through the study of Transmission Control Protocol/Internet Protocol (TCP/IP), hardware routers and client/server architecture related to configuring network services, e.g. Dynamic Host Configuration Protocol (DHCP) scope and policies. Routing, Internet Control Message Protocol (ICMP), troubleshooting, non-broadcast IP networks and subnet/supernet and connectivity will also be addressed.

Credits : 4

View Full Course

This course provides an in-depth study of cloud computing technology. The course content is aligned with the curriculum of the CompTIA Cloud+ Certification. The course is design oriented, focusing on topics such as cloud architecture, virtualization, cloud services, DevOps, cloud security and reliability, and quality of service. Students will be introduced to cloud related areas of network administration, cloud delivery model considerations, cost metrics and pricing models, service quality metrics and SLAs, that are related to the day-to-day job of network administration.

Credits : 4

View Full Course

This course is designed to prepare students to write programs that operate across network connections. The basic principles of programming general client/server applications in Perl and interacting with a variety of common servers will be addressed.

Credits : 4

View Full Course

This course examines the use of audio, video and other digital media as corporate, educational and personal communication. Students will configure and apply a number of compression techniques and file formats to different media, and evaluate the effective use of digital media. Students will also publish the course project to the Web.

Credits : 4

View Full Course

Students learn and practice the principles of multimedia authoring using software similar to Flash as a development tool and Extensible Markup Language (XML) based web multimedia approaches such as Synchronized Multimedia Integration Language (SMIL) and Scalable Vector Graphics (SVG). Students develop presentations targeted to the various media players/browsers, integrating video clips, rolling text documents with hyperlink, background music, animation sequences, and slideshows of still and moving images with narration.

Credits : 4

View Full Course

This course will introduce industry standard programming languages including Structured Query Language (SQL) and Java to develop or manage web applications. Error and exception handling techniques, stored procedures and functions, concurrency issues, etc. will be addressed.

Credits : 4

View Full Course

This course examines how databases are used to support websites and organizations using case studies. Students will develop dynamic websites with web applications that link databases to websites, pull web data and content in and out of databases and integrate a variety of coding and scripting technologies to enhance the functionality and flexibility of websites. Emphasis is placed on web performance tuning, and the application and maintenance of databases to web development.

Credits : 4

View Full Course

This course represents the practical and demanding challenges of creating web applications for ecommerce, with an emphasis on the Structured Query Language (SQL) queries necessary to build complex relations. In creating the "shopping cart" project for this course, the students will design a normalized database. This course will review Hypertest Preprocessor (PHP) code structures as well as provide basic instruction in Object-Oriented techniques. Also, this course will show students how to document and evaluate their work, within codified goals and test protocols.

Credits : 4

View Full Course

This course provides students with an in-depth coverage of tasks an administrator performs which include, but are not limited to creating and managing database users, implementing a security system, designing a backup strategy, performing recovery, tuning databases to optimize performance and troubleshooting.

Credits : 4

View Full Course

In this course, students will be introduced to the Data Access Object (DAO) hierarchy which provides the background for the development of sophisticated relational database applications using the control-based methods and object programming methods for data. Remote Data Objects (RDO), Active Data Objects (ADO), structured query language (SQL) and how to combine SQL with Visual Basic controls will also be covered.

Credits : 4

View Full Course

This course guides students through the development of enterprise-quality web applications using current web development frameworks. The course adopts a step-by-step approach by example to web application development using open-source technologies, including but not limited to, HTML5, CSS3, JavaScript, Node.js, a JavaScript-based framework. In this course, students will:

  • create a frontend with React
  • create a backend with Node.js, Express and Mongo dB
  • setting up a database with MongoDB to connect the frontend to the backend creating a full stack

The React, Express JS and Node.js combination provides tools to run web applications on both the client and the server side. Throughout the course, the students learn foundational security concepts and best practices pertaining to enterprise-quality web development, which are applied to secure end-to-end web applications from common cyber threats.

