Rochester Institute of Technology

Academic Program Overviews

Student Skills & Capabilities, Salary Data, Career Information 

Computing Security BS

Program Overview

 The BS in Computing Security is designed for students who are interested in computer science and eager to defend the industry and national cyberinfrastructure from constant attacks by adversaries. The program aims to equip students with fundamental to advanced knowledge and skills in computing security and nurture their critical thinking, creativity, and problem-solving acumen. 
Graduates from the program will be able to identify computing systems and network vulnerabilities, as well as detect and prevent attempts of intrusion and exploitation. They will be capable of conducting professional penetration testing for an enterprise network or perform a security assessment for applications and IoT devices.   They will also be able to execute a detailed digital forensic investigation after a cyber breach. Lastly, they will have the knowledge needed to diagnose the extent of the attack to mitigate damage and assess the extent of any information loss.  
Coursework in the Computing Security program includes a complement of core courses which provides students with a firm foundation in computer programming, networking, systems administration, and computing security fundamentals. In advanced studies, students can select from a variety of concentration areas such as network and systems security, digital forensics and malware analysis, or software and application security including security coding, which allows students to gain in-depth knowledge in their areas of interest.

Degrees Awarded

  • Bachelor of Science

Enrollment

  • Approximately 375 students are enrolled in the Computing Security degree program.

Cooperative Education & Experiential Education Component

  • Students are required to complete two co-op work assignments.

Salary Information

Co-op:        $21.53               $9.00 - $50.00
BS:              $75,306

Student Skills & Capabilities

End of the Second Academic Year
Basic computer and network security awareness as well as exposure to security policy and legal issues.  Strong programming skills in various computing language including Sripting, Python, Java, C/C++. Direct experience in a variety of computing environments on multiple platforms, including Windows, MacOS, and Linux. Basic system administration functions.
 
During the Third and Fourth Academic Year
Intermediate to advanced computing security techniques associated various focused specialty areas such as System and Network Security, Digital Forensics, Malware Analysis, Security Software Development, and Database Security.

Accreditation

Accreditations
RIT is accredited by the Middle States Commission on Higher Education which is the unit of the Middle States Association of Colleges and Schools that accredits degree-granting colleges and universities in the Middle States region, which includes Delaware, the District of Columbia, Maryland, New Jersey, New York, Pennsylvania, Puerto Rico, and the US Virgin Islands.
 

Designations
RIT has been designated as a National Center of Academic Excellence in Cyber Defense Education and Research by National Security Agency and Department of Homeland Security.

 

Equipment & Facilities

RIT students have access to hundreds of computers which are distributed over several specialty labs. These labs include: Security Lab, Air-Gap Lab, Networking Lab, the Systems Administration Lab, programming labs and database labs. Each of these facilities is fully equipped with high performance workstation machines and make extensive use of virtualization technologies to provide a wide variety of operating system environments.  Labs have a full array of networking equipment from a variety of vendors, equipped with wireless access points with 802.11a,b,g,n protocols, layer 3 switches, as well as network simulation, network data capture and virtualization software. Security Lab includes a full assortment of firewalls, IDS, VPN bundles, layer 3 switches, routers, digital forensics software, and various other pieces of security-related software. Air-Gap Lab has a standalone cloud infrastructure along with 10 sets of servers and network devices for students to configure their own enterprise networks in cyber-attack and defense exercises and Pentesting projects. Computing security students have access to commercial grade enterprise security produces such as IBM QRadar SIEM suit, McAfee ePO suit, Splunk, etc., and forensics tools such as EnCase, and FTK.

Nature of Work

Information security analysts must continually adapt to stay a step ahead of cyberattackers, keeping up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization, which may involve attending cybersecurity conferences to learn firsthand accounts of other professionals who have experienced new types of attacks. IT security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. This includes preventive measures such as regularly copying and transferring data to an offsite location and plans to restore proper IT functioning after a disaster. Because information security is critical, these workers usually report directly to upper management. Many information security analysts work with an organization’s computer and information systems manager or chief technology officer (CTO) to design security or disaster recovery systems. (Source: O.O.H ’16-‘17.)

