Computing Security MS


Graduate Admissions Counselor

Philip Bradley
585-475-5332, pmbges@rit.edu


Department Contact

Sumita Mishra, Ph.D.
585-475-2963, sumita.mishra@rit.edu


Online Program Available

This program may be completed online. Visit RIT Online for additional information.

Please contact the admissions counselor below for additional information about applying to the online program.

Matt Stever
585-475-5529, mesges@rit.edu


Admission Deadlines & Requirements

Program Available Online? Yes
Application Deadline Rolling
Admit Term Fall
Entrance Exam GRE required for individuals with degrees from international universities
Other
English Language Exams:
TOEFL (Internet) 88
IELTS 6.5
PTE Academic 61

 

Priority deadline - COMPLETE applications that are received by this date are given priority consideration for admission and financial aid (if applicable). Applications received after the priority deadline will be considered on a space-available basis.

Rolling - There is no specific deadline for applications; applications will be accepted and reviewed throughout the year until the program reaches capacity.

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Plan of study

The program is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering.

The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a thesis, project, or capstone course for a total of 30 semester credit hours.

Electives

Students are required to choose up to six technical electives.

Curriculum

Computing security (thesis option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
CSEC-601 Research Methods and Proposal Development 3
CSEC-603 Enterprise Security 3
CSEC-604 Cryptography and Authentication 3
  Technical Electives 15
CSEC-790 MS Thesis 6
Total Semester Credit Hours 30

Computing security (project option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
CSEC-601 Research Methods and Proposal Development 3
CSEC-603 Enterprise Security 3
CSEC-604 Cryptography and Authentication 3
  Technical Electives 18
 CSEC-791 MS Project 3
Total Semester Credit Hours 30

Computing security (capstone course option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
CSEC-601 Research Methods and Proposal Development 3
CSEC-603 Enterprise Security 3
CSEC-604 Cryptography and Authentication 3
  Technical Electives 18
CSEC-793 Capstone in Computing Security 3
Total Semester Credit Hours 30

Elective courses

Course
CSEC-730 Advanced Computer Forensics
CSEC-731 Web Server and Application Security Audits
CSEC-732 Mobile Device Forensics
CSEC-733 Information Security Risk Management
CSEC-741 Sensor and SCADA Security
CSEC-742 Computer System Security
CSEC-743 Computer Viruses and Malicious Software
CSEC-744 Network Security
CSEC-750 Covert Communications
CSEC-751 Information Security Policy and Law
CSCI-620 Introduction to Big Data
CSCI-622 Secure Data Management
CSCI-642 Secure Coding
CSCI-662 Foundations of Cryptography
CSCI-720 Big Data Analytics
CSCI-734 Foundations of Security Measurement and Evaluation
CSCI-735 Foundations of Intelligent Security Systems
CSCI-736 Neutral Networks and Machine Learning
CSCI-762 Advanced Cryptography
CMPE-661 Hardware and Software Design for Cryptographic Applications
ISTE-721 Information Assurance Fundamentals

 

Admission requirements

To be considered for admission to the MS in computing security, candidates must fulfill the following requirements:

  • Complete a graduate application.
  • Hold a baccalaureate degree (or equivalent) from an accredited university or college in computing security, computer science, software engineering, information technology, networking, computer engineering, electrical engineering, applied mathematics, or computer engineering technology (exceptional students from other fields may be admitted on a contingent basis).
  • Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
  • Have a minimum cumulative GPA of 3.0 (or equivalent).
  • Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant’s potential for success.
  • International applicants whose native language is not English must submit scores from the TOEFL, IELTS, or PTE. A minimum TOEFL score of 88 (internet-based) is required. A minimum IELTS score of 6.5 is required. The English language test score requirement is waived for native speakers of English or for those submitting transcripts from degrees earned at American institutions.

Prerequisites

Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average.

A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options

The program is offered online and on campus. 

Faculty

The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit

University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.


Career Outcomes

The RIT Office of Career Services and Cooperative Education website provides information pertaining to student skills and capabilities, salary data, career information, job outcomes, and contact information for the Career Services Coordinator by program.


Related Links


Program(s) You Might Also Consider