Credits : 4

View Full Course

The goal of this course is to produce a professional who is both highly self-directing and able to use consultative supervision. The internship program is designed specifically to enable the IT student to apply classroom knowledge to the work environment, and to better prepare the student to enter the Information Technology industry. This course is a faculty supervised and evaluated field experience in the student's chosen profession. Students will work with Career Services or the appropriate Department Chair, Program Director, or designee to identify a potential internship site location. Once an acceptable organization and site supervisor are found, South University must approve the organization to be utilized for this purpose. The Site Supervisor, student, and Faculty Coordinator, as defined in the College of Business Internship Courses Student Handbook, arrange for the student to have an opportunity to realize the goals and objectives and apply competencies of this course to real life situations. Please refer to the Internship Learning Agreement in the College of Business Internship Courses Student Handbook for further information regarding requirements prior to participating in an internship. Minimum of 120 contact hours. This course is Pass/Fail (P/F).

Credits : 4

View Full Course

The course covers the network security principles and infrastructure protection strategies. IP security, cryptography, prevention/detection systems, wireless security and system security. The course covers the network security principles and how to mitigate the risk of an attack.

Credits : 4

View Full Course

The course is a study of security concepts in developing software applications. This course discusses design principles for secure software development, and some of the security issues in current programming and scripting languages, database systems and Web systems. The student will learn the foundations of application security and how to create secure software. This course is part of the cybersecurity curriculum, targeting students who want to work in the field of application security including penetration testing and ethical hacking, but can also apply to other information technology students wanting to know more about the security of software. Upon completing this course, the student will know enough on what it takes to make secure software and where to find information pertinent to solve typical application software security problems.

Credits : 4

View Full Course

This course discusses the fundamental concepts of IT Governance, Audit and Control process that are utilized in a plethora of environments including but not limited to, government, financial, mortgage, service and healthcare industries. Control frameworks, control objectives and the logging, monitoring and reporting and subsequent change management of controls is examined. Students will be exposed to a process for creating a control structure with goals and objectives, auditing a given IT infrastructure against it, and establishing remediation procedures. The primary framework employed is ISACA's COBIT 5.0 open standard framework which is also an integral part of the CISA (Certified Information System Auditor), CISM (Certified Information Security Manager), and CGEIT (Certified in the Governance of Enterprise IT) professional certifications.

Credits : 4

View Full Course

Managing IT in today’s business environment entails more than managing the technology within IT. With business demands for IT services increasing, Information Technology Service Management (ITSM) involves organizing IT as a set of services that are aligned to business needs. With the change in focus of the IT function to a service provider from a technology provider, it is imperative to focus on strategic and important business outcomes, and not just technology outcomes. This course focuses on concepts, techniques, and technologies applied to help IT function as a service provider closely aligned with business needs including links between lifecycle stages, the processes used and their contribution to service management practices. This course enables students to look at IT service management through an end-to-end operating model for the creation, delivery and continual improvement of technology-enabled products and services.

Credits : 4

View Full Course

An enterprise is a collection of organizations that share a common set of goals and objectives. Enterprise architecture is fast emerging as a key function that enables synergy between IT and business strategy and delivery as well as IT in an enterprise. This course provides students with an understanding of advanced concepts and practices in establishing and running ongoing Enterprise Architecture (EA) programs. It also provides students with a theoretical and practical understanding of the subject areas related to EA. Special emphasis is placed on the emerging technologies such as SDN, SOA, EA3, and cloud computing. To appreciate the foundations and decision-making framework of EA some time will be devoted to understand the business processes and strategies.

