Information Technology

Studying Information Technology

Information Technologists are trained to meet the hands-on, practical and everyday computer technology requirements of the various types of organizations, including business, government, healthcare, schools and others. Entities within the organizations rely on their IT department to select hardware and software products that will facilitate operations efficiently and securely, followed by the integration of the systems within its infrastructure.

Transform Your Passion For Details Into a Career

Program Educational Objectives

Graduates will demonstrate proficiency in analyzing complex information technology problems, designing effective solutions, and implementing innovative strategies using analytical skills and problem-solving techniques.

Graduates will apply a solid foundation of information technology principles to analyze, design, and develop innovative solutions to real-world challenges in diverse domains, showcasing adaptability and creativity in response to evolving technological landscapes.

Graduates will seamlessly collaborate within multidisciplinary teams, communicating technical concepts clearly, and contributing positively to collaborative projects in both technical and non-technical settings. They will make informed decisions considering societal, cultural, and ethical factors, fostering responsible and sustainable technological solutions.

Graduates will exhibit leadership skills by guiding information technology projects, inspiring peers, and driving positive change. They will apply entrepreneurial thinking to identify opportunities, take calculated risks, and transform ideas into viable ventures, addressing local and global challenges through outreach, mentorship, and socially impactful projects.

Graduates will engage in continuous self-directed learning to stay abreast of emerging technologies and industry trends, progressing in their careers to assume roles of increasing responsibility and technical expertise within academia, industry, research, or other relevant fields in the realm of information technology.

Student Outcomes

Graduates of the Information Technology program will have the ability to

Analyze a complex computing problem and apply principles of computing, mathematics, scientific reasoning, and other relevant disciplines to identify solutions.

Design, correctly implement, evaluate, integrate, and document secure computing-based solutions to meet a given set of computing requirements in the context of the Information Technology discipline.

Communicate effectively, both orally and in writing, in a variety of professional contexts.

Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.

Function effectively as a member or leader of a team engaged in activities appropriate to the Information Technology discipline.

Initiate and produce self-directed computing-based solutions using Information Technology theory and fundamentals, demonstrating the ability to independently explore advanced topics, and stay updated on emerging trends in the field.

99

Credits

To Graduate

Major Core Requirements: 43 Credits
Mathematics Requirements: 12 Credits
Major Core Electives: 18 Credits
General Education Requirements (GER): 26 Credits

General Education Requirements 26 Credits

ENG 200 Writing Skills (3Cr)

ENG 201 Rhetoric I (3Cr)

REM 308 Research methodology (3Cr)

BUS 210 Business Communication Skills (3Cr)

BUS 201 Foundations in Business

or

ENT 301 Start-up Business Entrepreneurship (3Cr)

HUM 318 Human Rights (3Cr)

CSC 212 AI and Society 

or

HUM 212 AUT cultural Plus (1Cr)

ART 200 Drawing & Illustration I (3 CR)

ART 205 Contemporary Arts (3 CR)

ART 206 History of Art and Design (3 CR)

HUM 210 Arts Appreciation (3 CR)

HIS 200 History of Modern Lebanon (3 CR)

POL 202 Globalization & Political Changes (3 CR)

PSY 201 Introduction to Psychology (3 CR)

SOC 201 Introduction to Sociology (3 CR)

COM 208 Introduction to Social Media (3 CR)

HLT 210 Health & Wellness (3CR)

NTR 201 Introduction to Nutrition (3CR)

ENV 201 Man in the Environment (3CR)

CSC 201 Introduction to Information Technology (3CR)

PED 2** Physical Education (1CR)

Mathematics Requirements 12 Credits

To introduce students to the methods and applications of calculus and to a mathematical way of thinking. After completing this course, students should be well versed in the mathematical language needed for applying the concepts of calculus to numerous applications in science and engineering. They should be prepared for courses in differential equations, linear algebra, or advanced calculus.

