Compare 102 Bachelor Programs in Information Technology
A Bachelor IT degree is an undergraduate degree requiring three to five years of study and is valuable in today's technology based environment. A Bachelor IT degree program will provide individuals with the necessary skills and knowledge to meet the demands of this fast paced career.
Bachelor IT programs focus on computers and technology but also incorporate management with information theory. This degree concentrates more on the business and communication aspect of computing and provides more emphasis on relevant IT themes of today: e-commerce, e-business and business information. Professionals with Bachelor IT degrees can have excellent career opportunities and many career advancement possibilities. Information technology is in almost every industry and a growing trend for qualified IT specialists is being seen in healthcare and academia.
As the world becomes more technological every day, well-trained IT professionals are needed. Excellent career opportunities and placements are available and a Bachelor IT degree will set you on a path for success. Read below for more information and to find the program you are searching for!
BS in cyber security engineering focuses on safeguarding existing systems and building resilient new ones.
Become a cyber superhero. Technology and the sustained flow of information now touch every part of our daily lives. Attacks on our interconnected financial networks, utility systems, and lines of communication, if successful, can be crippling to the pulse of organized society. Concern about the global threat of cyber-terrorism led the Volgenau School of Engineering to design the only degree of its kind in the country. BS in cyber security engineering focuses on safeguarding existing systems and building resilient new ones.
Students who earn their degree from the first such program in the U.S. will be uniquely positioned for high-demand careers protecting physical systems from cyber attacks. Graduates will find jobs in government, defense, transportation, telecommunications, or almost any field they choose. The first class entered in 2014 and local employers such as the Advanced Physics Laboratory of Johns Hopkins University and Northrop Grumman are already courting these students for internships....
South-Eastern Finland University of Applied Sciences, XAMK
In our Information technology program, you focus on computer networking and implementation services in a modern data center environment. You learn to build secure Interne
study places 25
location Mikkeli, Finland
duration of studies 4 years
next application periods: 9.-23.1.2019, 20.3.-3.4.2019
tuition fee: for non-EU/EEA citizens 6000 euros,
scholarship scheme and further information www.xamk.fi/tuition-fees
Two application periods
Application period 1: 9.-23.1.2019
Entrance examinations outside Finland through FINNIPS network.
Application period 2: 20.3.-3.4.2019
Entrance examinations in Finland.
Find and utilize your personal strengths as a future IT-Engineer
The Information technology (IT) program allows you to join the developers of the future.
The IT program gives you a solid foundation on IT and allows you to specialize in the field of your own interest with personal skills development studies. With this method, you can find and utilize your personal strengths as a future IT engineer....
Students can major in Cybersecurity and receive a Bachelor of Science degree in Cybersecurity. You may also major in any other discipline at the university and minor in C
Major or Minor in Cybersecurity
Students can major in Cybersecurity and receive a Bachelor of Science degree in Cybersecurity. You may also major in any other discipline at the university and minor in Cybersecurity. (Examples: Criminal Justice major and Cybersecurity minor, or Graphic Design major and Cybersecurity minor.)
Co-Major in Cybersecurity
Students in the Teacher Education program may select Cybersecurity as their Arts & Sciences co-major.
Students majoring in Cybersecurity have the option to pursue a double major with any discipline at the university. (Example: Major in both Criminal Justice and Cybersecurity.)
Certificate in Cybersecurity
If you are majoring in another discipline and have an interest in Cybersecurity, you may receive certification in Cybersecurity by taking six courses through the Computer Science Department....
The IT field offers countless opportunities to young creative people, who master the foundations and technologies used to build new applications and systems.
Qualification: Bachelor of Engineering
Length & duration: 4 years, 240 credits
Software and communication methods are changing the way individuals and organisations do their daily activities. In all areas of life, there is space for innovations that help people to do things in a better way by using IT technologies - our world can become more user-friendly, more economical, and more productive and less energy dependent.
The degree programme in Information Technology provides you with extensive knowledge of software engineering and communications. You acquire the skills required in building new applications and systems that respond to customer needs. In addition to regular courses, we offer students real world projects where they can challenge themselves.IT Engineering studies consist of basic studies and professional studies in software and communications fields. You need to both to both real-world problems with software and IT systems....