Credits : 4

View Full Course

This course is the first course in a two-course sequence on information systems security. The course covers the material needed to prepare for the Certified Information Systems Security Professional (CISSP) certification from the International Information System Security Certification Consortium, (ISC)2. The course covers the domains of security and risk management, asset security, security engineering, and communication and network security. Security and risk management addresses the framework and policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets and assess the effectiveness of that protection. Asset security examines the concepts, principles, structures, and standards used to monitor and secure assets and controls used to enforce various levels of confidentiality, integrity, and availability. Security engineering describes the concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and controls to achieve required levels of confidentiality, integrity, and availability. Communication and network security encompasses the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks and media. The course includes interactive learning resources and a virtual lab.

Credits : 4

View Full Course

This course teaches the fundamental skills to recognize and respond to IT security incidents in an organization. Examples of IT security incidents include network security incidents, malware incidents, and unauthorized intrusions. The course covers essential principles and techniques for detecting, handling and responding to current and emerging IT security threats. This includes examining risk assessment methodologies, identifying laws and policies that are pertinent to incident handling, organizing and managing incident response teams, conducting training in incident management, and recovering from incidents. Throughout the course, the students apply the concepts learned on how to tackle different types of incident scenarios through hands-on labs. Upon completing this course, the students will be equipped to develop incident handling and response measures and react efficiently and effectively to IT security incidents.

Credits : 4

View Full Course

Sub-Total Credits
32

Area III Major Requirements: 80 credits

Common Core: 32 credits

Course Code
Title
Credits
This course serves as a survey of the structure and functions of operating systems, process communication techniques, high-level concurrent programming, virtual memory systems, elementary queuing theory, security, and distributed systems using case studies of modern operating systems.

Credits : 4

View Full Course

This course continues the concepts introduced in ITS2110 and introduces students to advanced database design concepts and further mastery of the SQL language, including advanced querying, SQL database creation, and SQL database updates. Throughout this course, the student will gain practical experience in database creation, updating, management, and optimization in the SQL language.

Credits : 4

View Full Course

This course continues the concepts introduced in ITS2103 and introduces students to the study of advanced network planning, protocols, and strategies for effective connectivity and deployment. Students will study the current generation of wireless technology, mobile networking technology, satellite networking, and connectivity protocols for widespread and global networks

Credits : 4

View Full Course

This course presents a comprehensive introduction to computer security issues in the areas of integrity, confidentiality, and availability. There is an emphasis on applying security to home and networked computers along with practical considerations of improving system security. Techniques and common means of attack and defense are reviewed. Topics include threats, vulnerabilities, security management, encryption, laws, and ethics of hacking.

Credits : 4

View Full Course

This course introduces students to System Development Life Cycle (SDLC) containing system analysis, design, development and implementation. The course will explain about conventional and current approach for SDLC and explain the role of Computer Aided Systems Engineering (CASE) tools, software, communications and data base technology in practicing various steps of SDLC.

Credits : 4

View Full Course

This course focuses on the information technology project management process and development of the project team as key to the successful achievement of IT projects. The process examines the main elements required in every proposal/ plan: time frame and budget. Key areas of IT project teams serve to support the fundamental approach that every project team is tailored to achieve project results efficiently and effectively.

Credits : 4

View Full Course

This course will focus on the refinement of previous works into a comprehensive portfolio representative of IT skills. Emphasis will be on development, design, craftsmanship and presentation. In addition, the students will go through a number of activities that will help them to develop career building skills, such as resume and cover letter design and other career related considerations. Minimum of 120 contact hours.

Credits : 4

View Full Course

This course integrates different aspects of server-based technologies and the practical requirements and implementations of secure communication. Topics will include password authentication in the Apache web server; using password authentication in PHP scripting for both Internet and Intranet applications; administering user accounts through database operation; and, using email to validate/confirm user account information.

Credits : 4

View Full Course

Sub-Total Credits
32

Select One Emphasis: 48 credits

Emphasis in Comprehensive 

Course Code
Title
Credits
This course examines ethical dilemmas specific to the IT industry through a systematic approach of the basic principles of ethics and the relationship of these principles to a technological and global society. Ethical decision-making and practical applications of ethics in a contemporary society are also explored.

