Information Technology

The Bachelor of Science in Information Technology (IT) degree prepares students to install, manage, and maintain the computing infrastructure on which organizational systems run. The Network Administration and Security emphasis prepares students to work as data communication consultants, information security analysts, and network administrators. The Computer Forensics and Security emphasis provides students with a solid foundation for employment by government or corporate sector to work in a computer forensics lab as a forensic analyst or in information security. The core of the BS IT program prepares students to have a strong foundation in computer architecture, data communication, information security, networks, and system administration.

 

Accreditation by the Computing Accreditation Commission of ABET (http://www.abet.org) assures quality.

 

ABET Logo

 

Information Technology (BS) Majors 2015 2016 2017 2018 2019 2020 2021
# of students in major 334 351 393 392 367 352 318
Graduates 46 46 33 48 65 69 75

Program Educational Objectives

Within three to five years of graduation, alumni of the Information Technology program are expected to:

  • Practice core competencies in computing to analyze, design, develop, and implement secure Information Technology solutions.
  • Advance professionally with increased workplace contributions.
  • Adapt to change through continued professional development.
  • Serve in professional organizations and local communities.

Student Outcomes

The B.S. in Information Technology program uses the following ABET Student Outcomes 1 through 6:

  1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals.

Continuous Improvement

In order to continually improve the curriculum, the Information Technology program at Utah Valley University, in collaboration with students, faculty, alumni, advisory board and employers, uses various assessment tools to measure achievement of student outcomes and program educational objectives.