Computing Security Resources

Accreditations and Designations

Accreditation

Middle States Commission on Higher Education

Designations

Center of Academic Excellence in Cybersecurity Education and Research by the National Security Agency (NSA) and the Department of Homeland Security (DHS)

BS Student Resources

Meet your advisors

Students with last names beginning A-K
Lynn Wildman headshot
Assistant Director of Computing Security
Department of Computing Security
Golisano College of Computing and Information Sciences
585-475-5322

 

Students with last names beginning L-Z

 

A matriculated student in the B.S. in Computing Security needs to take 6 elective courses. It is required to take 3 courses from one of the following clusters, and 3 courses from the approved Advanced Electives. If the course has

Students can create customized clusters for their special interests provided compositions of clusters are vested by one faculty, one student academic advisor, and approved by the department chair. Courses in a customized cluster should be on the list of approved advanced elective courses of Computing Security. To be counted as a cluster course, a GCCIS course not on the list of advanced elective courses of Computing Security needs to be approved by the chair on a case by case basis, or simply such a course can be counted as a free elective for students. A course prepended with an asterisk is a required course for the cluster.

* Required course.

Network and System Security:

  • *CSEC 461 Computer System Security
  • *CSEC 462 Network Security and Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSEC 473 Cyber Defense Techniques
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Offensive Security Engineering
  • CSEC 530 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy
  • CSEC 569 Wireless Security

Forensics & Malware:

  • *CSEC 464 Computer Systems Forensics
  • *CSEC 476 Malware Reverse Engineering
  • CSEC 462 Network Security and Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 470 Covert Communications (WI-GE)
  • CSEC 520 Cyber Analytics and Machine Learning

Software Security:

  • *SWEN 261 Introduction to Software Engineering
  • *SWEN 331 Engineering Secure Software
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 468 Risk Management for Information Security
  • CSEC 559 Hacking for Defense
  • CSEC 559 Offensive Security
  • CSEC 559 Blockchain and Smart Contracts
  • CSEC 530 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy

  • **CSEC 731 Web Server and Application Security Audits
  • **CSCI 622 Data Security and Privacy
  • **CSCI 642 Secure Coding

Security Management and Evaluation:

  • *CSEC 468 Risk Management for Information Security
  • *CSEC 477 Disaster Recovery Planning and Business Continuity
  • CSEC 465 Network & System Security Audit
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSCI 531 Introduction to Security Measurement
  • CSCI 532 Introduction to Intelligent Security Systems
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Hacking for Defense
  • CSEC 559 Usable Security and Privacy

Electives:

  • CSCI 455 Principles of Computer Security
  • CSCI 464 Xtreme Theory
  • CSCI 531 Introduction to Security Measurement
  • CSCI 532 Introduction to Intelligent Security Systems
  • **CSCI 622 Data Security and Privacy
  • **CSCI 642 Secure Coding
  • **CSCI 762 Advanced Cryptography
  • CSEC 461 Computer System Security
  • CSEC 462 Network Security and Forensics
  • CSEC 464 Computer Systems Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 466 Introduction to Malware
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 468 Risk Management for Information Security
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSEC 473 Cyber Defense Techniques
  • CSEC 470 Covert Communications (WI)
  • CSEC 476 Malware Reverse Engineering
  • CSEC 477 Disaster Recovery Planning and Business Continuity
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Hacking for Defense
  • CSEC 559 Offensive Security Engineering
  • CSEC 559 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy
  • CSEC 569 Wireless Security
  • **CSEC 731 Web Server and Application Security Audits
  • SWEN 261 Introduction to Software Engineering
  • SWEN 331 Engineering Secure Software

BS/MS Student Resources

BS/MS Overview and Eligibility The BS/MS in the Computing Security program is for undergraduate students who wish to earn both a BS and MS in Computing Security. A student accepted into this program will be able to take up to three graduate courses (9 semester credit hours) in Computing Security and apply them to both the BS and MS degree requirements. These courses would take the place of three of the advanced security courses in the undergraduate degree and will be considered electives in the graduate degree. This three course overlap will give students the opportunity to complete both degrees in five years given careful planning and execution.

