Part-time & Graduate Enrollment Services
Computing Security (formerly Information Security and Forensics) BS
The scope of computer networks and the span of these systems increases in organizations every day. At the same time, industry and society's dependence on these technologies is growing, as is the creation of damaging software that attacks computing systems and networks. Therefore, security has become a major concern. The result is an increased need for people and technologies that can secure and protect from attack the data assets of an organization as well as the hardware and software infrastructures that house the information.
The BS degree in computing security produces professionals who understand people and processes that impact information security. In addition to possessing state-of-the-art knowledge in the preservation of information assets, students become experts in the identification of computer security vulnerabilities. Students also understand the forensic requirements needed to prove an attack occurred, identify its origin, assess the extent of the damage or loss of information, and design strategies that ensure data can be recovered.
An important goal of the major is to provide students with a level of specialization in information security and forensics beyond what is provided by more general programs offered in information systems or information technology. The major accomplishes this by providing a foundation which includes the breadth of computing disciplines and then allows the student to focus in a particular area of security such as forensics, mobile device forensics, or network or computing system security. Favoring depth over breadth, students are allowed sufficient time to explore the issues and technologies of computer and network security.
The major requires students to complete 126 semester credit hours and includes core courses and advanced courses. The core includes a programming sequence, an ethics course, a computer networking and system administration sequence, and foundation courses in computer and network security. Advanced courses allow students to design the focus of their information security course work.
In addition to the core courses, students complete five advanced security electives that provide the opportunity to expand students' knowledge in one of several disciplines of security. Electives can be taken in areas such as system security, network security, forensics, malware, secure software development, database and application security, security evaluation, and theory.
Computing security, BS degree, typical course sequence (semesters), effective fall 2013
|Course||Sem. Cr. Hrs.|
|CSEC-101||Fundamentals of Computing Security||3|
|CSCI-141||Computer Science I||4|
|LAS Foundation 1: First Year Seminar||3|
|MATH-181||Project-based Calculus I||4|
|MATH-182||Project-based Calculus II||4|
|LAS Perspective 1, 3||6|
|LAS Foundation 2: Writing Seminar||3|
|MATH-190||Discrete Mathematics for Computing||3|
|CSCI-142||Computer Science II||4|
|CSCI-243||The Mechanics of Programming||3|
|MATH-251||Probability and Statistics I||3|
|ISTE-230||Introduction to Database and Data Modeling||3|
|CSCI-250||Concepts of Computer Systems||3|
|PHYS-211||LAS Perspective 6: University Physics I||4|
|PHYS-212||LAS Perspective 6: University Physics II||4|
|NSSA-220||Introduction to Scripting||3|
|LAS Perspective 2||3|
|Cooperative Education (summer)||Co-op|
|CSCI-462||Introduction to Cryptography||3|
|CSEC-363||Cyber Security Policy and Law||3|
|LAS Perspective 4, 5||6|
|LAS Immersion 1 (WI)||3|
|CSEC-472||Authentication and Security Models||3|
|Cooperative Education (summer)||Co-op|
|LAS Immersion 2, 3||6|
|CSEC-490||Capstone in Computing Security||3|
|Total Semester Credit Hours||126|
Please see New General Education Curriculum–Liberal Arts and Sciences (LAS) for more information.
(WI) Refers to a writing intensive course within the major.
* Please see Wellness Education Requirement for more information.
Cooperative education is a required component of the major. Co-op enables students to work in a variety of organizations, from small- or medium-sized businesses to large international companies or law enforcement organizations, that require computer systems or computer networks. These may be security-centric businesses (law enforcement agencies, security auditors) to users of information technology (manufacturing companies, school districts, health care). Completing a co-op provides real-world experience and an edge when applying for jobs after graduation. Typically, the first co-op occurs during the summer following the second year. The remaining co-ops may occur during the student's third year or the following summer. Students must complete the co-op requirement prior to completing their course work.
The major is available on a part-time basis. Courses can be completed during the day and in the evening to accommodate those who work, regardless of their schedules. Please refer to the Part-time Study website (rit.edu/ptgrad/parttime) for more information on this option.