Subscribe to our Newsletter

Helpful articles and useful tips for adults considering a college degree.

Thank you for signing up for our newsletter!

You will soon receive an email
confirming your request.

Online Information Technology Degree Program

Information Technology Degree - IT College & Online IT Degrees Program OverviewProgram DetailsWhy Choose Franklin
Back To Program Details

Major Area Course Descriptions


In a highly connected, data intensive, and cost-focused business environment, the practice of information security not a business advantage; it is a customer requirement. Viruses, malware, trojans, denial of service attacks, phishing, and even Wiki leaks have become headline news. Failure to insure the confidentiality, integrity, and availability of data costs companies millions, if not billions of dollars in legal settlements, lost business, and trade secrets. In this breadth-based course, you will get an overview of information security principles and practices, including security models, risk management, access controls, intrusion detection and prevention, cryptography, software vulnerabilities, and ethical issues. Subsequent courses expand on this foundational material in much greater depth.


This course covers both the design and basic configuration of computer networks. Using Cisco Systems CCDA© certification as a guide, students will learn about the OSI model, network topologies, Wide Area Network (WAN) technologies, wireless LAN, IP addressing, routing protocols, and network security mechanisms. This course also utilizes simulation software to create a small virtual network on the student's personal computer running Windows XP or Vista. This provides the student interactive configuration experience with the Cisco Systems Internetworking Operating System (IOS) in an isolated environment. Please note: A book fee of $38.50 will be included in your tuition charges for required course materials.


This course covers the basic methods of UNIX system administration. The course will focus not only on user-level commands and utilities, but also upon installation and configuration of the UNIX kernel, file system, memory, peripheral devices, authentication/authorization and network facilities. The course also provides an introduction to the Perl programming language and the role of Linux in current UNIX environments. This course also uses virtualization software to isolate the UNIX operating system from the underlying host operating system. As such, administrative access to a fast machine running Windows XP or better with at least 2 gigabytes of memory and 40 gigabytes of available hard drive space is required. Please note: A book fee of $37.50 will be included in your tuition charges for required course materials.


This course provides an introduction to the concepts of information technology project management and techniques for initiating, planning, executing, monitoring and controlling of resources to accomplish specific project goals. Both technical and behavioral aspects of project management are discussed. While the focus is on information technology projects, the principles follow the nine project management knowledge areas outlined in the Project Management Institute's PMBOK® Guide Third Edition and thus are applicable to the management of any project. Topics will include integration, scope, time, cost, quality, human resource, communications, risk, and procurement management. Project management software utilization is emphasized. Please note: A book fee of $45.70 will be included in your tuition charges for required course materials.


The Information Technology capstone course encourages teamwork in small groups on a substantial project. The intent of this course is to provide a capstone experience that integrates the material contained in required courses of the ITEC major. It also provides an opportunity for students to recognize and evaluate the interrelationship of their general education courses with the courses taken for their major. The capstone will include discussion about professional and ethical issues related to Information Technology. Students will also culminate their experiences with an overview of the evolution of computer systems and a look at the near-term future.


This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored.


This course will prepare students for the bi-directional technical communication demands specific to computer and information systems. Topics include technical research methods and approaches, critical analysis of technical documents, synthesis of data, information and knowledge gained through research and critical analysis, creation of accurate technical documents, and effective delivery of technical material via oral presentations supported by visual media.

Major Electives Course Descriptions


Networks are the major point of entry to most computer systems. Preventing unwanted intrusion, use, abuse, or flooding of communications channels is a high priority to organizations trying to protect their assets. Network security is about preserving the appropriate use of network resources while preventing disallowed use. In this course, you will learn how to employ firewalls, VPNs, and stateful packet inspection techniques to harden computer networks. Topics include packet filtering, intrusion detection and prevention, ingress and egress rules, monitoring, network access controls, authentication, authorization, and auditing.


The availability and integrity of systems constitutes two of the three areas of information security. Yet systems can fail in these two critical ways without intrusions, attacks, malicious code, social engineering, or any other external influence. Hardware fails; software has bugs; human beings make mistakes. These and many more factors influence the design and implementation of high availability systems that maintain business continuity in light of outages. In this course, you will learn how to design and implement high availability systems that minimize economic impact during minor and major outages. Topics include high availability architecture; layered system design; storage redundancy; failover, load balancing, and virtualization clusters; and disaster recovery systems.


Data centers house the most critical enterprise computing infrastructure components. A well designed and managed data center is crucial for high availability and business continuity. This course is designed to cover data center design and management principles, including facilities setup, power and cooling, disaster recovery, servers, storage, VOIP, network operations, and virtualization. Attention is paid to the best practices of data center operations, including organization, documentation, standardization, and consolidation.


This course provides the student with an introduction to Windows Server 2008 administration and is structured to assist a network manager or planner in planning, configuring, installing, running, and repairing networks that include a Windows Server 2008. As such, it provides an introduction to server installation, Active Directory, printer management, domains, network clients, security, disaster recovery, fault/error management, and scripting of common tasks. This course also uses virtualization software to isolate the Windows Server 2008 operating system from the underlying host operating system. As such, administrative access to a fast machine running Windows XP or better with at least 2 gigabytes of memory and 40 gigabytes of available hard drive space is required. For face to face classes, an external USB 2.0 hard drive with at least 40 gigabytes of free space is required to bring to class.


Individuals, governments, and businesses depend daily on digital information to make informed decisions. The proliferation of this data has led to increased complexity in information storage and management. The design and implementation of robust storage infrastructures has become a critical piece of the foundations of information technology. This course will explore storage systems, technologies, and networks. Particular emphasis is placed on designing, securing, and managing storage infrastructures that promote business continuity and data retention compliance.


This course covers a breadth of subjects in Database Administration. Building on the database management systems course, this course covers topics about the configuration, administration and performance of the database engine itself. Using Oracle 10g as a platform, students will learn about installation, configuration, performance tuning, security, disaster planning and recovery, and network connectivity of databases. This course also uses virtualization software to isolate the database server operating system from the underlying host operating system. As such, administrative access to a fast machine with at least 1 gigabyte of memory and 20 gigabytes of available hard drive space is required.

Ready to Apply?

Completing an application is fast, free and gets you one step closer to your degree.


The above list of courses only represents a portion of the courses required for a bachelor's degree. View the bachelor's degree full curriculum.

Similar Majors

Not the program you were looking for?

Check out these other popular, related majors and find your best degree program fit at Franklin.

View All Majors

Franklin is for you. Find out why.

Learn about our flexible class
scheduling, affordable tuition, and
history educating adult learners.

Learn More About Franklin