Bachelor of Science in Information Technology Concentrations

Further Customize Your Degree

REQUEST INFORMATION
Ready to learn more about our programs?

Next

When you enroll in the Bachelor of Science in Information Technology, you can select from six concentrations to personalize your education: IT management, network administration, information security and assurance, programming and software development, supply chain management and logistics, or game development. A concentration is a grouping of courses designed to prepare you with specialized IT knowledge and skills. Learn more about the concentration area that best fits your desired career path.

Game Development Concentration

This concentration will prepare students with the foundational programming and game development elements necessary to pursue a career in game design.

  • Concentration Overview

    Game development and design techniques can be applied to a wide variety of creative projects or business training activities.

    As a graduate of the program, you’ll be prepared for the workplace with practical skills, including:

    • Use gamified experiences to create recreational or business-related training resources. 
    • Comprehend game design features including storylines, role-play mechanics, and character profiles for a new game or interactive experience. 
    • Implement challenges, puzzles, and scenarios to be encountered in game play.

    Real-World Connections

    • Game development crosses industries from the traditional recreational usage of games for entertainment to the use of gamification in nongame environments to include websites, training or learning management systems, or business-related activities intended to increase employee or customer engagement.
  • Course Outcomes

    Software Development Concepts

    • Create fundamental programs using concepts such as declaring and initializing variables and constants.
    • Create fundamental programs using concepts such as decision statements and iteration.
    • Create plans for programs using an understanding of historical development of programming techniques and appropriate modeling techniques.
    • Create fundamental programs using concepts such as functions and arrays.
    • Apply the debugging and testing processes to programs containing fundamental concepts such as decision statements, iteration, functions, and arrays.

    Software Design and Development Concepts

    • Explore various software process models.
    • Compose software using advanced interface and program design techniques.
    • Select appropriate secure data handling techniques.
    • Construct Software Test Plan for Validation and Verification of Design Requirements.
    • Examine Object Oriented Programming Concepts.

    Game Design and Mechanics

    • Create a complete game design document based on an actual or planned video game.
    • Define the roles of the game development team.
    • Use industry recognized game mechanics in the development of a video game concept.
    • Develop a significant part of a storyboard for a video game, actual or planned.
    • Develop the gameplay for a video game concept.

    Game Programming

    • Develop a basic video game using the Unity game engine environment.
    • Apply sound to a video game.
    • Employ event-driven coding in a video game.
    • Use a testing plan in the development of a video game.
    • Create gameplay documentation for video game users.

    Game Art and Animation

    • Use graphics software in the process of game development.
    • Apply animation to a video game.
    • Explain the 12 steps of animation.
    • Modify several aspects of a video game using graphics software.
    • Create a logo for the video game.
  • Job Outlook for Careers in Game Development

    According to the Bureau of Labor Statistics, the outlook for software developers, such as game development specialists, is 25% faster than average.

Information Security and Assurance Concentration

The Bachelor of Science in Information Technology with a concentration in information security and assurance is designed to expose you to the field of computer forensics. By gaining an understanding of basic network administrative principles, you can begin to grasp the subtleties within the operational field of cybersecurity.

  • Concentration Overview

    Computer forensics is especially important to businesses. Digital forensic specialists are often called on to investigate, identify, and document the occurrence of computer crime.

    As a graduate of the program, you’ll be prepared for the workplace with practical skills, including:

    • Basic network administration
    • Data analysis to prevent identity theft and fraud
    • Installation and use of intrusion-detection system tools
    • Security threat analysis

    Real-World Connections

    Through exposure to incident response practices and procedures dedicated to analyzing and tracking intrusions, you will gain a practical understanding of the policies that govern information systems security, as well as the practices of computer forensics.

    Professional Competencies of Graduates

    Courses within the information security and assurance concentration could help students develop the following skills:

    • Formulate innovative solutions for identified initiatives.
    • Assess the value of multiculturalism and diversity in a global environment.
    • Contribute to team goals and objectives through active participation and collaboration.
    • Engage in career development and advancement strategies, including effective networking, mentoring, and creating a personal brand.
    • Achieve goals through planning and prioritization.
  • Course Outcomes

    Network Administration

    • Examine the features, editions, roles, and installation methods of a network operating system.
    • Administer server roles, features, storage options, file and print services, and file and folder permissions.
    • Configure Active Directory including domains, organizational units, user accounts, and group policy while ensuring compatibility with global networks.
    • Configure TCP/IP, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol) on a network server.
    • Manage virtualization using Hyper-V.

