General Undergraduate Admission Requirements
Note: Not all Online Program offerings are available to residents of all U.S. states. Please contact an admissions representative for further information.
To be admitted to any of the undergraduate programs at South University, the prospective student must provide proof of high school graduation as recognized by the state of residence on the date the degree was earned, or the equivalent (e.g. GED with no single test score below 145 or numeric score equivalent to 2.0 on old version or state-issued certificate designated as the equivalent of a High School Diploma) with a minimum CGPA of 2.0 on a 4.0 scale within 5 weeks of the start date (refer to Conditional Acceptance). The prospective student must also complete the university administered placement tests prior to the start of the first quarter for campus students and during the first session of attendance for online students. South University accepts the International Baccalaureate Program diploma as meeting the requirement for high school graduation. Credentials earned outside the United States must be evaluated by a NACES or AICE-member credential evaluation service. Please speak with an admissions representative for more information.
Students with less than the minimum CGPA of 2.0 on a 4.0 scale may meet admissions requirements by submitting a minimum combined SAT (Evidence-Based Reading and Writing, and Math) score of 700 or 900 on the old SAT, a combined ACT score of 18, or meet the criteria established for acceptance as a transfer student.
Students with less than the minimum CGPA of 2.0 on a 4.0 scale may be admitted provisionally for two quarters. Failure to achieve a 1.5 CGPA in the first two quarters of attendance will result in dismissal. Students may appeal the dismissal by following the Procedures for Appealing Academic/Financial Aid Dismissal Policy.
Acceptable verification of high school graduation or the equivalent would include a copy of the high school diploma, high school transcript (official or unofficial), GED certificate, or GED scores and state-authorized examination scores (ex. HiSET, TASC) or a state- issued certificate designated as the equivalent of a high school diploma. In states that maintain a database that serves as an official registry of high school and GED graduates, an excerpt from the official database documenting the student's graduation or GED completion may be used.
Campuses in South Carolina must be provided with official high school transcripts or GED scores or state-issued certificates designated as the equivalent of a high school diploma.
Please see the policy on GPA Calculation for Admission for additional information
Conditional Acceptance
Students may be conditionally accepted by submitting unofficial copies of documentation required for the admission requirements. Conditional acceptance is allowed for 5 weeks beyond the start of the student’s first session. Failure to provide acceptable, official documentation, as stated in the admissions requirements, within 5 weeks from the start date will result in the following:
- Removal from class
- Cancelation of enrollment
- No final course grades
- No transcript
Students who do not provide acceptable documents for full, unconditional acceptance within the 5 week period will not be responsible for tuition and related fees. South University may grant exceptions to the 5 week period for unusual situations or circumstances. All exceptions must be submitted to the Office of the University Registrar for approval.
Admission of Transfer Students
Note: Not all Online Program offerings are available to residents of all U.S. states. Please contact an admissions representative for further information.
To be eligible for admission, transfer students must complete the application procedures and satisfy the following criteria:
- Submit a completed application for admission.
- Have earned 24 or more credit hours, or the equivalent (e.g. 16 semester hours), with a cumulative GPA of 2.00 from an acceptable accredited collegiate institution.
- Submit official transcripts (including verifiable faxed transcripts) from all colleges and universities attended.
- Submit self-certification of high school graduation or GED completion.
For transfer of credit practices refer to the applicable section under the Academic Affairs section of this catalog.
To be admitted as a Transfer student into South University the prospective student must have earned 24 or more quarter credit hours or the equivalent (e.g. 16 semester hours), with a cumulative GPA of 2.00 from an acceptable accredited collegiate institution. Official transcripts from the collegiate institution(s) must be received within 5 weeks of the start date (refer to Conditional Acceptance), and who are not required to take ENG0099 and/or MAT0099, will be exempt from taking the UVC1000 Strategies for Success. Students will select another 4 credit course in consultation with their Academic Advisor or Academic Counselor to fulfill the degree requirements.
Students with 24 or more quarter credits with less than a 2.0 GPA may be admitted provisionally for two quarters. Failure to achieve a 1.5 GPA in the first two quarters of attendance will result in dismissal. Students may appeal the dismissal by following the Procedures for Appealing Academic/Financial Aid Dismissal Policy.
Students who are citizens of countries other than the United States should refer to the section entitled International Student Admissions Policy.
Students who are transferring from or to a school within the University of North Carolina or the North Carolina Community College System should be aware of the Comprehensive Articulation Agreement approved by both governing Boards on March 1, 1996 and revised in September of 2008. This agreement may be found in its entirety at the following website.
For additional admissions information please see the admissions section here.
Offered at Austin, Columbia, Montgomery, Online Programs, Richmond, Savannah, Tampa, and Virginia Beach.
