
Computer Information Technology: Cybersecurity
Bachelor of Science
Request Information
Program Intro
As a computer information technology major, you’ll take courses that span knowledge areas including computational thinking, programming, networking technologies, operating systems, information assurance, web systems technology and database design and implementation.
Department of Computer Information Technology and Graphics
Based on a 2017 Global Information Security Workforce Study, the increase of annual workforce demand in cybersecurity in North America is 21 percent. Cybersecurity Ventures projects 3.5 million unfilled cybersecurity jobs by 2021.
Our program is designated a National Center of Academic Excellence (CAE-4Y) in Cyber Defense Education by the NSA and DHS.
Curriculum Overview
Our program blends theory, applied research and experiential learning in all the vital aspects of IT, including networking, database administration, security and project management.
The cybersecurity concentration provides the specialized training you need for a career in this complex, in-demand field.
First year courses covers pervasive themes in IT, organization issues, and history of IT, IT and its related informing disciplines, application domains, computer math, and other IT topics.
Sample Courses
- ITS 10000 – Information Technology Fundamentals
- ITS 13500 – Operating Systems Technologies
- ITS 14000 – Introduction To Computer Algorithms And Logic
Your second year covers in-depth discussions of object-oriented programming and application development through integration.
Sample Courses
- ITS 24500 – Integrative Programming
- ITS 26000 – Applied Database Technologies
- ITS 27000 – Internetworking Technologies
Topics include confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, and encryption. Extensive laboratory exercises are assigned.
Sample Courses
- ITS 35000 – Systems Assurance
- ITS 35200 – Disaster Recovery And Planning
- ITS 36000 – Distributed Application Architecture And Design
In your final year, you’ll cover defensive programming techniques, bounds analysis, error handling, advanced testing techniques, detailed code auditing, and software specification in a trusted assured environment.
Sample Courses
- ITS 45400 – Assured Systems Design And Implementation
- ITS 47200 – Network Design And Implementation
- ITS 49000 – Senior Project Undergraduate Research
Highlights
Cybersecurity workforce development is the key to assuring that the nation has adequate capacity to protect information and information systems.
This quickly growing field is both challenging and competitive. At PNW, we provide the tools you need to stand out, including US government-recognized curriculum and individualized attention from instructors.


Outcomes
Through classroom and lab interaction with experienced faculty, applied research and experiential learning, you’ll begin your professional work with the confidence and knowledge to be successful in a dynamic, competitive field.
Scholarships
There are a number of scholarships available for students in this program, including:
- NSF CyberCorp SFS (Scholarship for Service)
- Department of Defense Cyber Scholarship Program
Beyond the Classroom
We encourage you to get involved in activities like:
- IT Club
- Cyber-Security Club
- Cyber-Incident Response Club
Career Paths
This degree prepares you for a number of careers in the field, including:
- Software developer
- Computer security specialist
- Network and system administrator
- Information technology architect
Employers
Our alumni work with some of the most innovative organizations across the region and around the world, including:
- Community Healthcare System
- Arcelor Mittal
- NiSource
- Cerner Corporation
Accreditation
Our Computer Information Technology programs accredited by the Computing Accreditation Commission (CAC) of ABET. This ensures that the program is independently reviewed and meets the quality expectation for that profession.
Meet the Faculty

Take the Next Step
See how a PNW degree opens doors, from corporate boardrooms to non-profit leadership.