Credits : 4

View Full Course

This course introduces Interaction Design, a broad scope of issues, topics and paradigms, which has traditionally been the scope of Human Computer Interaction (HCI) and Interaction Design (IS). Students will formulate a design project, applying usability concepts and intuitive design. Students will construct interactive designs for specific software interfaces appropriate for the client and/or target audience.

Credits : 4

View Full Course

This course will provide a basic understanding of the methods and techniques of developing a simple to moderately complex website. Using the current standard Web page languages, students will be instructed on creating and maintaining a website. The aid of Web Development software will be introduced in this course along with fundamental media creation.

Credits : 4

View Full Course

This is the second course covering the in-depth process of the System Development Life Cycle (SDLC). This course focuses on development strategies, validation and verification testing, deployment, maintenance, and revision. Additional topics include quality management, fault tolerance, requirements feedback, and system assessment.

Credits : 4

View Full Course

This course is designed to provide students with a guide to future research in the field of information technology. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study.

Credits : 4

View Full Course

This course provides an overview of implementing Local Area Network (LAN) network management tools through the study of Transmission Control Protocol/Internet Protocol (TCP/IP), hardware routers and client/server architecture related to configuring network services, e.g. Dynamic Host Configuration Protocol (DHCP) scope and policies. Routing, Internet Control Message Protocol (ICMP), troubleshooting, non-broadcast IP networks and subnet/supernet and connectivity will also be addressed.

Credits : 4

View Full Course

This course provides students with an in-depth coverage of tasks an administrator performs which include, but are not limited to creating and managing database users, implementing a security system, designing a backup strategy, performing recovery, tuning databases to optimize performance and troubleshooting.

Credits : 4

View Full Course

The course covers the network security principles and infrastructure protection strategies. IP security, cryptography, prevention/detection systems, wireless security and system security. The course covers the network security principles and how to mitigate the risk of an attack.

Credits : 4

View Full Course

This course discusses the fundamental concepts of IT Governance, Audit and Control process that are utilized in a plethora of environments including but not limited to, government, financial, mortgage, service and healthcare industries. Control frameworks, control objectives and the logging, monitoring and reporting and subsequent change management of controls is examined. Students will be exposed to a process for creating a control structure with goals and objectives, auditing a given IT infrastructure against it, and establishing remediation procedures. The primary framework employed is ISACA's COBIT 5.0 open standard framework which is also an integral part of the CISA (Certified Information System Auditor), CISM (Certified Information Security Manager), and CGEIT (Certified in the Governance of Enterprise IT) professional certifications.

Credits : 4

View Full Course

An enterprise is a collection of organizations that share a common set of goals and objectives. Enterprise architecture is fast emerging as a key function that enables synergy between IT and business strategy and delivery as well as IT in an enterprise. This course provides students with an understanding of advanced concepts and practices in establishing and running ongoing Enterprise Architecture (EA) programs. It also provides students with a theoretical and practical understanding of the subject areas related to EA. Special emphasis is placed on the emerging technologies such as SDN, SOA, EA3, and cloud computing. To appreciate the foundations and decision-making framework of EA some time will be devoted to understand the business processes and strategies.

Credits : 4

View Full Course

Sub-Total Credits
44

Choose one course from the list below: 

Course Code
Title
Credits
This course introduces the principles of software development, addressing both procedural and object-oriented development. Topics include: requirements, analysis, design, coding, testing, verification, and maintenance. Students will design and implement a project.

Credits : 4

View Full Course

This course examines how databases are used to support websites and organizations using case studies. Students will develop dynamic websites with web applications that link databases to websites, pull web data and content in and out of databases and integrate a variety of coding and scripting technologies to enhance the functionality and flexibility of websites. Emphasis is placed on web performance tuning, and the application and maintenance of databases to web development.