Logic; Propositional Equivalences; Predicates and Quantifiers; Methods of Proof; Sets; Functions; Proof Strategy; Mathematical Induction; Recursive Definitions; Permutations and Combinations; Relations and their Properties; Representing Relations; Equivalence Relations;
Introduction tographs; Graph Terminology; Introduction to Trees.

Matrices and their properties; Methods for solving systems of linear equations;Gaussian and Gauss-Jordan elimination; Vector spaces and
subspaces; Inner product spaces; Gram-Schmidt process; determinants and their properties; Cramer’s rule; Eigenvalues and eigenvectors; Diagonalization; Linear transformation.

Basic statistical techniques emphasizing engineering and science applications. Topics covered include graphical and numerical data summary techniques, population models, probability theory, probability distributions, mathematical expectation, sampling distributions, estimation,
hypothesis testing, simple regression, statistical quality control.

Information Technology Major Requirements 43 Credits

This course provides students with a deep understanding of the fundamental principles governing the internal structure and operation of digital computers. It explores the intricate relationship between hardware and software, delving into how computer components are organized and how they collaborate to execute programs efficiently. Topics include: Number systems, data representation, processor organization and instruction set architecture, memory hierarchy, input/output systems, and assembly language programming.

This is a foundational course that provides students with the fundamental knowledge and skills required to begin programming and develop software applications. The course introduces key concepts and principles of programming, focusing on problem-solving, algorithmic thinking, and good programming practices. Students will learn the basics of data types, control structures, functions, and basic algorithms. They will develop the skills necessary to design, write, and debug programs to solve simple computational problems.

This lab is a practical companion course to CSC 206. In this lab, students will apply the concepts learned in the lectures through hands-on programming exercises. The lab provides a supportive environment for students to gain practical experience in coding, debugging, and problemsolving.

This is an intermediate-level course that aims to develop students’ understanding and proficiency in designing and implementing software solutions using object-oriented programming (OOP) methodologies, principles, and techniques. Students will learn how to structure programs around classes and objects, inheritance and polymorphism, and exception handling, enabling them to create modular, reusable, and maintainable code.

This lab is a practical companion course to CSC 208. In this lab, students will apply the concepts learned in the lecture through hands-on coding exercises and projects. The lab provides a supportive environment for students to gain practical experience in designing, implementing, and testing object-oriented software systems.

This course provides students with a comprehensive understanding of fundamental data structures and their associated algorithms. Topics include: One-dimensional and multi-dimensional arrays, linked lists, stacks and queues, trees and binary trees, heaps and priority queues, hashing, and graphs.

This course provides a comprehensive introduction to the principles, concepts, and practical aspects of database management systems (DBMS). The course aims to develop students’ understanding of data modeling, entity relationship modeling, relational database design, SQL (Structured Query Language) programming, database security and integrity, and database 180 administration. Students will learn how to design, implement, and query databases, enabling them to effectively manage and manipulate data in various applications.

This course provides students with a comprehensive understanding of the principles of computer networks, protocols, and technologies that underpin modern networking. Topics include application layer protocols (http, smtp, DNS), transport layer protocols (UDP, TCP), network layer protocols (IPv4, IPv6, SDN), routing algorithms, link layer and LAN, wireless and mobile networks (WiFi 802.11), security, and multimedia.

This lab is a hands-on companion course to the theoretical concepts covered in CSC 315. Through a series of structured labs, interactive simulations, and real-world scenarios, students will gain a deeper understanding of the foundational principles and technologies that drive modern computer networks.

This is an introductory course that provides a solid foundation in web development concepts and techniques. It focuses on the fundamentals of web programming, including HTML, CSS, and JavaScript. Students will learn how to create static web pages, apply styling using CSS, and add interactivity through client-side scripting with JavaScript. The course will also cover topics such as web design principles, responsive web development, and web accessibility.

This course provides a comprehensive introduction to the principles and practices of System Analysis and Design in the context of developing robust and efficient information systems. Students will engage in problem solving activities and explore contemporary industry practices and the entire system development life cycle, from understanding business requirements to designing and implementing effective solutions. Topics include system requirements elicitation, analysis, and documentations, system architecture design that meets business objectives, use case modeling, domain modeling, user interface design, database design, object oriented design, project planning and project management. Selected cybersecurity and ethical issues relevant to this course will be examined.

