Explore CCSE Programs
Understanding the potential behind your CCSE major is vital to your success here at Kennesaw State and as a working professional. We have provided a simple breakdown of the areas of focus for each degree and department here at the College of Computing and Software Engineering. Our table gives you a quick glimpse into the future career profile of the major you've chosen in terms of soft and hard skills required to be successful in your role.
Take a closer look at our theory vs. application usage explanation and our top-level overview of each of the computing-related undergraduate and graduate degrees listed below.
Areas of Focus
| PROGRAM | HARDWARE | SOFTWARE | MEETING TECHNOLOGY NEEDS OF BUSINESS | MANAGEMENT OF PEOPLE USING TECHNOLOGY | 
|---|---|---|---|---|
| Computer Engineering | High focus | Medium-low focus | Low focus | No focus | 
| Computer Science | Low focus | High focus | Medium focus | Low focus | 
| Information Technology | Low focus | High focus | High focus | Medium-low focus | 
| Software Engineering | Low focus | High focus | Medium-low focus | Low focus | 
| Computer Game Design & Development | Medium focus | High focus | Low focus | Low focus | 
| Data Science & Analytics | Low focus | High focus | High focus | Low focus | 
| Information Systems | Low focus | Low focus | Medium focus | High focus | 
| Information Security & Assurance | Low focus | Medium-low focus | Medium focus | High focus | 
| Cybersecurity | Low focus | Medium focus | High focus | High focus | 
Theory vs. Application of Technology Level of Emphasis in Undergraduate Programs
| PROGRAM | THEORETICAL PRINCIPLES | APPLICATION OF THEORY | APPLICATION OF TECHNOLOGY IN INDUSTRY | 
|---|---|---|---|
| Computer Engineering | ♦♦♦♦ | ♦♦♦ | ♦♦ | 
| Computer Science | ♦♦♦♦♦ | ♦♦♦ | ♦♦ | 
| Information Technology | ♦♦♦ | ♦♦♦♦ | ♦♦♦♦♦ | 
| Software Engineering | ♦♦♦♦ | ♦♦♦♦ | ♦♦ | 
| Computer Game Design & Development | ♦♦ | ♦♦♦♦ | ♦♦♦ | 
| Data Science & Analytics | ♦♦♦ | ♦♦ | ♦♦ | 
| Information Systems | ♦ | ♦♦ | ♦♦♦♦♦ | 
| Information Security & Assurance | ♦♦ | ♦♦♦ | ♦♦♦♦♦ | 
| Cybersecurity | ♦♦ | ♦♦♦♦ | ♦♦♦♦♦ | 
