Associates in Technology
ACIU has two tracks for an Associates degree in the Department of Technology.
Both tracks establish the foundation to attain a four-year Bachelor’s degree.
Associate of Information Systems Technology
The Associates in Information Systems Technology (AIST) curriculum introduces students to concepts surrounding the virtualization of systems and networks as well as the emerging technologies used to handle and deliver media-rich information to individuals, businesses, and institutions around the globe. The AIST program provides students the skills and knowledge required to administer and manage local and wide area networks in multiple environments.
Topics include computing architecture, information storage, and systems administration, how to implement private, public, and hybrid clouds, how to securely interconnect and distribute information through various networks, and how to scale, administer, and manage systems.
The AIST curriculum provides students with the technical background, as well as the general education courses, needed for the Bachelor of Science in Information Systems Technology.
Join us as we delve into the exciting world of computer science, cultivating the skills needed to thrive in a technology-driven society. Welcome to the Computer Science Associate Degree program at our virtual university, where the future of innovation begins!
Computer Science (20)
Most programs are 20 Courses and 60 Credit Hours
Course ID | Course Name | Hours |
---|---|---|
Area I: English | ||
ENG 101 | English Composition I | 3 |
ENG 103 | Business English for Professionals | 3 |
ENG 102 | Research Methods | 3 |
Area II: Mathematics | ||
MTH 102 | Algebra I | 3 |
MTH 232 | Foundations of Quantitative Reasoning | 3 |
MTH 231 | Statistics I | 3 |
Area III: Humanities | ||
Any | Humanities (any) | 3 |
Area IV: Business | ||
BUS 110 | Communication | 3 |
BUS 131 | Business Ethics | 3 |
Area V: Technology Core Requirements | ||
TCH 111 | Computer Programming I | 3 |
TCH 112 | Computer Networks | 3 |
TCH 121 | Artificial Intelligence and Machine Learning | 3 |
TCH 124 | Introduction to Application Servers | 3 |
TCH 132 | System Administration | 3 |
TCH 141 | Fundamentals of Web Development | 3 |
TCH 211 | Computer Programming II | 3 |
TCH 221 | Information Security and Assurance | 3 |
TCH 232 | Network Infrastructure Management | 3 |
TCH 143 | Cloud Networking | 3 |
Area VI: Electives | ||
Elective 1 | Elective Courses (1) | 3 |
Elective 2 | Elective Courses (2) | 3 |
Total Credits: | 60 |
Elective Courses (2)
- MGT/316T: Managing with a Global Mindset
- ETH/321T: Ethical and Legal Topics in Business
- MA/301T: Martial Art I
Information Technology
Department Chairperson: Roberto Salguero
Program Director: John Lohrentz. MISM.
Faculty: John Lohrentz. MISM.
Description
The Information Technology (Minor) is designed to prepare students for a professional career in the field of information technology whereby students will demonstrate competencies to pass the CompTIA certification and the Cybersecurity Analyst Certification (CySA+). Graduating students will be prepared for information technology careers managing a diverse group of employees, a wide range of operations, while strategically applying their knowledge, skills, abilities and professional dispositions in the area of cybersecurity.
Program Outcome Objectives
- Develop a risk assessment using case studies and propose a range of mitigation techniques and tools. Prepare students to manage people more effectively in the information technology industry.
- Evaluate penetration testing, vulnerability scanning, endpoint protection, social engineering vulnerabilities, and assessment tools.
- Design a risk assessment as required including recommendations on both HIPAA and PCI DSS
- Assess risks involved and defend how to secure privileged accounts.
- Evaluate regulatory compliance and evaluate HIPAA, PCI DSS and SOx.
- Compose a strategic business plan, incorporating principles from all six courses.
Minor in Cybersecurity (18 hours)
The following courses are required:
- CBRS 310 Introduction to Cybersecurity and Risk Analysis
- CBRS 350 Threat and Vulnerability Management
- CBRS 370 Security Operations, Assessments and Compliance
- CBRS 380 Security of Systems and Software
- CBRS 440 Risk Mitigation, Frameworks, Strategies, Policies and Procedures
- CBRS 470 Management and Leadership in Cybersecurity
Industry Leading Skills
Nullam faucibus purus est, ac maximus massa pharetra posuere. Sed porttitor quam eget odio rhoncus, quis commodo erat commodo. Vivamus velit elit, finibus non lectus sed, blandit ultrices dui. Interdum et malesuada fames ac ante ipsum primis in faucibus. In et metus eget nibh interdum mattis. Pellentesque leo massa, posuere vitae mauris a, iaculis dapibus ligula. Nunc in orci id felis eleifend vestibulum. Nulla facilisi. Donec elementum varius turpis quis posuere.
Fusce nec elit ut lorem tristique consectetur et at metus. Aliquam eros mauris, aliquet nec urna consectetur, condimentum ultricies nunc. Nam tincidunt est ac ante elementum tincidunt. Phasellus nisi orci, tristique eu blandit eu, lobortis vitae velit. Nullam cursus arcu eget placerat lacinia. Nulla facilisi. Donec elementum varius turpis quis posuere.
Build Your Future With Avada Education
Suspendisse sapien mauris, consequat nec pellentesque at, pharetra feugiat tortor. Donec lobortis lacinia mauris, luctus scelerisque ligula semper eu. Donec dictum et elit porttitor tincidunt. Duis leo nibh, accumsan vitae nibh id, mollis convallis nisl. Mauris varius cursus lorem at eleifend. Phasellus imperdiet, libero vel consectetur aliquam, justo massa feugiat dolor, id blandit nibh elit eget tortor. Sed lorem ipsum, rhoncus quis congue in, tristique id erat. Nunc ac congue mi. Curabitur ante ex, posuere quis tellus quis, convallis scelerisque dolor. Integer eu purus ut augue consectetur aliquet. Aliquam eu tortor gravida, elementum.
Nullam venenatis justo a porta faucibus. Sed accumsan nisl eget ligula iaculis tristique. Nulla eget bibendum neque. Duis eu rutrum augue. Sed quis feugiat felis. Curabitur non ornare urna, vel congue mauris. Nam tincidunt mattis ligula, non pharetra turpis posuere a. Nulla aliquet vitae quam vitae commodo. Cras ut metus nibh. Suspendisse congue velit dui, quis dictum tortor tincidunt. Aliquam vestibulum, quam nec elementum cursus, justo purus varius nisl, iaculis mattis lectus enim quis augue.