Undergraduate and Graduate
Degree program.
Financial Aid Programs
Per Annum
From over 178
Countries Globally.
Get jobs within
A year
In Experiential Education
Opportunities.
Can be done in 6 months
The Information Security program at Southeastern Michigan University explores strategies and technologies to protect sensitive information. Students gain expertise in securing data, managing threats, and implementing security measures to ensure the confidentiality, integrity, and availability of information.
The College of Computer Science is designed to establish a strong technical foundation and proficiency in programming. Students start by building a solid understanding of computer science fundamentals and gain hands-on experience in coding and software development. This technical base prepares students for a successful career in the ever-evolving world of technology.
Beyond the classroom, our Computer Sciences program places a significant emphasis on fostering industry connections and involvement in the tech community. Students have opportunities to participate in hackathons, tech conferences, and internships with leading tech companies. These experiences not only enhance their technical skills but also provide valuable insights into the tech industry.
The College of Computer Science at Southeastern Michigan University is committed to fostering global tech innovation and promoting collaborative ventures. Our curriculum incorporates international perspectives in technology and encourages students to work on projects with global reach. Additionally, we offer study abroad programs and collaborate with tech professionals from around the world, enabling students to gain a global perspective on computer sciences.
This course teaches about the technologies that are being used in the marketplace. The course covers market-driven content such as wireless LANs, security and network management, TCP/IP, and application layers.
This course covers the basic hardware of a personal computer, including installation, operations and interactions with software. Topics include component identification, memory-system, peripheral installation and configuration, preventive maintenance, hardware diagnostics/repair, installation and optimization of system software, commercial programs, system configuration, and device-drivers.
This course uses broad coverage and clear exposition to present a complete picture of the dynamic computer science field. An overview of each of the important areas of Computer Science (e.g. Networking, OS, Computer Architecture, Algorithms) provides you with a general level of proficiency for future courses.
This course covers the introduction to the computer science discipline, including an introduction to computing environments, general application software, computing hardware, operating systems, desktop publishing, internet, software applications and tools and computer usage concepts; introducing software engineering and information technology within the broader domain of computing.
This course explains how to successfully manage an IT project and prepare Track from Start to Finish. The course walks you through each step of the IT project management process, covering critical strategies for on-time and within-budget projects.
This advanced course explores complex concepts in information security, providing students with expert knowledge and skills. Topics include advanced cybersecurity strategies, cutting-edge technologies, and innovative practices.
This course explores the latest innovations and technologies in information security. Students will learn about emerging trends, new research, and innovative practices that are shaping the future of security.
This leadership course focuses on developing the skills necessary to lead and manage information security teams effectively. Students will learn about leadership styles, team dynamics, and strategic management in the context of information security.
This research-focused course provides students with the skills to conduct scientific research in information security. Students will learn research methodologies, data analysis, and how to apply research findings to improve security practices.
This course provides students with the practical skills and knowledge needed for a professional career in information security. Students will learn about industry standards, professional practices, and how to excel in their careers.
Tuition Fee Breakdown | Cost |
---|---|
MASTERS DEGREE | $27,000 |
Medical Insurance | $0.00 |
Personal Expenses | $0.00 |
Study Materials | $0.00 |
Food Cost | $0.00 |
Total Tuition Fee | $27,000 |
At Southeastern Michigan University, we believe in where affordability meets opportunity. Our commitment to accessible education ensures that quality learning doesn't come with a hefty price tag. We open the doors to knowledge, offering students the chance to thrive without the burden of overwhelming tuition fees, empowering them for a brighter future.
Explore SMICH’s Eligibility Criteria for Students Worldwide
Bachelor's Degree or equiv. international education
60 Hours
1 Year (Self-Paced)
10
Become a part of the dynamic online community at Southeastern Michigan University.
Learn all about our online study options while pursuing your distance learning program.
Get all your questions answered and immerse yourself in a supportive and engaging community.
Topics Covered in This Course: | |||||||||||||||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||||||||||||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||||||||||||||||||||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||||||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||
|
Topics Covered in This Course: | |||||||||||||||
|