International Students

Programs

Programs

Cloud Computing
Bachelor of Science in Computer and Information Science with a Major in Cyber and Information Security Technology - Cloud Computing Track

Cloud Computing Overview

Cloud computing or software services provided across the internet are ushering in a wave of new opportunities to help businesses become more flexible, efficient and agile. By providing infrastructures, platforms and software as a service, cloud computing allows users to access and implement important business and technology tools whenever and wherever they need.

If you’re interested in pursuing a career in the field of Cloud Computing, consider ECPI University. You could earn a Bachelor of Science Degree in Computer and Information Science with a major in Cyber and Information Security Technology in as little as 2.5 years.

Advanced Manufacturing Skills Gap Infographic
Program Description

Through ECPI University’s interactive educational program using cloud & virtualization, you could set up servers and software clients, create large storage solutions, utilize cloud technologies, and deploy thin applications for large, medium, and small organizational networks.

At ECPI University, you learn by doing in a "practical" classroom environment. This allows you to gain “real world” experience. Specifically, the Cloud Computing program track can show you how to:

  • Identify customer needs to evaluate network requirements
  • Design and secure fault tolerant enterprise networks
  • Create virtual solutions for servers
  • Install and configure virtual servers and clients
  • Use the cloud services for storage and virtualization
  • Deploy software applications through thin clients
  • Implement and manage virtual servers and data centers

Coursework includes:

  • Logic and decision processes
  • Problem resolution
  • Oral and written communication skills
  • Network security in physical and virtual implementations
  • Customer service skills
  • Ethical and professional practices

ECPI University’s Cyber and Information Security Technology curriculum aims to prepare graduates to sit for IT certification exams related to CompTIA, Cisco Systems, VMWare, and Microsoft.

Possible Career Track

Upon completion, graduates with a Bachelor of Science Degree in Computer and Information System with a major in Cyber and Information Security Technology and a track in Cloud Computing could pursue career opportunities across a wide range of industries and businesses in positions such as:

  • Network and Datacenter Administrator
  • Network Infrastructure Support
  • Storage Technology Manager
  • Virtual Server Administrator
  • Information Technology Solution Providers
  • Network Implementation Team
  • Network Support and Help Desks
  • Information Security Engineer
Curriculum
Core Curriculum28 semester credit hours
Course ID Course Name Credits
BUS121 Introduction to Business 3
PMT472 Applied Project Management 3
PMT472L Applied Project Management Lab 1
CIS126 Introduction to Programming 3
CIS142 Introduction to Cloud Solutions 3
CIS150 Introduction to Networking 3
CIS206 Linux Administration 3
CIS212 Principles of Cybersecurity 3
CIS223 Introduction to Databases 3
CIS123 Introduction to Scripting 3
Arts and Sciences*31 semester credit hours
Course ID Course Name Credits
CAP480 Arts and Sciences Capstone 3
COM115 Principles of Communication 3
ENG110 College Composition 3
ENG120 Advanced Composition 3
HUM205 Culture and Diversity: Exploring the Humanities 3
MTH131 College Algebra 3
MTH140 Statistics 3
PSY105 Introduction to Psychology 3
PSY220 Positive Psychology 3
ONE LECTURE COURSE AND CORRESPONDING LAB FROM THE FOLLOWING:
PHY120 Physics 3
PHY120L Physics Lab 1
BIO122 Environmental Biology 3
BIO122L Environmental Biology Lab 1

*For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department section in the ECPI University Course Catalog.

Self Integration9 semester credit hours
Course ID Course Name Credits
CIS106 Introduction to Operating Systems 3
CIS108 Office Applications 2
FOR110 Essentials for Success 3
COR191 Career Orientation 1
Cyber and Information Security Technology Major Required Courses37 semester credit hours plus electives
Course ID Course Name Credits
CIS101 Computer Configuration I 3
CIS202 Introduction to Routing and Switching 3
CIS202L Introduction to Routing and Switching Lab 1
CIS204 Intermediate Routing and Switching 3
CIS207L Routing and Switching LAB 1
CIS225 Network Protocols and Services 3
CIS245 Windows Client and Server 3
CIS245L Windows Client and Server Lab 1
CIS251 Advanced Windows Server 3
CIS256 Windows Active Directory 3
CIS256L Windows Active Directory LAB 1
CIS321 Network Scripting 3
CIS403 Ethical Hacking 3
CIS425 Advanced Defense and Countermeasures 3
ONE OF THESE TWO COURSES:
CIS495 Cyber and Network Security Capstone 3
CIS490 Bachelor's Externship-CIS 3
Cloud Computing Track15 semester credit hours
Course ID Course Name Credits
CIS242 AWS Academy Cloud Foundations 3
CIS253 Network Virtualization Fundamentals 3
CIS253L Network Virtualization Fundamentals Lab 1
CIS305 Advanced Linux Administration 3
CIS305L Advanced UNIX Administration LAB 1
CIS335 AI/Machine Learning/Edge Computing 3
CIS335L AI/Machine Learning/Edge Computing Lab 1
Possible Outcomes

Students in the B.S. in Computer & Information Science program develop planning, design, implementation, and support skills in operating systems, networking, software programs, and security. Students develop additional focused skills based on which major the student pursues. Students also learn principles of excellent customer service in order to assist clients with technical issues.

Upon successful completion of the Bachelor of Science in Computer and Information Science with a major in Cyber and Information Security Technology, graduates are expected to:

Computer and Information Science Outcomes:

  • Design, implement, and evaluate computer-based solutions that incorporate the appropriate computing requirements identified through the analysis of specific organizational or computing problems
  • Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables
  • Apply written, oral, and graphical communication in both technical and non-technical environments
  • Identify and use appropriate technical literature
  • Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels
  • Develop and apply ethical and legal best practices in the maintenance and security of information and systems

Cyber and Information Security Technology Major Outcomes:

  • Plan, design, configure and administer a network and security infrastructure
  • Maintain, monitor, and troubleshoot a network and security infrastructure
  • Assess and implement technical and non-technical security controls to protect an organization from threats and vulnerabilities

Online Chatbot Five9