    Networking With TCP/IP

    • Examine the TCP/IP networking model, IPv4 and IPv6 addressing, and basic IP packet structures.
    • Explore the protocols that operate at the lower layers of the TCP/IP model.
    • Analyze IPv6 Neighbor Discovery, addressing, and name resolution on IP networks.
    • Examine TCP/IP Transport Layer Protocols.
    • Differentiate between IPv4 and IPv6, regarding deployment, benefits, and IP security.

    Computer Forensics

    • Examine the relationship between computers and criminal behavior.
    • Describe the field of computer forensics and investigations as a profession.
    • Analyze the processes involved in computer forensics.
    • Examine various data acquisition methods.
    • Compare current computer forensic tools.
    • Describe techniques of data analysis and validation to recognize identity theft and fraud.

    Intrusion Detection and Incidence Response

    • Discuss intrusion detection and incident response principles and concepts.
    • Compare intrusion detection systems.
    • Analyze the security threat spectrum.
    • Demonstrate the ability to install and configure intrusion-detection system tools.
    • Interpret various security analytic measures.
    • Differentiate incident response strategies.

    Digital Forensics

    • Examine digital forensics concepts and techniques.
    • Plan appropriate methods to secure digital evidence.
    • Apply various types of forensic analysis tools for data recovery to forensic scenarios.
    • Prepare audits and investigations of electronic computing devices.
    • Analyze forensic data from computers to investigate security breaches.
    • Investigate current practices and trends in digital and network forensics.

    Information Systems Security

    • Examine information security concepts.
    • Analyze system vulnerabilities and threats.
    • Choose data encryption techniques and confidentiality best practices.
    • Employ solutions that provide protection against system attacks.
    • Develop information backup and data persistence procedures.
    • Design network security policies and procedures.

    Professional Certification Information Websites

    Learn more about external certifications associated with this concentration:

  • Job Outlook for Careers in Information Security and Assurance

    According to the Bureau of Labor Statistics, information security analyst is projected to be one of the top 10 fastest-growing occupations from 2021 to 2031.

IT Management Concentration

This concentration provides you with the flexibility to customize your degree. You can select from a wide variety of courses to enhance your education.

  • Concentration Overview

    As a graduate of the Bachelor of Science in Information Technology program with a concentration in IT management, you could be prepared for the workplace with advanced skills or certification preparation in several areas:

    • Preparation for CISSP or CEH certifications
    • Advanced skills in cloud computing, project management, Linux or Windows operating systems, routing and switching, computer forensics, and security

    Real-World Connections

    As part of the IT management concentration, you will become familiar with advanced concepts that build on the foundational skills learned in your degree plan and help you to specialize in specific areas of IT. The courses available in the concentration can provide you with skill sets that could prepare you for roles beyond entry-level positions.

    Professional Competencies of Graduates

    Courses within the IT management concentration can also help you develop the following skills:

    • Leadership and communication
    • Problem solving and critical thinking
    • Teamwork
    • Personal presentation
    • Appreciation of concepts of multiculturalism and diversity
  • Course Outcomes

    (Students must choose at least four of the following to complete the concentration)

    Certified Ethical Hacking I

    • Interpret network and reconnaissance results.
    • Describe steps and techniques to perform enumeration, scanning, and packet capture.
    • Produce network and web server attacks.
    • Produce wireless attacks and malware.
    • Explain encryption and social engineering attacks.

    Certified Information Systems Security Professional I

    • Examine the three pillars of cybersecurity: confidentiality, integrity, availability.
    • Explain information and asset classification.
    • Differentiate multi-level data security controls.
    • Distinguish access control, integrity, and information flow security models.
    • Differentiate various security evaluation criteria.

    Certified Information Systems Security Professional II

    • Examine engineering processes and secure design principles.
    • Analyze symmetric and asymmetric cryptosystem fundamentals.
    • Apply secure design principles to network architecture.
    • Identify network attacks and mitigation responses.
    • Describe security in the software development lifecycle.

    Linux Security

    • Configure a Linux installation.
    • Explain rules and procedures of a penetration testing program.
    • Illustrate the scope and information gathering processes for a target environment.
    • Apply the target discovery process.
    • Apply the target enumeration process.
    • Analyze the security vulnerabilities in a targeted environment.

