Course Sequence

First Year

An introduction to the fundamental issues, concepts and tools common to all areas of computing security. Topics include identifying attackers and their motivations. Essential techniques will be introduced covering the areas of anti-virus, monitoring, virtual machines, account control, and access rights management. Various security models will be investigated. Concept areas such as confidentiality, integrity, availability and privacy will be studied. Class 3, Credit 3 (Fall, Spring)

This course serves as an introduction to computational thinking using a problem-centered approach. Specific topics covered include: expression of algorithms in pseudo code and a programming language; functional and imperative programming techniques; control structures; problem solving using recursion; basic searching and sorting; elementary data structures such as lists, trees, and graphs; and correctness, testing and debugging. Assignments (both in class and for homework) requiring a pseudo code solution and an implementation are an integral part of the course. An end-of-term project is also required. (None) Lecture/Lab 6, Credit 4 (Fall,Spring)

This is the first in a two-course sequence intended for students majoring in mathematics, science or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers two-dimensional analytic geometry, functions, limits, continuity, the derivative, rule of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals. Class 4, Workshop 2, Credit 4 (F, S, Su)

The Year One class serves as an interdisciplinary catalyst for first-year students to access campus resources, services and opportunities that promote self-knowledge, leadership development, social responsibility and life skills awareness and application. Year One is also designed to challenge and encourage first-year students to get to know one another, build relationships and help them become an integral part of the campus community.
Credit 0 (fall)

This course delves further into problem solving by continuing the discussion of data structure use and design, but now from an object-oriented perspective. Key topics include more information on tree and graph structures, nested data structures, objects, classes, inheritance, interfaces, object-oriented collection class libraries for abstract data types (e.g. stacks, queues, maps, and trees), and static vs. dynamic data types. Concepts of object-oriented design are a large part of the course. Software qualities related to object orientation, namely cohesion, minimal coupling, modifiability, and extensibility, are all introduced in this course, as well as a few elementary object-oriented design patterns. Input and output streams, graphical user interfaces, and exception handling are covered. Students will also be introduced to a modern integrated software development environment (IDE). Programming projects will be required. (CSCI-141 Computer Science I) Lecture/Lab 6, Credit 4 (Fall,Spring,Summer)

This is the second in a two-course sequence intended for students majoring in mathematics, science or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves and polar coordinates. (C or better in MATH-181 Project-Based Calculus I) Class 4, Workshop 2, Credit 4 (F, S, Su)

This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students mathematical sophistication and their ability to handle abstract problems. (Co-requisite: MATH-172 Calculus B or MATH-182 Project Based Calculus II) Class 3, Credit 3 (F, S)

This course is an introduction to wired network infrastructures, topologies, technologies and protocols required for effective end-to-end communication. Basic security concepts are also introduced at the local area network communication level. Networking layers 1, 2 and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models. Topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, and routed and routing protocols common in local area networks. Labs will cover the various aspects of communication, management and security on equipment found in industry. (Prerequisite: CSEC-101 Fundamentals of Computing Security)
Class 2, Lab 2, Credit 3 (Fall and Spring)

Global Perspective: Courses in this category encourage students to see life from a perspective wider than their own and to understand the diversity of human cultures within an interconnected global society. Courses explore the interconnectedness of the local and the global in today’s world or in historical examples, and encourage students to see how global forces reverberate at the local level.

First Year Seminar: Two courses in the first year that introduce students to the intellectual life of the university, and provide a focus on communication skills to prepare students for future coursework and life-long learning.

a. LAS Foundation 1: First Year Seminar

b. LAS Foundation 2: ENGL 150 Future of Writing or UWRT 150 Writing Seminar

First Year Writing: Two courses in the first year that introduce students to the intellectual life of the university, and provide a focus on communication skills to prepare students for future coursework and life-long learning.

a. LAS Foundation 1: First Year Seminar

b. LAS Foundation 2: ENGL 150 Future of Writing or UWRT 150 Writing Seminar

Second Year

Students will be introduced to the details of program structure and the mechanics of execution as well as supportive operating system features. Security and performance issues in program design will be discussed. The program translation process will be examined. Programming assignments will be required. (CSCI-142 Computer Science II or CSCI 140 Computer Science for AP Students or CSCI 242 Computer Science for Transfer Students or permission of instructor) Class 3, Credit 3 (Fall,Spring,Summer)