The Computing major with Cybersecurity concentration provides a comprehensive coverage of technical, legal, and managerial topics in the field. The concentration enables
Bachelor in Cybersecurity
Build a Solid Foundation in Cybersecurity
SRU prepares students with technical and managerial skills needed by technology companies
Offered by: Computer Science
The Computing major with Cybersecurity concentration provides a comprehensive coverage of technical, legal, and managerial topics in the field. The concentration enables the students to build a solid technical foundation with the courses in programming, databases, computer networks, and computer forensics. The concentration also introduces students to security specific areas such as fraud, risk assessment while providing students with the big picture of security management. Graduates of the concentration will have both technical skills and managerial qualities to work in IT departments or security consulting companies....
As a cybersecurity major, students learn skills and techniques that will prepare them for success in their careers or graduate studies. Cybersecurity is the protection of
Why major in cybersecurity?
As a cybersecurity major, students learn skills and techniques that will prepare them for success in their careers or graduate studies. Cybersecurity is the protection of infrastructure, systems, devices, networks, information, and applications from attacks, damage, loss, or unauthorized access through appropriate technologies, practices, and techniques. The program will focus on general computer science skills, and the necessary skills to create, develop, and deploy secure computer-based systems.
Graduates will have skills and expertise related to cybersecurity including the prevention and detection of cyber attacks on computer-related infrastructure within an organization. Students will have a broad understanding of computer systems including hardware, networks, operating systems, information assurance, and programming. Students will also have skills related to computer security policy and its implementation as well as a relevant understanding of social engineering as a means of computer vulnerability....
The Bachelor of Information Technology (BIT) program prepares students to compete in the rapidly expanding job market, to contribute to the intellectual body of knowledge
Bachelor of Information Technology
The Bachelor of Information Technology (BIT) program prepares students to compete in the rapidly expanding job market, to contribute to the intellectual body of knowledge, and to engage with their communities. BIT is a 120-credit program that immerses students in the latest concepts and practices related to the manipulation, transmission, and storage of electronic data. BIT program accepts all courses earned in the AASIT program, adding the last of Georgia's General Education Core classes, a set of upper-division IT core and elective classes, and a concentration in either Database Administration, Networking and Security, or Informatics. BIT program attracts students seeking to pursue a career in any field related to information technology, including but not limited to IT Administration, Web Development, and Cybersecurity....
This programme is aimed at providing students with a wide range of knowledge, concepts and applications of information and communication technology to develop problem-sol
This programme is aimed at providing students with a wide range of knowledge, concepts and applications of information and communication technology to develop problem-solving skills using Information and Communication Technology (ICT). It also provides students with opportunities to appreciate the impact of ICT on knowledge-based society and equips students with pedagogical knowledge, subject knowledge, values, skills and practice essential to teach ICT.
On completion of the programme, students are expected to be able to:
demonstrate an understanding of basic concepts in major areas of ICT and use a range of application software to support information processing and problem-solving;
demonstrate an understanding of methods for analysing problems, and planning and implementing solutions using ICT;
realise the social, ethical and legal issues pertaining to the use of ICT and appreciate how information literacy and the sharing of knowledge using ICT influence decision-making and shape our society; and
learn to connect ICT knowledge to the teaching of ICT and develop approaches to help students to learn ICT in exciting and effective ways.
Credit points (cps)
Major (including an Interdisciplinary Course and Research Methods)
Education StudiesEducation Studies Core (Generic)
Pedagogy for Major
Final Year Project (Honours Project / Capstone Project)
Electives (including Free Electives, Minor or Second Major)
Assumption’s Bachelor of Science in Cybersecurity offers a technology-based education, using methods in computing and information science, engineering, social science and
Cyberspace is a dynamic and evolving ecosystem, with complex, multifaceted networks that connect individuals, organizations and national and international entities. However, cyberspace's expansion presents new weaknesses to exploit, making it vulnerable to intrusion and exploitation. Cyber threats and vulnerabilities have grown exponentially with the explosion of technology and connectedness, affecting individuals, organizations, and nations alike. Through a major in cybersecurity, Assumption College will train the next generation of individuals who will seek to thwart and respond to cyber threats and attacks.
According to the Federal Bureau of Investigation’s 2016 Internet Crime Report, millions in the United States are the victims of Internet crimes each year and it receives, on average 800 complaints, per day. The Report also shares that losses due to email scams, identify theft, ransomware attacks, tech support fraud losses and other nefarious activity generated $1.33 billion in victim losses in 2016, the latest year for which statistics are available....
