Cybersecurity Master of Science Degree
Cybersecurity
Master of Science Degree
- RIT /
- Rochester Institute of Technology /
- Academics /
- Cybersecurity MS
Overview for Cybersecurity MS
STEM-OPT Visa Eligible: The STEM Optional Practical Training (OPT) program allows full-time, on-campus international students on an F-1 student visa to stay and work in the U.S. for up to three years after graduation.
RIT is designated as a National Center of Academic Excellence in Cybersecurity Research and Education by the National Security Agency.
Study at RIT’s new ESL Global Cybersecurity Institute, a state-of-the-art, 52,000-square-foot facility designed for advanced cybersecurity education, training, and research.
There is critical importance to building security and survivability into the hardware and software of computing systems as they are designed and developed, rather than trying to add it on once these systems have been designed, developed, and installed. Our master's in cybersecurity gives you an understanding of the technological and ethical roles of computing security in today's society and its importance across the breadth of computing disciplines.
RIT’s Cybersecurity Master’s Degree
RIT’s master’s in cybersecurity enables you to develop a strong theoretical and practical foundation in security computing, preparing you for leadership positions in the cybersecurity industry, academia, or research careers, or to pursue a more advanced degree in cybersecurity or another computing discipline.
The cybersecurity master’s degree is designed for students who have an undergraduate computing degree in an area such as computing security, computer science, information technology, networking, or software engineering, as well as those who have a strong background in a field in which computers are applied, such as computer or electrical engineering.
Cybersecurity MS Courses
The cybersecurity master’s degree consists of core courses, technical electives, and a thesis, project, or capstone experience.
You can develop a specialization in one of several cybersecurity-related areas by selecting technical electives under the guidance of a faculty advisor.
ESL Global Cybersecurity Institute: Advancing Cybersecurity Education
The ESL Global Cybersecurity Institute is a state-of-the-art, 52,000-square-foot facility designed for advanced cybersecurity education, training, and research. You will learn from experts who have developed a world-class curriculum that covers cybersecurity to managing information systems as you build secure systems and new technologies. You'll also have access to the Cyber Range, which generates the real world feel of responding to a cybersecurity crisis for governments and industries to test their security and identify innovative/effective solutions.
-
30% Tuition Scholarship for NY Residents and Graduates
Now is the perfect time to earn your Master’s degree. If you’re a New York state resident with a bachelor’s degree or have/will graduate from a college or university in New York state, you are eligible to receive a 30% tuition scholarship.
Careers and Cooperative Education
Typical Job Titles
Associate Detection and Response Engineer | Backend Developer | Cyber Defense Solutions Engineer |
Cyber Security Analyst | Cyber Security Consultant | GRC Consultant |
Incident Response Analyst | Information Technology Analyst | Security Engineer |
Systems Engineer |
Cooperative Education
What makes an RIT education exceptional? It’s the ability to complete relevant, hands-on career experience. At the graduate level, and paired with an advanced degree, cooperative education and internships give you the unparalleled credentials that truly set you apart. Learn more about graduate co-op and how it provides you with the career experience employers look for in their next top hires.
Cooperative education is optional but strongly encouraged for graduate students in the computing security MS degree.
Featured Work and Profiles
-
Making Self-Driving Vehicles Safer From Hacking
RIT cybersecurity researchers are preparing connected vehicle networks for the next stage of cybersecurity—the post-quantum era.
Read More about Making Self-Driving Vehicles Safer From Hacking -
Amazon Exec Empowers Next-Gen Cybersecurity Talent
Amazon executive and RIT alum Arthur Deane ’08 (electrical engineering) is helping cybersecurity students unlock opportunities in the rapidly growing tech sector.
Read More about Amazon Exec Empowers Next-Gen Cybersecurity Talent -
Meet Nishi Prasad
Last summer, Nishi Prasad completed a co-op with RIT and Eaton Corporation, testing embedded devices. The co-op opened doors for her at RIT as a student leader and connected her to the university and...
Read More about Meet Nishi Prasad
Curriculum for 2024-2025 for Cybersecurity MS
Current Students: See Curriculum Requirements
Cybersecurity (thesis option), MS degree, typical course sequence
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-604 | Cryptography and Authentication In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics. (Prerequisites: (MATH-190 and BS/MS students in Computing Security) or students matriculated in the COMPSEC-MS program.) Lecture 3 (Fall). |
3 |
CSEC-742 | Computer System Security The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall). |
3 |
Research Electives |
6 | |
Advanced Electives |
6 | |
Second Year | ||
CSEC-790 | MS Thesis This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference. (Enrollment in this course requires permission from the department offering the course.) Thesis (Fall, Spring, Summer). |
6 |
Advanced Electives |
6 | |
Total Semester Credit Hours | 30 |
Cybersecurity (capstone option), MS degree, typical course sequence
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-604 | Cryptography and Authentication In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics. (Prerequisites: (MATH-190 and BS/MS students in Computing Security) or students matriculated in the COMPSEC-MS program.) Lecture 3 (Fall). |
3 |
CSEC-742 | Computer System Security The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall). |
3 |
Research Electives |
6 | |
Advanced Electives |
6 | |
Second Year | ||
CSEC-7XX | Capstone Research Elective |
3 |
Advanced Electives |
9 | |
Total Semester Credit Hours | 30 |
Admissions and Financial Aid
This program is available on-campus only.