Credits : 4

View Full Course

This course represents the practical and demanding challenges of creating web applications for ecommerce, with an emphasis on the Structured Query Language (SQL) queries necessary to build complex relations. In creating the "shopping cart" project for this course, the students will design a normalized database. This course will review Hypertest Preprocessor (PHP) code structures as well as provide basic instruction in Object-Oriented techniques. Also, this course will show students how to document and evaluate their work, within codified goals and test protocols.

Credits : 4

View Full Course

The goal of this course is to produce a professional who is both highly self-directing and able to use consultative supervision. The internship program is designed specifically to enable the IT student to apply classroom knowledge to the work environment, and to better prepare the student to enter the Information Technology industry. This course is a faculty supervised and evaluated field experience in the student's chosen profession. Students will work with Career Services or the appropriate Department Chair, Program Director, or designee to identify a potential internship site location. Once an acceptable organization and site supervisor are found, South University must approve the organization to be utilized for this purpose. The Site Supervisor, student, and Faculty Coordinator, as defined in the College of Business Internship Courses Student Handbook, arrange for the student to have an opportunity to realize the goals and objectives and apply competencies of this course to real life situations. Please refer to the Internship Learning Agreement in the College of Business Internship Courses Student Handbook for further information regarding requirements prior to participating in an internship. Minimum of 120 contact hours. This course is Pass/Fail (P/F).

Credits : 4

View Full Course

Sub-Total Credits
4
Emphasis in Cybersecurity 

Course Code
Title
Credits

This course covers fundamental techniques and methods of theory of computation and calculus as applied to information technology. The course utilizes the universal language of calculus to formulate and understand practical IT problems, utilizing examples and exercises pertinent to IT applications. The student gains computational knowledge and skills that are relevant and useful to IT professionals.

Credits : 4

View Full Course

This course provides a more in-depth use of software design and implementation aspects introduced in ITS2105 Programming I and applies in more depth the elements of object-oriented design (OOD) and programming (OOP). In addition, the course expands the scope of software development by addressing the concepts of multithreaded programming, metadata, string handling, library features, GUI (Graphical User Interface) implementation, interfacing with a database, interactive debugging techniques, and recursion.

Credits : 4

View Full Course

This course is designed to provide cybersecurity students with a guide to future research in the field of cybersecurity. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. This is a culmination of prior academic work and it is recommended that, at a minimum, the completion of all prior major common core curriculum courses be completed before taking this course. Students may opt to complete some, or all, of their major core courses before taking this course. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study focusing on topics pertinent to the field of cybersecurity.

Credits : 4

View Full Course

This course guides students through the development of enterprise-quality web applications using current web development frameworks. The course adopts a step-by-step approach by example to web application development using open-source technologies, including but not limited to, HTML5, CSS3, JavaScript, Node.js, a JavaScript-based framework. In this course, students will:

  • create a frontend with React
  • create a backend with Node.js, Express and Mongo dB
  • setting up a database with MongoDB to connect the frontend to the backend creating a full stack

The React, Express JS and Node.js combination provides tools to run web applications on both the client and the server side. Throughout the course, the students learn foundational security concepts and best practices pertaining to enterprise-quality web development, which are applied to secure end-to-end web applications from common cyber threats.

Credits : 4

View Full Course

The course covers the network security principles and infrastructure protection strategies. IP security, cryptography, prevention/detection systems, wireless security and system security. The course covers the network security principles and how to mitigate the risk of an attack.

Credits : 4

View Full Course

The course is a study of security concepts in developing software applications. This course discusses design principles for secure software development, and some of the security issues in current programming and scripting languages, database systems and Web systems. The student will learn the foundations of application security and how to create secure software. This course is part of the cybersecurity curriculum, targeting students who want to work in the field of application security including penetration testing and ethical hacking, but can also apply to other information technology students wanting to know more about the security of software. Upon completing this course, the student will know enough on what it takes to make secure software and where to find information pertinent to solve typical application software security problems.