    Windows Enterprise Administration

    • Install Windows 2012 operating system into a virtual machine or hardware chassis.
    • Configure Windows 2012 operating system including administration tools.
    • Configure Active Directory and policy functions in a new domain on Windows 2012 operating system.
    • Configure network services and components.
    • Implement network policy and monitoring to specific situations.
    • Apply security functions in Windows 2012 operating system.

    Intrusion Detection and Incidence Response

    • Discuss intrusion detection and incident response principles and concepts.
    • Compare intrusion detection systems.
    • Analyze the security threat spectrum.
    • Demonstrate the ability to install and examine intrusion detection system tools.
    • Interpret various security analytic measures.
    • Differentiate incident response strategies.

    Certified Ethical Hacking II

    • Conduct social engineering and physical security attacks.
    • Illustrate Trojans, malware, and cryptology attacks.
    • Devise web server and web application attacks.
    • Prepare wireless network attacks.
    • Formulate organizational cyber threat mitigation procedures.
    • Develop an ethical hacking plan to test an organization’s cybersecurity posture.

    Project Management II

    • Plan project resources.
    • Examine the project management knowledge areas.
    • Assess project work.
    • Demonstrate the ability to manage project teams.

    Certified Information Systems Security Professional III

    • Discriminate assessment and test strategies.
    • Analyze security control testing.
    • Examine foundational security operations concepts.
    • Determine incident prevention and response strategies.
    • Generalize key issues related to disaster recovery planning and physical security.
    • Distinguish legal issues and professional ethics in information security.

    Digital Forensics

    • Examine digital forensic concepts and techniques.
    • Plan appropriate methods to secure digital evidence.
    • Apply various types of forensic analysis tools for data recovery to forensic scenarios.
    • Prepare audits and investigations of electronic computing devices.
    • Analyze forensic data from computers to investigate security breaches.
    • Investigate current practices and trends in digital and network forensics.

    Information Systems Security

    • Examine information security concepts.
    • Analyze system vulnerabilities and threats.
    • Choose data encryption techniques and confidentiality best practices.
    • Employ solutions that provide protection against system attacks.
    • Develop information backup and data persistence procedures.
    • Design network security policies and procedures.

    Routing and Switching II

    • Prepare an IP scheme for a small network to submit for management approval.
    • Configure routing and switching devices per plans and specifications.
    • Explore advanced network routing and switching concepts.
    • Prepare network designs based on specific criteria.
    • Prepare a disaster recovery plan for a routed infrastructure.
    • Prepare routing and switching proposals for management approval.
  • Job Outlook for Careers in IT Management

    The Bureau of Labor Statistics projects that employment of computer and information systems managers is projected to grow 16% from 2021 to 2031, much faster than the average for all occupations. Demand for computer and information systems managers may increase as firms expand their operations to digital platforms.

Network Administration Concentration

The Bachelor of Science in Information Technology with a concentration in network administration is designed to help you understand the main features, roles, and design of a network operating system.

  • Concentration Overview

    As a student, you’ll explore the critical functions of network and system administrators, including how to configure Active Directory, creating and monitoring user accounts, group policies, and domains. You will gain a solid foundation in the basic concepts, protocols, and functions of network routers and switches.

    Upon graduation, you will be prepared for the workplace with practical skills, including:

    • Installing and configuring network servers
    • Select-analyzing and troubleshooting TCP/IP protocol suite
    • Implementing network security and broad-based monitoring
    • Designing, configuring, and maintaining network routing and switching

    Real-World Connections

    With the background provided by the network administration concentration, you’ll be equipped to perform essential network support tasks. Possible positions include Level 1 and Level 2 tech support, as well as entry-level membership into network administrator teams. As part of this concentration, you will complete hands-on labs and projects that help you develop the skills you’ll need for the workplace.

    Professional Competencies of Graduates

    Courses within the network administration concentration could help students develop the following skills:

    • Formulate innovative solutions for identified initiatives.
    • Achieve goals through planning and prioritization.
  • Course Outcomes

    Network Administration

    • Examine the features, editions, roles, and installation methods of a network operating system.
    • Administer server roles, features, storage options, file and print services, and file and folder permissions.
    • Configure Active Directory including domains, organizational units, user accounts, and group policy while ensuring compatibility with global networks.
    • Configure TCP/IP, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol) on a network server.
    • Manage virtualization using Hyper-V.