Note: Not all Online Program offerings are available to residents of all U.S. states. Please contact an admissions representative for further information.
The Bachelor of Science in Information Technology degree program focuses on preparing students with the knowledge and skills needed to understand the theoretical and applied uses of information technology in a variety of business settings. Case studies and hands-on lab projects can help students gain the communication skills, critical thinking and technical competencies required in the current technology-oriented workplace.
Building upon a strong set of Information Technology foundational courses, the program gives students the opportunity to choose one of three areas of emphasis: Comprehensive, Cybersecurity or Management. The emphasis options give students the ability to focus on a specific IT discipline of interest or to obtain a broader skill set across multiple IT disciplines.
The Bachelor of Science in Information Technology degree program culminates in a capstone project that focuses on the student's overall course of study and allows the student the opportunity to apply the concepts and skills learned in real and simulated business situations.
The comprehensive emphasis is intended for students who are interested in acquiring a broad skill set in essential IT disciplines. The comprehensive option covers the knowledge areas of database development and administration, information systems security, multimedia and web development, and network administration and management. This emphasis is well suited for students who which to develop across-the-board IT competencies, are not set on any specific IT professional work role and seek the flexibility to pursue different IT career opportunities upon graduation.
The cybersecurity emphasis targets a growing demand for IT experts specialized in cybersecurity, to operate, maintain, protect and defend the mission-critical assets of organizations. This emphasis track is designed per the guidelines of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (CWF), a partnership between government, academia, and the private sector focused on cybersecurity education and workforce development. The program learning outcomes are mapped to the NICE CWF work categories, specialty areas, work roles, and knowledge areas, to achieve direct relevancy with cybersecurity jobs in demand. The program also aligns its learning outcomes with best practices from prominent professional certifications, such as Certified Information Systems Security Professional (CISSP) from the International Information Systems Security Certification Consortium (ISC) ², and Certified Ethical Hacker (CEH) from EC-Council. Throughout the program, students combine theoretical and hands-on practice using a virtual-lab and cybersecurity resources, such as the IBM-cybersecurity technology suite.
The Information Technology Management emphasis combines the development of essential IT skills (systems lifecycle management, networking, data management, and helpdesk administration), IT security skills, IT governance skills and IT operational skills, to enable the planning and implementation of reliable IT in an organization (planning of capacity, continuity, availability, and security.) This program will prepare students to exercise a leadership role within the IT department of an organization by being able to apply an IT-as-a-service approach in the planning and management of the IT infrastructure and services.
Modern enterprises have expressed a growing need for professionals with Information Technology Management (IT Management) skills, due to the strategic role IT plays in today's organization. The role of the IT Manager has evolved from being merely a technology specialist, to being a custodian of the enterprise's IT infrastructure and resources, and a steward of IT governance and strategy. The IT Manager is also responsible for interpreting and implementing rules and regulations like Sarbanes Oxley (SOX) and managing critical IT services for the enterprise at large, its partners, and its customers.
In addition to strong foundational course work focused on IT competencies, the program emphasizes the necessary management, business, and communication skills required for managing budgets, projects and IT operations. The program includes core and elective courses to help graduates build mastery in Industry Standards and prepare them for Industry Certifications:
- PMI Professional in Business Analysis
- Certified Associate in Project management (CAPM) - PMI
- Information Technology Infrastructure Library (ITIL)
- ISO20000 Information Technology Service Management
- Certified in the Governance of Enterprise IT (CGEIT)
- NIST 800.xxx and ISO 2700x
- ITIL, ISO 20000, COBIT
Program Student Learning Outcomes
Upon completion of the BSIT Program, graduates will be able to:
- Articulate clear, accurate and precise solutions to IT and discipline-specific problems.
- Demonstrate effective teamwork and communication skills in various organizational situations.
- Recognize and explain the societal, legal and ethical factors impact on individuals and organizations in various information technology contexts.
- Demonstrate attainment of IT and discipline-specific body-of-knowledge competencies, by defining concepts, recognizing applied usage, describing methodologies, determining governance and technical measures, and applying best practices effectively and accurately in all phases of the IT delivery lifecycle.
Graduates of the comprehensive emphasis will also be able to:- Analyze information technology problems and use current technical concepts and critical thinking skills to devise technical solutions.
- Use and apply current techniques, tools, and practices in the core IT areas to implement solutions to IT problems. These include the areas of networking, database technology, Web-based applications, human-computer interface, computer security, and software development.
Graduates of Cybersecurity emphasis will also be able to:- Assess cybersecurity threats and vulnerabilities of information systems and infrastructures and analyze the cybersecurity risk impacts on enterprises.
- Design robust, layered controls to safeguard mission-critical assets of enterprises.