Training / Qualifications

Information security continues to develop as a career field, and many schools are responding with information security programs for prospective job seekers. Currently, a well-rounded computer education is preferred. Employers of information security analysts may prefer applicants who have a master’s degree in information systems. Important Qualities: Analytical skills. Analysts must study computer systems and networks and assess risks to determine how security policies and protocols can be improved. Detail oriented. Because cyberattacks can be difficult to detect, analysts pay careful attention to their computer systems and watch for minor changes in performance. Ingenuity. Analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks. Problem-solving skills. Analysts respond to security alerts and uncover and fix flaws in computer systems and networks. (Source: O.O.H ’16-‘17.)

Job Outlook

Employment of information security analysts is projected to grow 36 percent from 2014 to 2024, much faster than the average for all occupations. Demand for information security analysts is expected to be very high. Cyberattacks have grown in frequency, and analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating problems for computer networks. The federal government is expected to greatly increase its use of information security analysts to protect the nation’s critical information technology (IT) systems. As the healthcare industry expands its use of electronic medical records, ensuring patients’ privacy and protecting personal data are becoming more important. The increasing adoption of cloud services by small- and medium-sized businesses that do not have their own dedicated IT departments could increase the employment of information security analysts. (Source: U.S. Bureau of Labor Statistics O.O.H ’16-‘17.)

Job Titles

Computer Security Analyst, Cyber Security Engineer, Information Security Analyst, Junior Security Engineer
Malware Analyst, Network Engineer, Security Analyst, Site Reliability Engineer, Systems Engineer

Employment

Employment of information security analysts is projected to grow 36 percent in computer systems design and related services from 2014 to 2024. Median annual wage for information security analysts was $90,120 in May 2015. The median wage is the wage at which half the workers in an occupation earned more than that amount and half earned less. The lowest 10 percent earned less than $51,280, the highest 10 percent earned more than $143,770. (Source: O.O.H ’16-‘17.)

Significant Points

  • RIT is a top 100 National University: https://www.rit.edu/overview/rankings-and-recognition,
  • with a dedicated department for Computing Security, being the first university in the U.S. to offer an academic department devoted entirely to the field (https://csec.rit.edu/),
  • inside a dedicated college for Computing and Information Sciences (http://www.rit.edu/gccis/).
  • Our department is designated as a Center of Academic Excellence in both Research and Education by National Security Agency and Department of Homeland Security: http://www.rit.edu/news/story.php?id=62888&source=enewsletter.
  • RIT boasts a dedicated Center for Cybersecurity which partners with industry leaders to understand cybersecurity needs and serves as a hub for various research projects: https://www.rit.edu/cybersecurity/.
  • The Center has major RIT support-(over $2M): https://www.rit.edu/showcase/index.php?id=342 RIT just received a $50M gift, of which $20M goes to cybersecurity: http://www.rit.edu/news/story.php?id=65352.
  • Our Collegiate Cyber Defense Competition (CCDC) team won Nationals in 2013: https://www.rit.edu/gccis/computingsecurity/news/rit-ccdc-team-heading-nationals.
  • Our department created the Collegiate Penetration Testing Competition and now hosts the National event (NCPTC): http://www.nationalcptc.org/

Selected Employer Hiring Partners

Apple, Bank of America, Cisco, Eaton Corporation, FBI, IBM Corporation, Indeed.com, Intuit
JPMorgan Chase, Juniper Networks, Lockheed Martin, Mitre Corporation, National Security Agency
Parsons, Paychex, Raytheon, Ultimate Software, Symantec Corporation, Wegmans

Contact Us

We appreciate your interest in hiring RIT co-ops, graduating students or alumni. We will make every effort to ensure your recruiting endeavor is a success. Call our office and ask to speak with Michelle Magee, the career services coordinator who works with the Computing Security program. For your convenience, you can access information and services through our web site at www.rit.edu/recruit.
 

Michelle A. Magee, Sr. Associate Director, This email address is being protected from spambots. You need JavaScript enabled to view it.; 585.475.7824
Rochester Institute of Technology . Office of Career Services and Cooperative Education
Bausch & Lomb Center
57 Lomb Memorial Drive . Rochester NY  14623-5603
585.475.2301