request information


Herzing University | BS in Information Technology with a Concentration in Security Technology

Herzing University's program is designed to provide students with a firm grasp of principles and practices governing information systems security and management.

Official Program Name:

Bachelor of Science in Information Technology with a Concentration in Security Technology

School Offering Program:

Herzing University

Degree Level:


Program Prerequisites:

Individuals interested in this series may have completed a 2-year program in a related area, such as computer programming, information systems, or information technology. Those who do not possess a relevant degree may have hands-on experience in the field of information technology. Though requirements may vary, applicants should have earned a high school diploma or equivalent.

Program Description:

Students who enroll in the Bachelor of Science in Information Technology with a Concentration in Security Technology program have the chance to learn to collaborate professionally and address the technical and relevant business needs of an organization. Courses are designed to explore methods for planning, executing, and maintaining secure computer systems. Furthermore, participants will be able to learn to develop security policies and protocols. In order to complete this IT series, students will need to complete a capstone project or participate in a practical work experience.

Learning Format:


Total Credits Required:

122 semester credit hours

Financial Aid:

Herzing students could be eligible for a variety of federal and institutional financial assistance programs. Aid opportunities include employer tuition reimbursement programs, veteran benefits, federal grants and loans, federal work study, and Herzing University scholarships. The university can assist students in developing a financial plan for their education.

Tuition, Financial Aid & Start Dates

Since every student is different, there isn't a "one size fits all" for school information. to get the most up-to-date and accurate information based on your selected program and circumstances.

Still Have Questions?

Complete and get your answers and advice.

Topics of Study for a Bachelor of Science in Information Technology with a Concentration in Security Technology:

Herzing University frequently updates its course requirements in order to its programs consistent with employer needs and changing industries. Topics of study may include:

  • Internet fundamentals
  • Systems architecture
  • Operating systems
  • Servers
  • Internet protocol
  • Computer applications
  • Programming practices
  • Networking principles
  • Routers and switches
  • Database concepts
  • Data warehousing
  • Computer forensics
  • Systems security and defense
  • Troubleshooting techniques

Post-Graduation Opportunities:

Furthering Your Education:

After earning a Bachelor of Science in Information Technology with a concentration in Security Technology, some graduates might decide to continue their training. This could lead to the pursuit of voluntary industry certifications or a related advanced degree. Continuing education could allow individuals to stay abreast of industry trends, strengthen their practical skills, and develop leadership abilities.

Master's degrees that could be sought include, but are not limited to:

  • Master of Science in Management Information Systems
  • Master of Science in Information Technology
  • Master of Science in Computer Science
  • Master of Business Administration in Technology Management
  • Master of Science in Project Management

Career Paths:

This Herzing University series is designed to develop students' technical abilities as well as their critical-thinking and communication skills. Upon completion, opportunities could be sought with any number of organizations, including offices, manufacturing companies, banks, schools, healthcare facilities, or government agencies.

Positions that could be sought might include:

  • Information systems auditor
  • Network security architect
  • Information systems security analyst
  • Information technology strategic planner
  • Disaster recovery specialist