Computer Information Systems, Cybersecurity Option, BS
Bachelor of Science in Computer Information Systems, Cybersecurity (244305BS)
- Dr. John Nicholas (firstname.lastname@example.org), 330-972-2563
- Dr. Scott Randby (email@example.com), 330-972-6094
- Mr. Stanley Smith (firstname.lastname@example.org), 330-972-6950
- CAST Advising, Polsky Building Room 203, 330-972-7220
The Computer Information Systems (CIS) offers associate and baccalaureate programs that introduce students to basic computing concepts while allowing them to develop the applied skills required the workforce. Courses start the student along the path for professional certifications. There are options, minors, and certificates available. CIS courses are taught in cutting edge computer labs so students can learn and practice skills. The CIS program offers high level training for the information technology professionals. Schedules offer a range of day and evening classes.
Department of Business and Information Technology Policy Notes
- Students must attain a “C” or better in each course in their major area (2440).
- The Department of Business and Information Technology requires a cumulative GPA of 2.0 GPA and a minimum of 15 earned credit hours for Inter- and Intra- College Transfer into all Associate and Bachelor’s degree programs.
- Prior to enrolling in classes for the B.S. degree you must contact an advisor in Polsky 301.
Graduates of the BS CIS – Cybersecurity program are expected to qualify for such positions as law enforcement professionals, computer forensic specialists, data security analysts, systems security administrators, and network security administrators in government, business, information technology, and other industries.
Transfer to the College of Applied Science and Technology
To be admitted to the College of Applied Science and Technology, a student must have a GPA of 2.0. A student can complete the transfer process through an appointment with an Academic Advisor in the college in which they reside.
The following information has official approval of the Department of Business and Information Technology and The College of Applied Science and Technology, but is intended only as a supplemental guide. Official degree requirements are established at the time of transfer and admission to the degree-granting college. Students should refer to the Degree Progress Report (DPR) which is definitive for graduation requirements. Completion of this degree within the identified time frame below is contingent upon many factors, including but not limited to: class availability, total number of required credits, work schedule, finances, family, course drops/withdrawals, successfully passing courses, prerequisites, among others. The transfer process is completed through an appointment with your academic advisor.The College of Applied Science and Technology recommends that students take the General Education courses listed in this recommended sequence. Transfer students should consult their Advisor to identify courses that are equivalent.
|2235:100||Introduction to Digital Forensics||3|
|2440:145||Introduction to Unix/Linux||3|
|2440:201||Networking Basics 1,3||3|
|2440:202||Router and Routing Basics 1,3||3|
|2020:222||Technical Report Writing||3|
|2030:152||Technical Mathematics II||2|
|2030:153||Technical Mathematics III||2|
|2440:121||Introduction of Logic/Programming||3|
|2440:203||Switching Basics and Wireless 2,3||3|
|2440:204||WAN Technologies 2,3||3|
|2040:256||Diversity in American Society||3|
|2420:263||Professional Communications and Presentations||3|
|2440:247||Hardware Support 1||3|
|Natural Science Requirement||3|
|2030:216||Applied Finite Mathematics||3|
|2040:241||Technology & Human Values||3|
|2235:281||Computer Forensic Methods 2||3|
|2440:240||Computer Information Systems Internship 2,4||3|
|2440:248||Server Hardware Support 2||3|
|2235:381||Computer Forensic Methods II||3|
|2440:340||Network Forensics I 1||3|
|Humanities Requirement 5||3|
|2235:383||Ethical Hacking 2||3|
|2440:331||Programming for Cybersecurity 2||3|
|2440:388||Advanced UNIX/Linux 2||3|
|2440:443||Network Forensics II 2||3|
|Natural Science Requirement with Lab||4|
|2235:382||File System Analysis 1||3|
|2440:300||Network Authentication and Security 1||3|
|2440:431||UNIX-based Systems Security 1||3|
|2440:442||Wireless Forensics 1||3|
|Arts Requirement 5||3|
|2040:243||Contemporary Global Issues||3|
|2440:440||Intrusion Detection 2||3|
|2440:490||CIS Senior Networking Projects 2||3|
|Arts or Humanities Requirement 5||3|
Traditionally Fall Only (See Program Contact).
Traditionally Spring Only (See Program Contact).
Course is a 7.5 week course.
Eligible students will be involved in a paid co-op experience during the summer semester of the third year of the program. Co-op positions will enhance the cybersecurity skills of students and provide them with relevant and practical work experience in the cybersecurity industry. Students must have a cumulative GPA of 3.0 or higher in their 2440, 2235, and 2030 courses at the end of the 2nd Year Fall semester and must maintain a GPA of 3.0 or higher through 3rd Year Spring semester to be eligible for the Co-op.
All students pursuing a bachelor's degree at the University of Akron must complete the General Education requirements. For efficient completion of UA General Education requirements, it is recommended that students choose an Arts or Humanities course to fulfill the Global Diversity tag for CIS bachelor's programs.
Policy Alert: By the end of your first 48 credit hours attempted, you must have completed your required General Education English, Mathematics, and Communications (Speech) requirements.
- Students entering the Computer Information Systems programs (Cybersecurity, Digital Forensics, Networking, and Programming) must pass department placement exams or complete the following bridge course prior to enrolling in the program.
- Bridge Course: 2440:105 Introduction to Computers and Application Software