The Department of Computing Security (CSEC) advances the state of the art in cybersecurity and provides students with the education they need to launch their careers as world-class cybersecurity professionals. CSEC students get hands-on training in how to protect computers, networks, and data, and they take that into the world through co-op opportunities with industry leaders and security competitions. Students also work alongside expert faculty to investigate protecting connected cars, defending wireless communications in the Internet of Things, improving online privacy, and many other ways to secure our world.
Collegiate Cyber Defense Competition National Champions
Median salary, according to Bureau of Labor Statistics
Unemployment rate in cybersecurity field (Rasmussen)
RIT is helping the area’s sharpest young minds gain an interest in cybersecurity careers through free summer programs for middle and high school students. The Co-ed RIT GenCyber camp will be held July 8–12, while the RIT GenCyber for Girls camp will be held July 22–26.
The main topic of conversation during Scott Brink’s co-op interviews was almost always about cybersecurity competitions. Luckily, Brink has thousands of hours invested in hacking competitions from his time at RIT. Brink, a 2019 graduate of RIT’s computing security program, credits those cybersecurity competitions and student clubs with helping him succeed in the major.
The Bachelor of Science degree in computing security produces professionals who understand people and processes that impact information security. In addition to possessing state-of-the-art knowledge in the preservation of information assets, students become experts in the identification of computer security vulnerabilities, proving an attack occurred, identifying its origin, assessing the damage, and designing strategies that ensure data can be recovered.
Preserve information assets, identify computer security vulnerabilities, and understand the forensics needed to prove an attack occurred, from identifying its origin and assessing the extent of the damage to designing strategies that ensure data recovery.
The Master of Science in computing security gives students an understanding of the technological and ethical roles of computing security in today’s society and its importance across the breadth of computing disciplines. The program enables students to develop a strong theoretical and practical foundation in secure computing, preparing them for leadership positions in both the private and public sectors.
Develop a solid foundation in cyber security as you understand how integrated systems are designed and developed, and the leadership skills that are paramount for guiding an industry that’s still exploring its role and impact in society.
With the prevalence of mobile computing, the advantages of cloud computing, the ubiquity of computing in general, and the issues of securing big data caused by the world-wide explosion of eBusiness and eCommerce today, secure computing environments and appropriate information management have become critical issues to all sizes and types of organizations. Therefore, there is a vital and growing need for all computing professionals to have a foundation in the issues critical to information security and how they apply to their specific disciplines. The minor consists of two required courses and three electives chosen by the student from the computing security advanced course clusters. There are many elective course choices to provide flexibility. Therefore, the minor provides any computing major outside of the computing security degree program with basic knowledge of the issues and technologies associated with computing security and allows students the opportunity to select a set of security electives that are complementary to their majors. Before beginning the minor in students must possess prerequisite knowledge that can be obtained from various programming sequences and courses in calculus and discrete math.
With the prevalence of data breaches and cyber-attacks, securing intellectual properties and customer’s personally identifiable information has become increasingly challenging in business, government, and academia. It is commonly recognized that a key factor for having a cyber-secured environment and operations is well-trained employees with good cyber hygiene. A small human error may lead to a disastrous cyber incident. The cybersecurity risk management minor is designed for students in non-computing majors who are interested in learning about cybersecurity and developing the knowledge and skills to support organizations in their efforts to protect their computing and informational resources. Students learn the basics of computing and cybersecurity and then gain knowledge and practice in cybersecurity policy and law, risk management, and business continuity plans in the event of a cybersecurity attack.
Here you will find additional resources for the Department of Computing Security, such as accreditations, scholarships, lab resources, etc. View resources
Here you will find information regarding the Department of Computing Security orientation events this fall, depending on whether you are an entering freshmen, transfer, or graduate student. View Orientation details