B.S. - Management Information Systems (non-technical)
Center of Academic Excellence - Cyber Defense
Is Management Information Systems (MIS) right for you?
Management information technology graduates are multi-taskers who are highly organized, detail-oriented, analytical, and have excellent interpersonal and management skills. With an MIS degree, you will be prepared to work in a variety of IT settings as system analysts, IT managers, information security analyst, web design, enterprise planning, project management, network analysts, database designers, project managers, IT trainers, IT auditing, privacy, and data analysis.
Why is this an important major in today’s world?
Management information Systems are critical to business organizations public and private and within every industry there continue to be digital adaptations and growing concerns of data privacy and management. Increasing governance and regulation of digital environments are increasing the need for individuals to acquire new or additional skills in data analysis, technology management, and cyber defense knowledge. Whether you are looking to begin your studies, train for a new career, or advance your skill set to build on your existing profession. There are some knowledge certificates that begin at only a few course and some courses allowing students to obtain industry recognized certifications.
B.S. Cybersecurity and Operations (technical)
Consider a cybersecurity and operation profession
Our cybersecurity and operation major is intended to equip you with the knowledge and skills to defend computer operating systems, networks, and data from cyberattacks. You will be taught by faculty and experts using both theoretical and hands-on approaches to prepare you for high demand jobs.
Why is this an important major in today’s world?
Cybersecurity is important because it encompasses everything that pertains to protecting our sensitive data, personally identifiable information, protected health information, intellectual property, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.
Cybersecurity risk is increasing, driven by global connectivity and usage of cloud services to store sensitive data and personal information. Improperly configured cloud services and devices paired with increasingly sophisticated cyber criminals means the risk that organizations suffer from cyberattack or data breach is on the rise.