This course provides a comprehensive introduction to the design, implementation, and functionality of operating systems.                             Topics include: Process management and scheduling algorithms, memory management and allocation techniques, file systems, input/output (I/O) operations, security, reliability, and performance. Students will examine concepts such as process synchronization, deadlock avoidance, and error handling. They will also explore methods for optimizing system performance through efficient resource management and scheduling strategies.

This hands-on laboratory course introduces students to essential Linux operating system skills using a modern Linux distribution such as Ubuntu. Students will learn and practice fundamental shell commands, file system navigation, file and directory management, user and group administration, permissions, and basic process and job control using the Bash shell. The course includes use of standard tools such as vi, Nano, top, chmod, chown, and ps. This lab complements the Operating Systems lecture course by providing practical experience in Linux system environments.

This course provides students with a comprehensive understanding of the fundamental concepts, principles, and practices related to information security. It explores the protection of information assets from unauthorized access, disclosure, alteration, destruction, and disruption. Topics include: Threats and vulnerabilities, security policies and standards, risk management, cryptography, network security, application Security, incident response and disaster recovery, legal and ethical considerations, and emerging trends in information security,
such as cloud security, mobile security, IOT security, and artificial intelligence in security.

This course provides students with a comprehensive understanding of the fundamental concepts, principles, and practices related to information security. It explores the protection of information assets from unauthorized access, disclosure, alteration, destruction, and disruption. Topics include: Threats and vulnerabilities, security policies and standards, risk management, cryptography, network security, application Security, incident response and disaster recovery, legal and ethical considerations, and emerging trends in information security,
such as cloud security, mobile security, IOT security, and artificial intelligence in security.

This course provides students with a comprehensive understanding of the fundamental concepts, principles, and practices related to information security. It explores the protection of information assets from unauthorized access, disclosure, alteration, destruction, and disruption. Topics include: Threats and vulnerabilities, security policies and standards, risk management, cryptography, network security, application Security, incident response and disaster recovery, legal and ethical considerations, and emerging trends in information security,
such as cloud security, mobile security, IOT security, and artificial intelligence in security.

The Internship provides students with practical experience in a professional setting, allowing them to apply computer science knowledge in real-world environments. Students work in organizations—ranging from startups to established tech firms—for a minimum of six weeks, contributing to projects aligned with their skills and interests. Guided by industry professionals 190 and academic supervisors, they engage in meaningful tasks, gaining insight into industry practices and challenges. The internship emphasizes professional growth, requiring students to reflect on their experiences, document achievements, and assess their performance. Feedback from industry mentors helps students identify strengths and areas for improvement, enhancing both technical and professional development.

Information Technology Major Electives 18 Credits

Choose six of the following courses or one of the tracks

This course offers an in-depth exploration of the principles, techniques, and technologies underlying the creation, manipulation, and rendering of images and visual content using computer algorithms. Topics include: Graphics hardware and APIs, basic drawing algorithms, 2-D and 3-D transformations and projection, curves and surfaces, windowing and clipping, curves and surfaces, hidden surface and hidden-line removal, texture mapping, color theory and shading models, illumination models, image synthesis and computer animation.

This course provides an in-depth knowledge and practical skills necessary to design, develop, and optimize advanced database systems.    Topics include: Advanced data models, query optimization techniques, transaction management, distributed databases, and data warehousing. Other advanced topics may be covered, such as database security, data mining, big data management, and cloud databases. Emphasis will be placed on both theoretical foundations and practical implementations, enabling students to apply their knowledge to real-world scenarios. The course is delivered through a combination of lectures, hands-on programming exercises, group discussions, and case studies.

