Information Technology Resources

AI icons

Skills Needed for AI Jobs: What Skills Should Be Acquired?

Dr. Frank Appiah
AI has become deeply integrated into our everyday lives. This widespread impact is a clear indicator of the AI industry’s growth.
Read Article
AI image of graduate cap

What Can You Do with an Information Technology Degree?

Dr. Novadean Watson-Williams
An information technology (IT) degree is a valued qualification that gives you a broad scope of knowledge and experience that can be applied to nearly every industry.
Read Article
man sitting at computer

What Is Ethical Hacking and How Can It Foil Cybercrime?

Dr. Andre Slonopas
As cybersecurity threats continue to morph, ethical hacking remains an important part of the cybersecurity world.
Read Article
American flag on computer screen

US National Cybersecurity Strategy and Global Cyber Threats

Dr. Jarrod Sadulski
A national cyber strategy is needed to protect both the public and private sectors from cyber attacks.
Read Article
cloud computing icons

What Is Information Technology? Each Generation’s Thoughts

Dr. Novadean Watson-Williams
Different generations hold various views on information technology.
Read Article
balancing scales on laptop with letters A and I on scales

What Is AI Governance? The Reasons Why It’s So Important

Dr. Frank Appiah
As artificial intelligence (AI) rapidly transforms our world, a crucial question emerges: how do we ensure it's used for good?
Read Article
artificial intelligence in crime detection

Artificial Intelligence in Crime Detection: How It’s Useful

Dr. Jarrod Sadulski
Crime has grown more sophisticated due to technological advancements. To combat this increased sophistication, law enforcement and the private sector must continue to evolve by using tools such as artificial intelligence (AI).
Read Article
ethical hacking

The Benefits of Ethical Hacking and When to Hire a Hacker

Dr. Kenneth Williams
Despite the risks involved, an increasing number of organizations have turned to white-hat hackers, also known as ethical hackers, to test their vulnerability to cyberattacks.
Read Article

Next Steps

Courses Start Monthly
Next Courses Start Jan 6
Register By Jan 3
Man working on computer