BS Computing Security Overview

Housed in the Department of Computing Security within the RIT’s Golisano College of Computing and Information Sciences (GCCIS) this program is the first of its kind in the nation. The Computing Security BS degree was developed to respond to the increasing need for undergraduate advanced studies in the areas of computing and network security and forensics. As the program matures the program is broadening its scope and adding more aspects of security to the curriculum such as mobile device security, database and web security, secure software development, and security science.  Due to the technical nature of this program it is well suited for students who are strong in mathematics and the sciences. The hands-on and experiential nature of our curriculum provides our students with the opportunity to be among the best in this discipline when they graduate. Our unique blend of active learning, lab based courses, and opportunities for independent exploration at the advanced levels make our program a leader in this discipline.

The BS in Computing Security is designed to produce graduates who will be experts in the identification of computer security vulnerabilities, the detection of computer security exploits, and the prevention or mitigation of the resulting attacks. Their coursework includes a complement of core courses which gives the students a firm foundation in the broad spectrum of computing including programming, scripting, databases, computing security, cryptography, security policy, networks, systems and network administration. This is followed by six advanced courses in a security focus area of their choosing. This allows the student to gain in-depth knowledge in their area of interest. If for example a student selects the forensics cluster they will gain knowledge of the forensic requirements of proving that an attack occurred and where it originated across various system platforms, networks, or mobile devices. Additionally, they will have the knowledge needed to diagnose the extent of the attack so that damage can be repaired and the extent of any information loss assessed.  In their senior year they will participate in a team based senior capstone project which will enable them to draw on the breadth of their knowledge and experience to design and develop a security strategy for a predefined scenario.