This course explores the mathematical foundations and practical applications of the Graph Theory, which are essential for understanding and analyzing complex computational problems. Topics include various graph representations, graph terminology, and fundamental graph algorithms such as graph connectivity, spanning trees, graph coloring, matching, and graph traversal algorithms like breadth-first search and depth-first search.

This course provides a foundational understanding of the theoretical structures of computer science. It explores the fundamental capabilities and limitations of computation by examining abstract models of computation such as finite automata, pushdown automata, and Turing machines. Students will learn to formalize computational problems, analyze their inherent complexity, and understand the hierarchy of languages and the power of different computational models. Topics covered include regular languages and expressions, context-free grammars and languages, the Church-Turing thesis, decidability and undecidability, and an introduction to computational complexity theory.

This course provides students with a comprehensive understanding of programming languages, their features, design philosophies, and implementation techniques. Through a combination of theoretical concepts and practical exercises, students will gain insights into how programming languages are designed, how they facilitate different programming paradigms, and how to select the appropriate language for specific tasks. The course delves into the relationship between language syntax, semantics, and program execution, enabling students to write effective, efficient, and maintainable code using a variety of programming languages.

This course introduces the principles and practices of project management. Students will learn how to initiate, plan, execute, monitor, control, and close projects using industry-standard methodologies. Topics include project life cycles, scope management, scheduling, budgeting, risk assessment, quality control, communication, resource allocation, and team coordination. The course emphasizes the use of project management tools and software (e.g., Gantt charts, network diagrams, and project tracking applications), and integrates soft skills such as leadership, teamwork, and stakeholder engagement. Case studies and practical assignments prepare students to manage real-world projects effectively and ethically.

This course provides students with a comprehensive understanding of the principles, methodologies, and practices involved in the development of high-quality software systems. It provides students with the essential skills and knowledge necessary to design, develop, test, and maintain software applications efficiently and effectively. Topics include: The software development life cycle (SDLC), requirements engineering, software design principles and patterns, software implementation and coding standards, software testing and quality assurance, software maintenance and debugging, teamwork and collaboration, and ethics and professionalism.

This course provides students with a comprehensive understanding of the principles, technologies, and techniques involved in developing mobile applications that run on popular platforms such as iOS and Android.
Topics include: Mobile user interface design and user experience, app development frameworks (Swift, Java, Kotlin, React Native, Flutter), app architecture, app testing and debugging, and app deployment and distribution.

This course provides a comprehensive introduction to the principles and practices of high-performance computing (HPC). It explores the architectural paradigms, programming models, and software tools necessary to effectively utilize parallel computing systems for solving computationally intensive problems in various scientific, engineering, and data science domains. Students will learn about different parallel architectures, including multi-core processors, shared-memory systems, distributed-memory clusters, and accelerators (like GPUs). The course covers fundamental concepts in parallel algorithm design, parallel programming using models such as shared memory and message passing), performance analysis and optimization techniques, and considerations for developing efficient and scalable parallel applications.

This course provides students with a comprehensive understanding of enterprise IT infrastructure, covering the design, deployment, and management of networked systems in corporate environments. Topics include server administration, virtualization, cloud computing,
enterprise networking, and IT service management. Students will gain hands-on experience with system configuration, troubleshooting, and automation tools used in modern IT operations. By the end of the course, students will be equipped with the skills necessary to administer enterprise networks and IT systems effectively.

This course introduces the basic terminology, concepts and mechanisms of network security. Explain Network-Based v. Host-Based
threats, vulnerabilities, and attacks. This course introduces also the fundamentals of cryptography, as well as its applications and issues of how cryptography is used in practice. Some technology case studies are presented and evaluated.

This course provides an in-depth understanding of the fundamental concepts, technologies, and best practices associated with cloud
computing. The course covers a wide range of topics, including cloud service models (IaaS, PaaS, SaaS), cloud deployment models (public, private, hybrid), virtualization, containerization, cloud architecture, scalability, security, and cost management. Through a combination of lectures, hands-on labs, and projects, students will gain practical experience in designing, deploying, and managing applications and services in cloud environments. The course also explores the latest trends and innovations in cloud computing, preparing students to contribute effectively to modern IT infrastructures.