    Networking With TCP/IP

    • Examine the TCP/IP networking model, IPv4, and IPv6 addressing and basic IP packet structures.
    • Analyze the protocols that operate at the lower layers of the TCP/IP model.
    • Analyze IPv6 Neighbor Discovery, and addressing and name resolution on IP networks.
    • Examine TCP/IP Transport Layer Protocols.
    • Differentiate between IPv4 and IPv6, regarding deployment, benefits, and IP security.

    Windows Enterprise Administration

    • Install Windows 2012 operating system into a virtual machine or hardware chassis.
    • Configure Windows 2012 operating system including administration tools.
    • Configure Active Directory and policy functions in a new domain on Windows 2012.
    • Configure network services and components.
    • Implement network policy and monitoring to specific situations.
    • Apply security functions in Windows 2012 operating system.

    Routing and Switching I
    Routing and Switching II

    • Explain network routing and switching concepts.
    • Estimate an IP addressing scheme based on business needs.
    • Apply router and switching configurations to meet business needs.
    • Investigate network routing protocols to meet business requirements.
    • Design VLANs based on specific situations.
    • Prepare routing and switching proposals for management approval.
    • Prepare network designs based on specific criteria.
    • Prepare a disaster recovery plan for a routed infrastructure.

    Professional Certifications Information Websites

    Learn more about external certifications associated in this area:

  • Job Outlook for Careers in Network Administration

    According to the Bureau of Labor Statistics, employment of computer network architects is projected to increase from 2021 to 2031.

Software Development Concentrations (available in C#, Java, Python, and Web Languages)

The Bachelor of Science in Information Technology offers four concentrations in software development, providing you with an in-depth understanding of different programming languages. Choose between software development using C#, software development using Java, software development using Python, or software development using web languages. You’ll study a wide variety of platforms, including web, mobile, and traditional applications.

  • Concentration Overview

    As a student, you’ll learn the fundamental, intermediate, and advanced concepts of software development. In each course, you’ll have the chance to apply these concepts in one or more programming languages, including C#, Java, Python, JavaScript, and PHP.

    This concentration includes a mini-capstone where teams of students use their software development skills to create a real-world application.

    Upon graduation, you’ll be prepared for the workplace with practical skills, including:

    • Developing stand-alone computer programs
    • Developing mobile applications
    • Developing websites
    • Debugging computer programs
    • Maintaining computer programs
    • Working with teams to create applications

    Real-World Connections
    Students who complete this program will have created a working mobile application and have worked with a team to create an application that may be marketed to the general public.

    Professional Competencies of Graduates
    Courses within the concentration could help students develop the following skills:

    • Leadership and communication
    • Problem solving and critical thinking
    • Personal presentation
    • Understand concepts of multiculturalism and diversity
  • Course Outcomes

    Depending on your chosen concentration, course outcomes may include:

    • Develop fundamental programs using concepts such as declaring and initializing variables and constants.
    • Create fundamental programs using concepts such as decision statements and iteration.
    • Devise plans for programs using an understanding of historical development of programming techniques and appropriate modeling techniques.
    • Build fundamental programs using concepts such as functions and arrays.
    • Apply the debugging and testing processes to programs containing fundamental concepts such as decision statements, iteration, functions, and arrays.
    • Explore various software process models.
    • Compose software using advanced interface and program design techniques.
    • Select appropriate secure data handling techniques.
    • Construct software test plan for validation and verification of design requirements.
    • Examine object-oriented programming concepts.
    • Apply the common linear structures of lists, stacks, and queues.
    • Develop procedures to solve data structures and algorithm problems.
    • Analyze best practices for interactive user interface design.
    • Analyze the client/server relationship.
    • Evaluate web services.
    • Design interactive web applications or mobile applications.
    • Describe distributed and collaborative development concepts.
    • Implement a database schema with security and optimization.
    • Plan system testing and quality assurance activities.
    • Implement algorithms that allow analysis and optimization.
    • Integrate the best practices of software development.
    • Prepare software for distribution.
    • Determine agile development practices.
    • Engage in agile project teamwork and communication.
    • Demonstrate software development skills in a continuous integration environment.
    • Apply integration and system testing skills in an agile environment.
    • Create a software application from a concept to a finished product.
    • Create a distribution package of software product for release to end-users.

