Bachelor of Science in Information Technology
with specialization in Cybersecurity

General Description of the Program

The Bachelor of Science in Information Technology is the study of the use of computers and computer software to plan, install, customize, operate, manage, administer, and maintain information technology infrastructure. The program also deals with the study of design, development and implementation of solutions that integrate information technology to businesses and organizations. It aims to prepare students to be IT professionals, well-versed in IT infrastructure development and administration as well as expert on systems design and development for implementation in an organization.


Vision

The Information Technology Department aims to be the catalyst for the delivery of industry-based solutions and internationally-recognized IT education through its innovative specializations.


Mission

The Information Technology Department is committed to provide industry- based information technology solutions, international academic linkages, researches, and IT certified professionals.


Program Objectives

The primary goal of the Cybersecurity specialization is to give students the essential know-how and competencies needed to recognize, counter, and prevent cybersecurity threats and vulnerabilities inside an organization's IT infrastructure.

BSIT with specialization in Cybersecurity covers expansive topics on network security, information security, ethical hacking, cryptography, and cybercrime investigation. The curriculum is created to give students the skills and expertise they need to deploy cybersecurity solutions that adhere to industry standards and best practices.

Graduates of the Cybersecurity Program specialization course should be capable of managing cybersecurity risks, protecting organizational data, and designing and implementing cybersecurity solutions to defend against online threats.


Program Educational Objectives

Graduates of the Bachelor of Science in Information Technology program are:


  1. Engaged in further professional development and are interested in advanced studies or trainings in computing.
  2. Entrepreneurs or are employed in computing industries, organizing, and managing team-based projects leading to successful and sustainable computing systems solutions.
  3. Responsible computing professionals actively participating in community groups that make a significant impact in addressing current and future societal challenges.

Program Outcomes


  • Apply computing knowledge appropriate to the discipline.
  • Analyze a complex problem and identify and define the computing requirements appropriate to its solution.
  • Design, implement, and evaluate computer-based systems or applications to meet desired needs and requirements.
  • Function effectively both as a member and a leader of a development team recognizing the different roles to accomplish a common goal.
  • Understand professional, ethical, legal, security, and social issues and responsibilities in the utilization of information technology.
  • Communicate effectively with the computing community and with society at large about complex computing activities through logical writing and presentations.
  • Analyze local and global impacts of computing information technology on individuals, organizations, and society.
  • Recognize the need for and engage in planning self-learning and improving performance as a foundation for continuing professional development.
  • Apply knowledge through the use of current techniques and tools necessary for the IT profession.
  • Use and apply current technical concepts and practices in the core information technologies; human computer interaction, information management, programming, networking and web systems and technologies.
  • Identify and analyze user needs, applying them in the selection, creation, evaluation and administration of computer-based systems.
  • Integrate IT-based solutions into the user environment effectively.
  • Understand the application of best practices and standards.
  • Assist in the creation of an effective IT project plan.
  • Demonstrate understanding and proficiency of IT specialization.

Educational Outcomes


  • Develop skills in creating web and mobile applications while maintaining a competitive edge in the industry.
  • Implement solutions to common business, scientific, and computing problems and deploy them in a mobile web platform.
  • Work with database management systems software and determine ways to effectively implement data and file organization, storage, and retrieval.
  • Analyze user’s needs through designing, creating, and modifying general computer applications software or specialized utility programs to meet individual needs of an organization.
  • Design, implement, and maintain network infrastructure of an organization.

Career Opportunities

  • Ethical hacker
  • Cybersecurity consultants
  • Cybersecurity manager
  • Network security engineer
  • Cybersecurity analyst
  • Computer network architect
  • Digital forensic investigator

Information Technology Department

Room 206B, Higher Education Bldg.

Office Hours: Monday to Friday
8:00 a.m. ─ 5:00 p.m.

CONTACT DETAILS

Trunkline: (02) 8990-0430

Email: ccs_it@feudiliman.edu.ph

 

DR. IRISH C. JUANATAS

Senior Director for Academic Services



Back to Information Technology Department