Credits : 4

View Full Course

This course is the first course in a two-course sequence on information systems security. The course covers the material needed to prepare for the Certified Information Systems Security Professional (CISSP) certification from the International Information System Security Certification Consortium, (ISC)2. The course covers the domains of security and risk management, asset security, security engineering, and communication and network security. Security and risk management addresses the framework and policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets and assess the effectiveness of that protection. Asset security examines the concepts, principles, structures, and standards used to monitor and secure assets and controls used to enforce various levels of confidentiality, integrity, and availability. Security engineering describes the concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and controls to achieve required levels of confidentiality, integrity, and availability. Communication and network security encompasses the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks and media. The course includes interactive learning resources and a virtual lab.

Credits : 4

View Full Course

This course is the second course in a two-course sequence on information systems security. The course covers the material needed to prepare for the Certified Information Systems Security Professional (CISSP) certification from the International Information System Security Certification Consortium, (ISC)2. The course covers the domains of identity and access management, information security, security operations, and software development security. Access management examines all operational levels of an organization: facilities, support systems, information systems, and personnel. Information security covers the continued confidentiality- integrity-availability of an organization's assets. Security operations identifies critical information and the execution of selected measures to mitigate threats to critical information. Software development security examines the application of information systems security principles in the software development lifecycle. The course includes interactive learning resources and a virtual lab. The student is expected to have taken Information Systems Security I or equivalent.

Credits : 4

View Full Course

This course is the first course in a two-course sequence on ethical hacking. An ethical hacker is a skilled professional who is proficient at examining vulnerabilities in target systems and applying knowledge and tools like those used by malicious hackers, but in a lawful and legitimate manner, to assess the security posture of target systems. The course covers the material needed to prepare for the Certified Ethical Hacker (CEH) certification from the International Council of E-Commerce Consultants (EC-Council). The course examines the specific network security discipline of ethical hacking from a technology-neutral perspective. In this first course, the student learns about threats, vulnerabilities, and exploitation techniques with computer systems, applications, and networks. The main topics covered include: cryptography, foot printing, scanning, enumeration, system hacking, malware, sniffers, and social engineering. The student gains knowledge through lectures and assignments, and hands-on experience through interactive practices, virtual-lab challenges and exercises that supplement the theory. The course assumes basic knowledge of network concepts and issues, computer hardware and software systems, as well as applications.

Credits : 4

View Full Course

This course is the second course in a two-course sequence on ethical hacking. An ethical hacker is a skilled professional who is proficient at examining vulnerabilities in target systems and applying knowledge and tools like those used by malicious hackers, but in a lawful and legitimate manner, to assess the security posture of target systems. The course covers the material needed to prepare for the Certified Ethical Hacker (CEH) certification from the International Council of E-Commerce Consultants (EC-Council). In this second course, the student learns ethical-hacking principles and acquires practical skills in the following areas: denial of service, session hijacking, web servers and applications, SQL injection, hacking Wi-Fi and Bluetooth, mobile device security, evasion, cloud technologies and security, and physical security. The student gains knowledge through lectures and assignments, and hands-on experience through interactive practices, virtual-lab challenges and exercises that supplement the theory. The course assumes basic knowledge of network concepts and issues, computer hardware and software systems, as well as applications, and the completion of Ethical Hacking I or equivalent.

Credits : 4

View Full Course

Cyber forensics goes beyond just analyzing computer hard drives or detecting intrusions to infrastructures. The term “cyber forensics” is the term adopted by the US Department of Defense, which indicates that the practice of forensics covers digital forensics, network forensics, and application forensics. The course is designed to be aligned with the common body of knowledge of the Computer Hacking Forensic Investigator Certification from the EC-Council. The course covers established digital forensics disciplines and new domains, such as mobile forensics. The course examines digital forensics techniques and procedures, standards and best practices, as well as legal considerations and ethics. The student learns how to obtain digital evidence that is accurate, complete, and dependable. The course also examines the application of the cyber forensics' competencies to different information security areas, such as e-discovery, malware analysis, and incident response. The course includes a direct component, which consists of demonstrations and virtual-lab assignments.