Offered | Admit Term(s) | Application Deadline | STEM Designated |
---|---|---|---|
Full‑time | Fall | Rolling | Yes |
Part‑time | Fall | Rolling | No |
Full-time study is 9+ semester credit hours. Part-time study is 1‑8 semester credit hours. International students requiring a visa to study at the RIT Rochester campus must study full‑time.
Application Details
To be considered for admission to the Cybersecurity MS program, candidates must fulfill the following requirements:
- Complete an online graduate application.
- Submit copies of official transcript(s) (in English) of all previously completed undergraduate and graduate course work, including any transfer credit earned.
- Hold a baccalaureate degree (or US equivalent) from an accredited university or college in computing security, computer science, software engineering, information technology, networking, computer engineering, electrical engineering, applied mathematics, or computer engineering technology (exceptional students from other fields may be admitted on a contingent basis). A minimum cumulative GPA of 3.0 (or equivalent) is recommended.
- Satisfy prerequisite requirements and/or complete bridge courses prior to starting program coursework.
- Submit a current resume or curriculum vitae.
- Submit a personal statement of educational objectives.
- Submit one letter of recommendation.
- Entrance exam requirements: GRE optional for Fall 2025 applicants. No minimum score requirement.
- Submit English language test scores (TOEFL, IELTS, PTE Academic), if required. Details are below.
English Language Test Scores
International applicants whose native language is not English must submit one of the following official English language test scores. Some international applicants may be considered for an English test requirement waiver.
TOEFL | IELTS | PTE Academic |
---|---|---|
88 | 6.5 | 60 |
International students below the minimum requirement may be considered for conditional admission. Each program requires balanced sub-scores when determining an applicant’s need for additional English language courses.
How to Apply Start or Manage Your Application
Cost and Financial Aid
An RIT graduate degree is an investment with lifelong returns. Graduate tuition varies by degree, the number of credits taken per semester, and delivery method. View the general cost of attendance or estimate the cost of your graduate degree.
A combination of sources can help fund your graduate degree. Learn how to fund your degree
Additional Information
Prerequisites
Applicants must satisfy prerequisite requirements in discrete mathematics, statistics, and computing (programming including Python, computer networking theory and practice, and systems administration theory and practice).
Bridge Courses
Students whose undergraduate preparation or employment experience does not satisfy the prerequisites required for the program may make up for deficiencies through additional study. Bridge course work, designed to close gaps in a student's preparation, can be completed either before or after enrolling in the program as advised by the graduate program director. Generally, formal acceptance into the program is deferred until the applicant has made significant progress through this additional preparation.
If completed through academic study, bridge courses must be completed with a grade of B (3.0) or better. Courses with lower grades must be repeated. Bridge courses are not counted toward the 30 credit hours required for the master's degree. However, grades earned from bridge courses taken at RIT are included in a student's graduate grade point average.
A bridge program can be designed in different ways. Courses may be substituted based on availability, and courses at other colleges may be applied. All bridge course work must be approved in advance by the graduate program director. For more information on the bridge program, please consult the Computing Security MS Student Handbook.
Research
Cybersecurity faculty are actively engaged in consulting and research in various areas of secure computing and information assurance, such as cryptography, databases, networking, secure software development, and critical infrastructure security. There are opportunities for students to participate in research activities towards capstone completion or as independent study work.
In addition, the Golisano College of Computing and Information Sciences is home to some of the world’s leading researchers in cybersecurity. Researchers explore attacking and defending, and developing next generation solutions for industry and individuals. Learn more about ongoing research at the college’s Global Cybersecurity Institute.
Related News
-
December 10, 2024
Malicious email, purportedly from PayPal; slips through filter; Pennsylvania woman bilked out of $15,000
WHTM-TV talks with Jonathan Weissman, principal lecturer in the Department of Cybersecurity, about the scams.
-
November 25, 2024
International research experience in Sweden seeks to develop the AI-enhanced workplace
A new National Science Foundation grant will allow 18 RIT students to travel to Sweden and conduct artificial intelligence (AI) research that enhances the industrial workplace. The students will take part in a program of AI research, professional development, and mentorship, which includes eight weeks at University West, near Gothenburg, Sweden.
-
November 21, 2024
Detecting digital deception
Today, artificial intelligence is being used to manipulate media. At RIT, a team of student and faculty researchers is leading the charge to help journalists and intelligence analysts figure out what is real and what is fake. Their work has more than $2 million in funding from the National Science Foundation and Knight Foundation.
Contact
- Paola Pena Rodriguez
- Senior Assistant Director
- Office of Graduate and Part-Time Enrollment Services
- Enrollment Management
- 585‑475‑5529
- paeges@rit.edu
- Sumita Mishra
- Professor
- Department of Cybersecurity
- Golisano College of Computing and Information Sciences
- 585‑475‑4475
- sumita.mishra@rit.edu
Department of Cybersecurity