Graduates of the Management emphasis will also be able to:- Articulate processes for procurement, funding, and other information technology value-chain applications.
- Devise processes and controls to achieve information systems compliance and alliance with the organization's strategic goals.
Bachelor of Science in Information Technology with Emphasis: 180 credits
Area I General Education Requirements: 48 credits
Professional Development
Credits : 4
Credits : 4
Basic Communications
Credits : 4
Credits : 4
Choose one additional course from the list below:
Credits : 4
Credits : 4
Mathematics and Statistics
Credits : 4
Credits : 4
Credits : 4
Statistics provides students with lecture and extensive practice in the concepts of descriptive and inferential statistics. The course emphasizes practical calculation and application. It begins with sample statistics and population parameters, proceeds to measures of central tendency, dispersion, and position, introduces the least-squares best-fit line and several key probability distributions, and concludes with the sampling distribution of sampling means, and hypothesis testing. MyStatLab or a comparable resource may be required in the course.
Credits : 4
Natural and Physical Sciences (choose one)
Principles of Biology I is the first in a two-course sequence in biology. The course introduces scientific methods, biological chemistry, cells, energy for life, basic genetics, biotechnology, and the principles of evolution. Students will also complete writing assignments that develop their skills as scientifically literate citizens.
Credits : 4
Principles of Biology II is the second course in a two course sequence in biology. This course continues the study of human biology with the role of endocrine and nervous systems in homeostatic regulation. Other topics covered are human reproduction, development, evolution, and advanced genetics. Ecological concepts are also discussed. The student will complete writing assignments that serve to increase knowledge of the scientific literature.
Credits : 4
CHM1010 is a survey course of general chemistry, organic chemistry and biochemistry. Fundamental concepts and principles will be presented including atomic theory, bonding, nomenclature, solutions, acids and bases, and an introduction to organic chemistry and biochemistry. Emphasis will be placed on the application of these topics in various health fields. This overview provides the health-care worker the ability to appreciate physiological and therapeutic processes at the molecular level. The course will also explore the role of chemistry in society today by applying a problem-solving approach to understanding chemistry.
Credits : 4
Arts and Humanities
Credits : 4
Social and Behavioral Sciences (choose one)
Credits : 4
Credits : 4
This course introduces students to the American Government. By examining the struggle for power-the participants, the stakes, the processes, and the institutional arenas — this course introduces the students to the political struggles that drive democracy.
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Area II Foundation Requirements: 52 credits
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Elective Pool (eight courses or 32 credit hours)
Transfer students may transfer any course to help fulfill the elective pool requirements, provided the course meets the standards of the Credit for Transcripted and Non-transcripted Work policy found in the Academic Affairs section of this catalog.
Non-transfer students, with their advisor's consultation and approval may choose courses from any department recommended and listed course or more broadly from any course offered by South University. Work from other fields must include any required prerequisite courses in the elective field.
A course can be used to meet only one requirement in the program across Areas I, II, III and IV. For example, if a course from the Area III Specialization group is completed, it cannot be used to meet an Elective requirement. Also, students should be sure to select elective courses for which they will have met the required prerequisites. Students should work with their academic advisor or counselor to be sure they are making appropriate course choices.
Credits : 4
This is the second course covering the in-depth process of the System Development Life Cycle (SDLC). This course focuses on development strategies, validation and verification testing, deployment, maintenance, and revision. Additional topics include quality management, fault tolerance, requirements feedback, and system assessment.
Credits : 4
This course is designed to provide students with a guide to future research in the field of information technology. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study.
Credits : 4
Credits : 4
This course provides an in-depth study of cloud computing technology. The course content is aligned with the curriculum of the CompTIA Cloud+ Certification. The course is design oriented, focusing on topics such as cloud architecture, virtualization, cloud services, DevOps, cloud security and reliability, and quality of service. Students will be introduced to cloud related areas of network administration, cloud delivery model considerations, cost metrics and pricing models, service quality metrics and SLAs, that are related to the day-to-day job of network administration.
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
In this course, students will be introduced to the Data Access Object (DAO) hierarchy which provides the background for the development of sophisticated relational database applications using the control-based methods and object programming methods for data. Remote Data Objects (RDO), Active Data Objects (ADO), structured query language (SQL) and how to combine SQL with Visual Basic controls will also be covered.
Credits : 4
This course guides students through the development of enterprise-quality web applications using current web development frameworks. The course adopts a step-by-step approach by example to web application development using open-source technologies, including but not limited to, HTML5, CSS3, JavaScript, Node.js, a JavaScript-based framework. In this course, students will:
- create a frontend with React
- create a backend with Node.js, Express and Mongo dB
- setting up a database with MongoDB to connect the frontend to the backend creating a full stack
The React, Express JS and Node.js combination provides tools to run web applications on both the client and the server side. Throughout the course, the students learn foundational security concepts and best practices pertaining to enterprise-quality web development, which are applied to secure end-to-end web applications from common cyber threats.
