Skip to content Skip to navigation

Computing Security Minor

Bo Yuan, Chair
(585) 475-4468,

With the prevalence of mobile computing, the advantages of cloud computing, the ubiquity of computing in general, and the issues of securing big data caused by the world-wide explosion of eBusiness and eCommerce today, secure computing environments and appropriate information management have become critical issues to all sizes and types of organizations. Therefore, there is a vital and growing need for all computing professionals to have a foundation in the issues critical to information security and how they apply to their specific disciplines. The minor consists of two required courses and three electives chosen by the student from the computing security advanced course clusters. There are many elective course choices to provide flexibility. Therefore, the minor provides any computing major outside of the computing security degree program with basic knowledge of the issues and technologies associated with computing security and allows students the opportunity to select a set of security electives that are complementary to their majors. Before beginning the minor in students must possess prerequisite knowledge that can be obtained from various programming sequences and courses in calculus and discrete math.

Required Courses
CSEC-101 Fundamentals of Computing Security
Plus one of the following:
   CSEC-362    Cryptography and Authentication
   CSCI-462    Introduction to Cryptography
Choose three of the following
   CSEC-380    Principles of Web Application Security
   CSEC-461    Computer System Security
   CSEC-462    Network Security and Forensics
   CSEC-465    Network and System Security Audits
   CSEC-466    Introduction to Malware
   CSEC-467    Mobile Device Security and Forensics
   CSEC-468    Risk Management for Information Security
   CSEC-470    Covert Communications
   CSEC-471    Penetration Testing Frameworks and Methodologies
   CSEC-472    Authentication and Security Models
   CSEC-473    Cyber Defense Techniques
   CSEC-474    Unix Based System Forensics
   CSEC-475    Windows System Forensics
   CSEC-476     Malware Reverse Engineering
   CSEC-477    Disaster Recovery Planning
   CSCI-455    Principles of Computer Security
   CSCI-464    Xtreme Theory
   CSCI-531    Introduction to Security Measurement
   CSCI-532    Introduction to Intelligent Security Systems
   SWEN-331    Engineering Secure Software
   SWEN-467    Hardware/Software Co-Design for Cryptographic Applications