Admissions Portal


actn-question-header
liveperson actn-apply actn-mail

Computing Security MS

Program overview

Developers of computing systems and practitioners in all computing disciplines need an understanding of the critical importance of building security and survivability into the hardware and software of computing systems they design, rather than trying to add it on once these systems have been designed, developed, and installed.

The MS in computing security gives students an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines. Students can develop a specialization in one of several security-related areas by selecting technical electives under the guidance of a faculty adviser. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors of the computing security industry, for academic or research careers in computing security, or to pursue a more advanced degree in a computing discipline.

Curriculum

The program is designed for students who have an undergraduate computing degree in an areas such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering.

The curriculum consists of three required core courses, up to 6 technical electives (depending on the capstone option chosen), and a capstone thesis, project, or capstone course for a total of 30 semester credit hours. 

Electives

Students are required to choose up to six technical electives from the following courses.

Course
CSEC-730 Advanced Computer Forensics
CSEC-731 Web Server and Application Security Audits
CSEC-732 Mobile Device Forensics
CSEC-733 Information Security Risk Management
CSEC-741 Sensor and SCADA Security
CSEC-742 Computer System Security
CSEC-743 Computer Viruses and Malicious Software
CSEC-744 Network Security
CSEC-750 Covert Communications
CSEC-751 Information Security Policy and Law
CSEC-759 Enterprise Security Solutions

Computing security (thesis option), MS degree, typical course sequence

CourseSem. Cr. Hrs.
First Year
CSEC-601 Research Methods and Proposal Development 3
CSEC-603 Enterprise Security 3
CSEC-604 Cryptography and Authentication 3
  Technical Electives 12
CSEC-790 MS Thesis 3
Second Year
  Technical Elective 3
CSEC-790 MS Thesis 3
Total Semester Credit Hours 30

Computing security (project option), MS degree, typical course sequence

CourseSem. Cr. Hrs.
First Year
CSEC-601 Research Methods and Proposal Development 3
CSEC-603 Enterprise Security 3
CSEC-604 Cryptography and Authentication 3
  Technical Electives 15
Second Year
  Technical Elective 3
 CSEC-791 MS Project 3
Total Semester Credit Hours 30

Computing security (capstone course option), MS degree, typical course sequence

CourseSem. Cr. Hrs.
First Year
CSEC-601 Research Methods and Proposal Development 3
CSEC-603 Enterprise Security 3
CSEC-604 Cryptography and Authentication 3
  Technical Electives 15
Second Year
  Technical Elective 3
CSEC-793 Capstone in Computing Security 3
Total Semester Credit Hours 30

Admission requirements

To be considered for admission to the MS in computing security, candidates must fulfill the following requirements:

  • Hold a baccalaureate degree in computing security, computer science, software engineering, information technology, networking, computer engineering, electrical engineering, applied mathematics, or computer engineering technology (exceptional students from other fields may be admitted on a contingent basis),
  • Have a minimum grade point average equivalent to a 3.0/4.0,
  • Submit official transcripts (in English) of all previously completed undergraduate and graduate course work,
  • Submit a minimum of two recommendations from individuals who are well-qualified to assess the applicant's potential for success, and
  • Complete a graduate application.
  • International applicants whose native language is not English must submit scores from the Test of English as a Foreign Language. Minimum scores of 570 (paper-based) or 88 (Internet-based) are required. Applicants who have completed undergraduate study at foreign universities must submit Graduate Record Examination (GRE) scores. GRE scores are also recommended for applicants whose undergraduate GPA is below 3.0.

Prerequisites

Applicants must satisfy prerequisite requirements in mathematics (integral calculus, discrete mathematics), statistics, natural sciences (physics, chemistry, etc.), and computing (programming, computer networking theory and practice, and systems administration theory and practice).

Bridge program

Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.

If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average.

A bridge program can be designed in different ways. Courses may be substituted based upon availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director.

Additional information

Study options

Students may pursue the degree on a full-time basis, on-campus only.

Faculty

The program faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.

Maximum time limit

University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.


Related Links


Program(s) You Might Also Consider