    Professional Certifications
    Learn more about external certifications associated with this concentration:

    • C#—Microsoft Certified System Developer
    • Java—Oracle Certification
    • Web Languages—W3Schools Certification
  • Job Outlook for Careers in Programming and Software Development

    According to the Bureau of Labor Statistics, employment of web developers and software developers is expected to grow faster or much faster than average for all occupations from 2021 to 2031.

Supply Chain Management Concentration

The supply chain management and logistics concentration prepares you for the planning and management activities involved in sourcing, conversion, and logistics management. In addition, you will learn to apply the qualitative and quantitative methodologies used in global supply chain management.

Purdue Global is a member of the SAP University Alliances program.

  • Concentration Overview

    Students will develop knowledge of the procurement, maintenance, and transportation of materials, facilities, and personnel, and apply qualitative and quantitative methodologies used in global supply chain management.

    Graduates of the Bachelor of Science in Information Technology with a concentration in supply chain management and logistics are prepared with practical skills for the workplace, including:

    • Purchasing and managing inventory
    • Negotiating contracts and agreements
    • Validating supplier credentials
    • Working remotely with colleagues
  • Course Outcomes

    Global Supply Chain Management

    • Analyze the role of customers and locations for effective supply chain networks.
    • Evaluate supply issues in supply chain management.
    • Analyze how supply chain distribution impacts effectiveness.
    • Examine operational issues in supply chain management.
    • Analyze the performance of the supply chain network.
    • Discuss the significance of supply chain management in a global organization.

    Logistics and Distribution Management

    • Evaluate how risk management helps mitigate distribution and supply chain problems.
    • Recognize information flow and decision making in the distribution network.
    • Discuss how to align logistics with business strategy.
    • Examine methods to measure and manage logistics performance.
    • Recommend how logistics can be coordinated to ensure customer value.
    • Understand the role of distribution within the global pipeline.

    Operations Management

    • Examine the purpose of forecasting and inventory management.
    • Discuss supply chain management and global supply chain concepts.
    • Develop a facility design within an operations management environment.
    • Create a product and service design within an operations management environment.
    • Evaluate the business concepts of quality management and lean systems.
    • Compare project management and human resource principles to operation management.

    Purchasing and Vendor Management

    • Apply analytical methods to increase purchasing effectiveness.
    • Evaluate supply chain connectivity and effectiveness.
    • Examine the mechanisms of establishing formal relationships with vendors.
    • Analyze methods for developing a global network.
    • Discuss the role and mechanisms of the purchasing function in an organization.
    • Examine the strategic impact and significance of the purchasing function.

    Strategic Warehouse Management

    • Apply package and handling concepts within a warehouse management environment.
    • Understand the impact of inventory on warehouse management.
    • Apply risk management and sustainability concepts to warehouse management.
    • Understand how operations analysis provides tools for overcoming issues and challenges.
    • Analyze physical flows and transportation options that support warehouse operations.
    • Examine the role of warehouse management within the global supply chain.

    Quality Management

    • Evaluate how TQM strategies impact service delivery.
    • Propose leadership and teamwork strategies in business organizations.
    • Understand the impact of total quality management (TQM) principles on organizations.
    • Compare appropriate TQM tools and performance measures used in management.

    Professional Certifications

    Learn more about external certifications associated in this area:

    • SCPro™ Certification
    • Certified Professional in Supply Management
  • Job Outlook for Careers in Logistics/Supply Chain Management

    The Bureau of Labor Statistics reports that employment of logisticians is projected to increase 28% from 2021 to 2031, more than 5 times the average for all occupations.

Your Path To Success Begins Here

Connect with an Advisor to explore program requirements, curriculum, credit for prior learning process, and financial aid options.

NOTES AND CONDITIONS

Certification and Licensure: Students are responsible for understanding the requirements of optional certification exams. The University cannot guarantee students will be eligible to sit for or pass exams. In some cases, work experience, additional coursework beyond the Purdue Global program, fieldwork, and/or background checks may be necessary to be eligible to take or to successfully pass the exams. You must pass an additional exam offered by independent certification agencies to become certified in this field. For more information, consult an Admissions Advisor.

Employment and Career Advancement: Purdue Global does not guarantee employment placement or career advancement. Actual outcomes vary by geographic area, previous work experience, and opportunities for employment.

Job Growth Projections: National long-term projections may not reflect local and/or short-term economic or job conditions, and do not guarantee actual job growth