This course provides a comprehensive introduction to blockchain technologies, emphasizing their technical foundations and real-world applications. Students will delve into cryptographic principles, decentralized consensus mechanisms, and the mechanics of Bitcoin, including transactions, mining, and network structure. The curriculum covers Bitcoin’s approach to anonymity and privacy, the impact of politics and regulation, and the ecological considerations of mining.
Additionally, the course explores alternative cryptocurrencies (Altcoins), smart contracts, and the use of blockchain as a platform for decentralized applications. By examining these 188 topics, students will gain a deep understanding of the potentials and challenges of
blockchain, preparing them to apply this knowledge across various industries.

Error definitions, round-off errors; The Taylor Series; The bisection method; The false position method; Simple fixed-point iteration, The Newton-Raphson method; The Secant method; Muller’s method; Gauss elimination; Least squares regression; Interpolating polynomials; Numerical integration.

Networking Track 18 Credits

This advanced course in computer networking explores in-depth concepts and emerging technologies that go beyond the fundamentals covered in the introductory course. Students will delve into advanced networking principles, protocols, and technologies to gain a comprehensive understanding of modern networking architectures. Topics include: Advanced Transport Layer Protocols (MPTCP, SCTP, QUIC), Software-Defined Networking (SDN) and Network Function Virtualization (NFV), Internet of Things (IOT) Networking, Next-
184 Generation IP Protocols, Advanced Routing Protocols, Wireless and Mobile Networking Advances (5G and beyond), Network Security, and Multimedia Networking.

This course offers a foundational introduction to machine learning, covering core concepts, methodologies, and algorithms central to
186 artificial intelligence. Students will study probability theory, linear algebra, and optimization as they explore supervised learning (classification, regression), unsupervised learning (clustering, dimensionality reduction), semi-supervised, and reinforcement learning. Key algorithms include logistic regression, K-means, k-NN, Naïve Bayes, decision trees, PCA, SVMs, and neural networks. Students will apply
concepts through hands-on programming assignments and projects using Python and libraries like Scikit-learn and TensorFlow. The course emphasizes both theoretical understanding and practical implementation of machine learning techniques in realworld problem-solving contexts.

This course provides an in-depth understanding of the fundamental concepts, technologies, and best practices associated with cloud
computing. The course covers a wide range of topics, including cloud service models (IaaS, PaaS, SaaS), cloud deployment models (public, private, hybrid), virtualization, containerization, cloud architecture, scalability, security, and cost management. Through a combination of lectures, hands-on labs, and projects, students will gain practical experience in designing, deploying, and managing applications and services in cloud environments. The course also explores the latest trends and innovations in cloud computing, preparing students to contribute effectively to modern IT infrastructures.

This course equips students with the knowledge and skills necessary to effectively plan, implement, and maintain modern computer networks. This course goes beyond the theoretical understanding of network protocols and technologies, focusing on practical aspects of network administration and optimization. Students will explore key concepts in network design, monitoring, troubleshooting, and security, preparing them for roles in network administration and management. Topics include: Network Planning and Design, Network Configuration and Implementation, Network Monitoring and Performance Optimization, Fault Detection and Troubleshooting, Network Security Management, Wireless Network Management, Network Documentation and Standards, and Network Administration Tools and Platforms.

This course provides a comprehensive understanding of the principles and practices of IT governance and risk management within organizations. It explores the frameworks, standards, and methodologies used to ensure that IT investments support business objectives, mitigate risks, and comply with relevant regulations. The course emphasizes the crucial role of IT in organizational strategy and the importance of aligning IT decisions with overall business goals. Students will learn about establishing effective IT governance structures,
identifying and assessing IT-related risks, developing and implementing risk mitigation strategies, and monitoring and evaluating the effectiveness of these controls. Topics covered include IT governance frameworks (e.g., COBIT), risk management methodologies, business continuity and disaster recovery planning, regulatory compliance (e.g., GDPR, HIPAA), and the role of IT audit