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Area III Major Requirements: 80 credits
Common Core: 32 credits
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Select One Emphasis: 48 credits
Emphasis in Comprehensive
Credits : 4
Credits : 4
Credits : 4
This is the second course covering the in-depth process of the System Development Life Cycle (SDLC). This course focuses on development strategies, validation and verification testing, deployment, maintenance, and revision. Additional topics include quality management, fault tolerance, requirements feedback, and system assessment.
Credits : 4
This course is designed to provide students with a guide to future research in the field of information technology. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study.
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Choose one course from the list below:
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Emphasis in Cybersecurity
This course covers fundamental techniques and methods of theory of computation and calculus as applied to information technology. The course utilizes the universal language of calculus to formulate and understand practical IT problems, utilizing examples and exercises pertinent to IT applications. The student gains computational knowledge and skills that are relevant and useful to IT professionals.
Credits : 4
Credits : 4
This course is designed to provide cybersecurity students with a guide to future research in the field of cybersecurity. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. This is a culmination of prior academic work and it is recommended that, at a minimum, the completion of all prior major common core curriculum courses be completed before taking this course. Students may opt to complete some, or all, of their major core courses before taking this course. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study focusing on topics pertinent to the field of cybersecurity.
Credits : 4
This course guides students through the development of enterprise-quality web applications using current web development frameworks. The course adopts a step-by-step approach by example to web application development using open-source technologies, including but not limited to, HTML5, CSS3, JavaScript, Node.js, a JavaScript-based framework. In this course, students will:
- create a frontend with React
- create a backend with Node.js, Express and Mongo dB
- setting up a database with MongoDB to connect the frontend to the backend creating a full stack
The React, Express JS and Node.js combination provides tools to run web applications on both the client and the server side. Throughout the course, the students learn foundational security concepts and best practices pertaining to enterprise-quality web development, which are applied to secure end-to-end web applications from common cyber threats.
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
This course is the first course in a two-course sequence on ethical hacking. An ethical hacker is a skilled professional who is proficient at examining vulnerabilities in target systems and applying knowledge and tools like those used by malicious hackers, but in a lawful and legitimate manner, to assess the security posture of target systems. The course covers the material needed to prepare for the Certified Ethical Hacker (CEH) certification from the International Council of E-Commerce Consultants (EC-Council). The course examines the specific network security discipline of ethical hacking from a technology-neutral perspective. In this first course, the student learns about threats, vulnerabilities, and exploitation techniques with computer systems, applications, and networks. The main topics covered include: cryptography, foot printing, scanning, enumeration, system hacking, malware, sniffers, and social engineering. The student gains knowledge through lectures and assignments, and hands-on experience through interactive practices, virtual-lab challenges and exercises that supplement the theory. The course assumes basic knowledge of network concepts and issues, computer hardware and software systems, as well as applications.
Credits : 4
Credits : 4
Cyber forensics goes beyond just analyzing computer hard drives or detecting intrusions to infrastructures. The term “cyber forensics” is the term adopted by the US Department of Defense, which indicates that the practice of forensics covers digital forensics, network forensics, and application forensics. The course is designed to be aligned with the common body of knowledge of the Computer Hacking Forensic Investigator Certification from the EC-Council. The course covers established digital forensics disciplines and new domains, such as mobile forensics. The course examines digital forensics techniques and procedures, standards and best practices, as well as legal considerations and ethics. The student learns how to obtain digital evidence that is accurate, complete, and dependable. The course also examines the application of the cyber forensics' competencies to different information security areas, such as e-discovery, malware analysis, and incident response. The course includes a direct component, which consists of demonstrations and virtual-lab assignments.
Credits : 4
Credits : 4
Emphasis in Management
ACC1001 is the first of a three-course sequence focusing on how stakeholders rely upon accounting information to assist them in their decision-making activities. ACC1001 introduces accounting as the "language of business" the tool used to communicate the effects of an organization's business activities on its income, financial position, and cash flows. The course provides an overview of the financial accounting system, including: the role of accounting in business; the format, content, and use of financial statements; the impact of transactions on the financial statements; the regulatory environment of accounting; and the accounting standard-setting process.
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Credits : 4
Choose one course from the list below:
Credits : 4
Credits : 4
This course is designed to provide students with a guide to future research in the field of information technology. The purpose of this course is to facilitate students moving into industry with an understanding of how to remain current in their field and to contribute in a research environment in further graduate study. The outcome of this course is a fundamental literature review and problem presentation suitable for further research and study.
Credits : 4
Credits : 4
Credits : 4
Credits : 4