Credits : 4

View Full Course

This course teaches the fundamental skills to recognize and respond to IT security incidents in an organization. Examples of IT security incidents include network security incidents, malware incidents, and unauthorized intrusions. The course covers essential principles and techniques for detecting, handling and responding to current and emerging IT security threats. This includes examining risk assessment methodologies, identifying laws and policies that are pertinent to incident handling, organizing and managing incident response teams, conducting training in incident management, and recovering from incidents. Throughout the course, the students apply the concepts learned on how to tackle different types of incident scenarios through hands-on labs. Upon completing this course, the students will be equipped to develop incident handling and response measures and react efficiently and effectively to IT security incidents.

Credits : 4

View Full Course

Sub-Total Credits
48
Emphasis in Management 

Course Code
Title
Credits

ACC1001 is the first of a three-course sequence focusing on how stakeholders rely upon accounting information to assist them in their decision-making activities. ACC1001 introduces accounting as the "language of business" the tool used to communicate the effects of an organization's business activities on its income, financial position, and cash flows. The course provides an overview of the financial accounting system, including: the role of accounting in business; the format, content, and use of financial statements; the impact of transactions on the financial statements; the regulatory environment of accounting; and the accounting standard-setting process.

Credits : 4

View Full Course

A basic exposure to business principles, functions, and practices that prepares students with the knowledge to pursue specific areas of study associated with business enterprise such as economics, marketing, finance, human resource management, information technology, operations, ethics, and entrepreneurship. Awareness of the significance of business in the free enterprise system is developed through topical research, discussion, and writing projects.

Credits : 4

View Full Course

This course is designed to prepare students to organize and compose effective business correspondence and business. Focus will be on various types of business communication encountered in management functions, including creating documents, preparing presentations, managing meetings, providing leadership, and building teams. The course will address both internal and external organizational communications as well as professional career preparation.

Credits : 4

View Full Course

This course exposes the student to a wide range of important issues in managerial and personal finance, including such topics as the role of finance in organizations, principles of financial analysis, forecasting and working capital management, and the basics of analysis and evaluation of investments such as stocks, mutual funds and bonds.

Credits : 4

View Full Course

This course provides an overview of implementing Local Area Network (LAN) network management tools through the study of Transmission Control Protocol/Internet Protocol (TCP/IP), hardware routers and client/server architecture related to configuring network services, e.g. Dynamic Host Configuration Protocol (DHCP) scope and policies. Routing, Internet Control Message Protocol (ICMP), troubleshooting, non-broadcast IP networks and subnet/supernet and connectivity will also be addressed.

Credits : 4

View Full Course

This course discusses the fundamental concepts of IT Governance, Audit and Control process that are utilized in a plethora of environments including but not limited to, government, financial, mortgage, service and healthcare industries. Control frameworks, control objectives and the logging, monitoring and reporting and subsequent change management of controls is examined. Students will be exposed to a process for creating a control structure with goals and objectives, auditing a given IT infrastructure against it, and establishing remediation procedures. The primary framework employed is ISACA's COBIT 5.0 open standard framework which is also an integral part of the CISA (Certified Information System Auditor), CISM (Certified Information Security Manager), and CGEIT (Certified in the Governance of Enterprise IT) professional certifications.

Credits : 4

View Full Course

Managing IT in today’s business environment entails more than managing the technology within IT. With business demands for IT services increasing, Information Technology Service Management (ITSM) involves organizing IT as a set of services that are aligned to business needs. With the change in focus of the IT function to a service provider from a technology provider, it is imperative to focus on strategic and important business outcomes, and not just technology outcomes. This course focuses on concepts, techniques, and technologies applied to help IT function as a service provider closely aligned with business needs including links between lifecycle stages, the processes used and their contribution to service management practices. This course enables students to look at IT service management through an end-to-end operating model for the creation, delivery and continual improvement of technology-enabled products and services.