This course will introduce sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistic to real-world problems. (MATH-182 Project-Based Calculus II or permission of instructor) Class 3, Credit 3 (F, S, Su)

This is a course in calculus-based physics for science and engineering majors whose performance on the Math Placement Exam resulted in their placement in MATH-181A. Topics include kinematics, planar motion, Newton’s Laws, gravitation, work and energy, momentum and impulse, conservation laws, systems of particles, rotational motion, static equilibrium, mechanical oscillations and waves, and data presentation/analysis. The course is taught in a workshop format that integrates the material traditionally found in separate lecture and laboratory courses. (Grade of C or better in MATH-181A or equivalent and credit or co-registration in MATH-182) Workshop 8, Credit 4 (F, S)

 

An introduction to the hardware and software organization of computer systems. The course emphasizes a multilevel model of computer organization. Topics include the digital logic level; the micro architecture level; the machine instruction set level; the operating system level; and the assembly language level. Programming assignments will be required. (CSCI-243 The Mechanics of Programming and MATH-190 Discrete Mathematics for Computing) Class 3, Credit 3 (Fall,Spring,Summer)

An introduction to the Unix operating system and scripting in the Perl and Unix shell languages. The course will cover basic user-level commands to the Unix operating system, followed by basic control structures, and data structures in Perl. Examples will include GUI programming, and interfacing to an underlying operating system. Following Perl, students will be introduced to the basics of shell programming using the Unix bash shell. (Prerequisites: ISTE 101 or one year of programming in an object-oriented language.) Studio 4, Credit 3 (Fall, Spring)

A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. (One course in object-oriented programming) Class 3, Credit 3 (F, Sp, Su)

This course is a continuation of PHYS-211, University Physics I. Topics include electrostatics, Gauss' law, electric field and potential, capacitance, resistance, DC circuits, magnetic field, Ampere's law, inductance, and geometrical and physical optics. The course is taught in a lecture/workshop format that integrates the material traditionally found in separate lecture and laboratory courses. (PHYS-211 University Physics I; MATH-182 Project-Based Calculus II (a grade of C or better is required in all prerequisite) Workshop 6, Credit 4 (F, S)

This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies. (Prerequisite: NSSA-220)

MATH-24 Linear Algebra

This course is an introduction to the basic concepts of linear algebra, with an emphasis on matrix manipulation. Topics include Gaussian elimination, matrix arithmetic, determinants, of a matrix, eigenvalues, and eigenvectors. Various applications are studied throughout the course. (MATH-219 Multivariable Calculus or MATH-221 Multivariable and Vector Calculus or MATH-190 Discrete Mathematics for Computing or MATH-192 Discrete Mathematics and Introduction to Proofs) Class 3, Credit 3 (F, S)

 

MATH-252 Probability and Statistics II 
 
This course covers basic statistical concepts, sampling theory, hypothesis testing, confidence intervals, point estimation, and simple linear regression. The statistical software package MINITAB will be used for data analysis and statistical applications. (MATH-251 Probability & Statistics I) Class 3, Credit 3 (F, S)

 

Ethical Perspective: Courses focus on ethical aspects of decision-making and argument, whether at the individual, group, national, or international level. These courses provide students with an understanding of how ethical problems and questions can be conceived and resolved, and how ethical forms of reasoning emerge and are applied to such challenge.

Third Year

This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. (MATH-190 Discrete Mathematics for Computing or equivalent and CSCI-243 The Mechanics of Programming) Class 3, Credit 3 (Fall,Spring,Summer)

In this course, students will study the need for information security policies, procedures and standards. Students will write security policies and examine cases used as precedent for current laws. Other topics may include, but are not limited to, trust models, security policy design, incident response, and review of legal cases. (CSEC-101 Fundamentals of Information Security) Class 3, Credit 3 (Fall & Spring)

As more users access remote systems, the job of identifying and authenticating those users at distance becomes increasingly difficult. The growing impact of attackers on identification and authentication systems puts additional strain on our ability to ensure that only authorized users obtain access to controlled or critical resources. This course reviews basic cryptology techniques and introduces their application to contemporary authentication methods. (CSCI-462 Introduction to Cryptography) Class 3, Credit 3 (Spring)

Free Elective I: Students may choose 12 credits of electives from any program at RIT. The intent of these electives is to enable students to develop expertise in a domain where they wish to apply their skills in computing security. Ideally these selections will enable the student to gain insight into the culture, standards, and practices of their future career environment. The free electives can also be used to complete minors housed outside of the College of Liberal Arts such as Business or to explore other topics of interest to them. Students who want to gain greater depth in computing security may use some or all of these course slots to take additional advanced courses in computing security.