Information technology refers to the preparation of students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organi
Why study Information Technology?
Information technology refers to the preparation of students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organizations.
IT professionals select and integrate hardware and software products with organizational needs and infrastructure. They install, customize and maintain those applications, thereby providing a secure and effective environment that supports the activities of the organization’s computer users.
There are important hardware and software systems concerns such as reliability, security, usability, and effectiveness and efficiency for their intended purpose; all of these concerns are vital. These topics are difficult and intellectually demanding....
The Big Data and Analytics major at UCM provides focused knowledge and training to students so they can learn how to utilize a company’s data and generate information for
A Meaningful Degree in an In-Demand Career
With ever increasing advances in information technology, almost every industry has a need for data analysts to leverage collected information and help organizations operate more effectively and efficiently.
According to a recent McKinsey & Company big data report, in 2018, the United States alone could face a shortage of 140,000 to 190,000 professionals with proficient analytical skills. The shortage is expected to continue in the near future.
Through its Big Data and Business Analytics undergraduate and graduate programs, UCM is filling that skills gap, by helping students graduate ready to enter the workforce with a meaningful degree....
Information technology is necessary in every area of human life. The need for ICT professionals is growing continuously. As an ICT engineer you are able to design and rea
Degree Programme in Information Technology, BEng
Application 9-23 January 2019
Tuition 8000€/ Academic year
The need for ICT professionals is growing continuously. As an ICT engineer you are able to design and realize various software solutions and applications. You are also capable of working as an active member of your working society and developing your own profession.
The degree programme in Information Technology emphasizes web development. The studies consist of software development, web and mobile application technologies and IoT technologies....
Learn the concepts and skills needed to meet the information technology needs and challenges of the Information Age workplace and society as an Information Science and Te
Learn the concepts and skills needed to meet the information technology needs and challenges of the Information Age workplace and society as an Information Science and Technology (I.S.T.) major or minor.
I.S.T. majors choose between a Mathematics or a Business track to acquire either a strong mathematical foundation for scientific applications or a foundation in business for information management.
Information Science and Technology Program Details
The I.S.T. prepares students for graduate school or a career that allows them to apply information science to an ever-changing technology climate in business and industry.
Students learn concepts and skills needed for designing, programming and implementing information systems to solve real-world problems, while also acquiring either a strong mathematical foundation for scientific applications (in the Mathematics track) or a foundation in business for management information (in the Business track)....
Net-centric computing covers a range of sub-specialities including computer communication network concepts and protocols, multimedia systems, Web standards and technologi
Recent advances in computer and telecommunications networking have increased the importance of networking technologies in the computing discipline. Net-centric computing is a relatively new branch of computing, and it represents a paradigm shift to the internet computing model.
Net-centric computing covers a range of sub-specialities including computer communication network concepts and protocols, multimedia systems, Web standards and technologies, network security, wireless and mobile computing, and distributed systems. Upon graduation, our graduates can expect to find employment opportunities in private and public sectors where ICT are used. A wide range of career options include but are not limited to, Network Administrator, Network Analyst, Consultant, and Applications Developer for Internet and mobile environments. USP offers the degree Bachelor of Net-centric computing. This is a four-year professional degree....
Are you passionate about the newest digital tools that help make organisations more intelligent? Do you want to learn how to filter valuable information from a mass of da
Are you passionate about the newest digital tools that help make organisations more intelligent? Do you want to learn how to filter valuable information from a mass of data, how to make this information accessible by visualising it, and how to secure this data efficiently and with purpose? Enter the options Cyber Security Expert or Datamanager!
Netflix knows you better than your own sweetheart those and always offers you the perfect movie. And Trivago knows, even before you have clicked anything, that you are planning a city trip to Dublin. Data is big business. We teach you how to make companies and organisations more intelligent through data. How to disclose raw data and how to make it accessible. And how companies can use this to further develop their business.
You never cease to be interested by the newest IT-technologies. As such, you are also aware that technology has its weak sides and that hackers can take advantage of those. Phishing, hacking, ransomware, … Making sure that data and information don’t end up in the wrong hands is a hot issue. You want to know more about security techniques and how to apply them with focus.
You are attracted by company life. The processes, strategies and structures in a company fascinate you. The program combines the best of both worlds: business and technology. The accent is put on better and more efficient data management in a business environment, through the use of informatics. And you absolutely don’t need to be...