This course explores the strategic role of Information Technology (IT) in the context of electronic commerce (E-Commerce). It examines how organizations can leverage IT to develop, implement, and manage successful online business models and gain a competitive advantage in the digital marketplace. The course covers the fundamental principles of E-Commerce, including online marketing, sales, customer relationship management, supply chain management, and payment systems. It then delves into the IT strategies and technologies that underpin these   E-Commerce activities, such as website design and development, e-commerce platforms, data analytics, cloud computing, mobile commerce, and security. The course will also touch upon legal, ethical, and social implications of E-Commerce.

Cybersecurity Track 18 Credits

This course equips students with the knowledge and skills necessary to effectively plan, implement, and maintain modern computer networks. This course goes beyond the theoretical understanding of network protocols and technologies, focusing on practical aspects of network administration and optimization. Students will explore key concepts in network design, monitoring, troubleshooting, and security, preparing them for roles in network administration and management. Topics include: Network Planning and Design, Network Configuration and Implementation, Network Monitoring and Performance Optimization, Fault Detection and Troubleshooting, Network Security Management, Wireless Network Management, Network Documentation and Standards, and Network Administration Tools and Platforms.

This course offers a foundational introduction to machine learning, covering core concepts, methodologies, and algorithms central to
186 artificial intelligence. Students will study probability theory, linear algebra, and optimization as they explore supervised learning (classification, regression), unsupervised learning (clustering, dimensionality reduction), semi-supervised, and reinforcement learning.             Key algorithms include logistic regression, K-means, k-NN, Naïve Bayes, decision trees, PCA, SVMs, and neural networks. Students will apply
concepts through hands-on programming assignments and projects using Python and libraries like Scikit-learn and TensorFlow. The course emphasizes both theoretical understanding and practical implementation of machine learning techniques in real world problem-solving contexts.

This course provides a comprehensive understanding of the principles, techniques, and applications of cryptography. Cryptography plays a crucial role in securing information and communication in various digital systems, ranging from online transactions to data protection. Topics include: Encryption, decryption, ciphers, keys, confidentiality, integrity, authenticity, non-repudiation, symmetric and asymmetric
cryptography, cryptographic protocols, cryptanalysis, hash functions, and message digests.

This course provides a comprehensive introduction to blockchain technologies, emphasizing their technical foundations and real-world applications. Students will delve into cryptographic principles, decentralized consensus mechanisms, and the mechanics of Bitcoin, including transactions, mining, and network structure. The curriculum covers Bitcoin’s approach to anonymity and privacy, the impact of politics and regulation, and the ecological considerations of mining.
Additionally, the course explores alternative cryptocurrencies (Altcoins), smart contracts, and the use of blockchain as a platform for decentralized applications. By examining these 188  topics, students will gain a deep understanding of the potentials and challenges of
blockchain, preparing them to apply this knowledge across various industries.

This course provides a comprehensive understanding of the tools, techniques, and methodologies used by ethical hackers to identify and address vulnerabilities within computer systems, networks, and applications. This course focuses on developing the skills required to assess security weaknesses and recommend appropriate safeguards, all while adhering to legal and ethical standards.

Topics include: Reconnaissance and information gathering, network discovery and port scanning, vulnerability assessment, exploitation and penetration, post-exploitation and privilege escalation, web application security, wireless network security, reporting and remediation, and legal and ethical considerations.

This is a comprehensive course that provides a solid foundation in the principles, techniques, and methodologies used to investigate and
analyze digital evidence in a variety of contexts. As the digital landscape continues to expand, the importance of understanding how to effectively extract, preserve, and interpret digital information for legal, cybersecurity, and investigative purposes has become paramount. Topics include: Digital evidence and legal framework, file systems and data storage, data acquisition and imaging, data recovery and reconstruction, network forensics, mobile and cloud forensics, forensic analysis tools, and malware analysis.

function wpforms_custom_grouping() { ?> Scroll to Top