About
The College of Science, Engineering and Technology offers degree programs that prepare students for high-demand professions in science, technology, engineering and math (STEM) fields. With an emphasis on Grand Canyon University’s Christian worldview, our college believes in instilling social awareness, responsibility, ethical character and compassion. Our blog, BrainSTEM, focuses on topics related to science, engineering and technology, with engaging contributions from students, staff and faculty. On the blog, you can find helpful resources relating to STEM fields and learn more about current events occurring globally, locally and within GCU. We hope to provide our readers with information that helps them learn about the necessary knowledge, skills and mental disciplines to succeed in today’s job market.
Let's get started on your degree

* Do you have a high school, college or university credits from outside the U.S.?
* Are you a U.S. Citizen?
* Are you a licensed, registered nurse in the U.S.?
(example: 777-777-7777)
Browse

* Required field

** Required field if international

Request More Information
Category: CS and IT
0

Cybersecurity is proving to be among the most in-demand career fields of the 21st century. In fact, through 2026, the U.S. Bureau of Labor Statistics projects the field to grow by 28 percent—a much faster rate than the average. New threats are emerging practically every day and as the cyber-attacks evolve, so too must the tactics used by cybersecurity professionals. Even as cybersecurity specialists look ahead to the future of the digital era, it’s worth taking a look back to see how the field has evolved over time.

Continue Reading
0

You’ve likely heard about some of the most common jobs in cybersecurity, such as security consultants and information security analysts. There are also management and executive positions available, such as chief information security officer (CISO) and information technology (IT) manager. However, there is a whole world of possibilities in this field beyond these common job titles. If any of the following careers appeals to you, consider earning your Master of Science in Cyber security.

Continue Reading
0

Java is a strong and versatile programming language. Most tech companies generally expect that the computer programmers they hire will know how to use Java, so you’ll definitely want to focus on it while you work toward your degree. As with learning any new programming language, you’ll be able to pick up on its nuances better by practicing coding as you learn. Be sure to watch out for these common mistakes.

Continue Reading
0

Successful information technology (IT) workers understand that change is one of the only constants in the industry. And to get the most out of this rewarding career path, it’s necessary to adapt and drive the next wave of innovation. Blockchain technology is the perfect example of how quickly the tech world can change. If you’re vaguely familiar with cryptocurrency, like Bitcoin, then you’ve already been introduced to blockchain tech, perhaps without realizing it.

Continue Reading
0

As the importance of cybersecurity is becoming increasingly apparent to major corporations and other organizations, IT professionals have been edging their way into the C-suite. One example is chief information security officer (CISO)—a position that many corporations have embraced in an effort to modernize their organizations and take on the challenges of the 21st century. Could a C-suite position be in your future?

Continue Reading
0

Graduates of GCU’s BS in Information Technology with an Emphasis in Cybersecurity degree program practice their skills through ethical hacking. This is the act of penetrating networks to find threats and vulnerabilities in those systems. Ethical hackers conduct these penetration tests with the permission, and usually at the request, of businesses who want to ensure that malicious attackers cannot exploit their computer systems.

An ethical hacker has the technical skills and knowledge to identify issues within a target system. That hacker works within the rules of the business and law and does not exploit their findings. Their goals are to assess the security of a system and report on their findings.

Continue Reading
0

By Kaylor Jones
Professional Writing and Psychology, Honors College

The College of Science, Engineering and Technology recently sent four teams to Opportunity Hack 2018, a two-day coding event where the GCU Big Data and IT/Cyber team placed second out of 27 teams, winning a combined $5,000 prize. The team, made up of students Tom Fowler, Joshua Lee, Thomas Gleason and Christian Taillon, presented their solution to a pressing problem from local nonprofits.

Continue Reading
0

Professional computer programmers are expected to know how to use multiple programming languages. Some of the most in-demand languages are Java, JavaScript, Python, PHP, C/C++, SQL and Ruby. If you want to land a job at a specific company like Google or Facebook, you should check out which languages they expect their programmers to know. It can be tough to learn multiple languages, but here are some quick tips for getting started.

Continue Reading
Next Page »