Free Elective II: Students may choose 12 credits of electives from any program at RIT. The intent of these electives is to enable students to develop expertise in a domain where they wish to apply their skills in computing security. Ideally these selections will enable the student to gain insight into the culture, standards, and practices of their future career environment. The free electives can also be used to complete minors housed outside of the College of Liberal Arts such as Business or to explore other topics of interest to them. Students who want to gain greater depth in computing security may use some or all of these course slots to take additional advanced courses in computing security.

Advanced Security Elective I: Matriculated CSEC students will choose 6 advanced electives in Computing Security from a selected set of courses. The list of courses will be reviewed and updated on a regular basis to reflect current topics in the computing security discipline.

Advanced Security Elective II: Matriculated CSEC students will choose 6 advanced electives in Computing Security from a selected set of courses. The list of courses will be reviewed and updated on a regular basis to reflect current topics in the computing security discipline.

Artistic Perspective: Courses focus on the analysis of forms of artistic expression in the context of the societies and cultures that produced and sustained them. These courses provide insight into the creative process, the nature of aesthetic experience, the fundamentals of criticism and aesthetic discrimination, and the ways in which societies and cultures express their values through their art.

Social Perspective: Courses focus on the analysis of human behavior within the context of social systems and institutions. Because RIT recognizes that student success depends on the ability to understand how social groups function and operate, these courses provide insight into the workings of social institutions’ processes.

Immersion I: A series of three related general education courses that further broaden a student’s judgment and understanding within a specific area through deeper learning.

Fourth Year

This is a capstone course for students in the information security and forensics program. Students will apply knowledge and skills learnt and work on real world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications. (4th-year status in INFOSEC-BS) Class 3, Credit 3 (Fall, Spring)

Advanced Security Elective III: Matriculated CSEC students will choose 6 advanced electives in Computing Security from a selected set of courses. The list of courses will be reviewed and updated on a regular basis to reflect current topics in the computing security discipline.

Advanced Security Elective IV: Matriculated CSEC students will choose 6 advanced electives in Computing Security from a selected set of courses. The list of courses will be reviewed and updated on a regular basis to reflect current topics in the computing security discipline.

Advanced Security Elective V: Matriculated CSEC students will choose 6 advanced electives in Computing Security from a selected set of courses. The list of courses will be reviewed and updated on a regular basis to reflect current topics in the computing security discipline.

Advanced Security Elective VI: Matriculated CSEC students will choose 6 advanced electives in Computing Security from a selected set of courses. The list of courses will be reviewed and updated on a regular basis to reflect current topics in the computing security discipline.

Free Elective III: Students may choose 12 credits of electives from any program at RIT. The intent of these electives is to enable students to develop expertise in a domain where they wish to apply their skills in computing security. Ideally these selections will enable the student to gain insight into the culture, standards, and practices of their future career environment. The free electives can also be used to complete minors housed outside of the College of Liberal Arts such as Business or to explore other topics of interest to them. Students who want to gain greater depth in computing security may use some or all of these course slots to take additional advanced courses in computing security.

Free Elective IV: Students may choose 12 credits of electives from any program at RIT. The intent of these electives is to enable students to develop expertise in a domain where they wish to apply their skills in computing security. Ideally these selections will enable the student to gain insight into the culture, standards, and practices of their future career environment. The free electives can also be used to complete minors housed outside of the College of Liberal Arts such as Business or to explore other topics of interest to them. Students who want to gain greater depth in computing security may use some or all of these course slots to take additional advanced courses in computing security.

Immersion II: A series of three related general education courses that further broaden a student’s judgment and understanding within a specific area through deeper learning.

Immersion III: A series of three related general education courses that further broaden a student’s judgment and understanding within a specific area through deeper learning.

Ethics Elective (PHIL 202/PHIL 306):

Ethics is a branch of philosophy dealing with what the proper course of action is to take in any given situation. Computing security students will gain knowledge during their course of study that gives them great technological power.   Students with this knowledge base need to understand the ethical expectations that come with this technological power.  Therefore Computing security students are required to choose one of the following courses as their ethics elective:

 

PHIL-202 Foundations of Moral Philosophy

PHIL-306 Professional Ethics