Credits : 4

View Full Course

An enterprise is a collection of organizations that share a common set of goals and objectives. Enterprise architecture is fast emerging as a key function that enables synergy between IT and business strategy and delivery as well as IT in an enterprise. This course provides students with an understanding of advanced concepts and practices in establishing and running ongoing Enterprise Architecture (EA) programs. It also provides students with a theoretical and practical understanding of the subject areas related to EA. Special emphasis is placed on the emerging technologies such as SDN, SOA, EA3, and cloud computing. To appreciate the foundations and decision-making framework of EA some time will be devoted to understand the business processes and strategies.

Credits : 4

View Full Course

This course is the first course in a two-course sequence on information systems security. The course covers the material needed to prepare for the Certified Information Systems Security Professional (CISSP) certification from the International Information System Security Certification Consortium, (ISC)2. The course covers the domains of security and risk management, asset security, security engineering, and communication and network security. Security and risk management addresses the framework and policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets and assess the effectiveness of that protection. Asset security examines the concepts, principles, structures, and standards used to monitor and secure assets and controls used to enforce various levels of confidentiality, integrity, and availability. Security engineering describes the concepts, principles, structures, and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and controls to achieve required levels of confidentiality, integrity, and availability. Communication and network security encompasses the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and public communications networks and media. The course includes interactive learning resources and a virtual lab.

Credits : 4

View Full Course

The latest major approaches and techniques of management are studied, including planning, systems management, new organizational concepts, computer influence, controlling, and quantitative measurement.

Credits : 4

View Full Course

Sub-Total Credits
44

Choose one course from the list below: 

Course Code
Title
Credits
This course is designed to present ethical principles and decision-making models for people in organizations. Making ethical choices in a variety of personal and organizational situations is covered.

Credits : 4

View Full Course

This course introduces the principles of software development, addressing both procedural and object-oriented development. Topics include: requirements, analysis, design, coding, testing, verification, and maintenance. Students will design and implement a project.

Credits : 4

View Full Course

This course is designed to provide students with a guide to future research in the field of information technology. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study.

Credits : 4

View Full Course

This course examines how databases are used to support websites and organizations using case studies. Students will develop dynamic websites with web applications that link databases to websites, pull web data and content in and out of databases and integrate a variety of coding and scripting technologies to enhance the functionality and flexibility of websites. Emphasis is placed on web performance tuning, and the application and maintenance of databases to web development.

Credits : 4

View Full Course

This course represents the practical and demanding challenges of creating web applications for ecommerce, with an emphasis on the Structured Query Language (SQL) queries necessary to build complex relations. In creating the "shopping cart" project for this course, the students will design a normalized database. This course will review Hypertest Preprocessor (PHP) code structures as well as provide basic instruction in Object-Oriented techniques. Also, this course will show students how to document and evaluate their work, within codified goals and test protocols.

Credits : 4

View Full Course

The goal of this course is to produce a professional who is both highly self-directing and able to use consultative supervision. The internship program is designed specifically to enable the IT student to apply classroom knowledge to the work environment, and to better prepare the student to enter the Information Technology industry. This course is a faculty supervised and evaluated field experience in the student's chosen profession. Students will work with Career Services or the appropriate Department Chair, Program Director, or designee to identify a potential internship site location. Once an acceptable organization and site supervisor are found, South University must approve the organization to be utilized for this purpose. The Site Supervisor, student, and Faculty Coordinator, as defined in the College of Business Internship Courses Student Handbook, arrange for the student to have an opportunity to realize the goals and objectives and apply competencies of this course to real life situations. Please refer to the Internship Learning Agreement in the College of Business Internship Courses Student Handbook for further information regarding requirements prior to participating in an internship. Minimum of 120 contact hours. This course is Pass/Fail (P/F).

Credits : 4

View Full Course

Sub-Total Credits
4
Total Credits
180