Admissions Requirements:
  • 1. Students must have a minimum cumulative GPA of a 3.25.
  • 2. Student must be at least third year standing.
  • 3. Students must complete 20 semester credits of computing coursework before applying.
  • 4. For students whose BS curriculum requires co-op, a minimum of 1 co-op must be completed before applying.
  • 5. Students must complete a brief statement outlining why they are interested in the BS/MS program and what area of focus they think they are interested in pursuing.
  • 6. Students must provide one letter of recommendation from a GCCIS professor explaining your potential for the BS/MS program. *It is important to note that we cannot guarantee acceptance into the BS/MS program even if entrance criteria are met, as it will depend on the demand and on the space available in our program from term to term.

**All students who turn in an official Change of Program Application Form will be evaluated at the end of the term once grades for the current term post. It should be noted that a student will not receive their Bachelor’s degree until the requirements for both the BS and MS degrees have both been completed. 

Academic details:
  • You can “double-count” up to three courses (9 semester credits) in the BS and MS degrees (typically in the Advanced elective area).
  • You “officially” become a graduate student at year level 6 when you have earned 126 semester credits. From this point on, you will be able to register yourself for graduate courses in SIS on the graduate career; until then, you will need to register graduate courses on the undergraduate career
  • The lowest passing grade in the graduate program is “C”. You must have a minimum 3.0 GPA in your graduate program in order to earn your MS degree.
  • There is no grade replacement in the graduate program. All courses taken and all grades earned remain on your transcript and count in your GPA.
  • In order to be considered full time as an undergraduate student, you must be enrolled in a minimum of 12 semester credits. As a graduate student, you must be enrolled in a minimum of 9 semester credits to be considered full time, however, graduate students are eligible for up to 2 Full Time Equivalencies (FTE) based on remaining course requirements.
  • Avoid duplicate course material, if you take a class listed below at the undergraduate level you cannot take it at the graduate level. Below is a list of duplicate courses between the BS and MS programs.

Undergraduate Course Graduate Course

 

CSEC 461 -------- CSEC 742

CSEC 202 -------- CSEC 743

CSEC 464 -------- CSEC 730

CSEC 470 -------- CSEC 750

CSCI 462 -------- CSEC 604


Completing the program:

  • ALL undergraduate degree requirements must be complete (including wellness and co-op) before you can register for the MS Project, MS Capstone, or Thesis.
  • You must work with the Sr. Staff Specialist to register for either MS Thesis, MS Project, or MS Capstone Course by submitting assigned proposal. Make sure you watch for deadlines
  • If you submit a Thesis proposal you have one year to complete the defense before the proposal expires.
  • There is a 7-year rule in place for all graduate programs. You must complete your graduate work within 7 years of the semester in which you took your first graduate course that counts toward the MS degree.
Financial:
  • You are eligible for a BS/MS tuition discount on the graduate tuition rates. The discount that you receive should bring your graduate tuition charges close to that which you paid for undergraduate. Work with your financial aid counselor for more information.
  • As a graduate student, you can apply for Graduate and Teaching Assistantships (GA/TA) both in the CSEC department and across campus. These positions usually pay a tuition benefit as well as a salary. You might want to check with your Financial Aid Advisor to see if the BS/MS discount or the GA/TA position is more beneficial.   
Administrative:
  • Your program code changes from UCIS, INFOSEC-BS to UCIS, INFOSEC-BS, CSEC-U to GCIS, COMPSEC-MS, CSEC-G.
  • Your courses are split into sections on your transcript by undergraduate and graduate and each has its own GPA statistics.
  • Since you can apply for graduation for your BS and MS degrees separately on SIS, we would like you to apply for your BS degree AND your MS degree at the SAME time. You should apply for BOTH degrees after you have completed 15 graduate semester credits toward your MS degree requirements. 

Prospective Students

Current RIT students that are interested in a Change of Program (COP) into Computing Security must do the following to be considered for the program:

1. Prospective Change of Program students are required to meet with an academic advisor in the Computing Security Department.

  •  You can stop by GOL-1770 or call 585-475-2963 to schedule that meeting. 
  • Students with Last Name A-K with meet with Lynn Wildman, L-Z with Liz Herrmann.

2. Complete the Change of Program form with your current academic advisor. They will email the form to csecadvising@rit.edu to include with your application materials.

3. Submit a personal statement via email addressing the following:

  • Why are you applying?
  • What are your academic strengths & weaknesses?
  • What areas in computing are you passionate about?
  • What are your future goals/career interests?
  • Why do you feel your current major is not the right “fit” for your future goals?
  • Why do you believe this major is the right “fit” for your future goals?

4. If you have not taken Calculus, contact examasst@rit.edu to take the Math Placement Exam.

5. Contact Financial Aid to understand any aid implications a change of major could have.

6. All application materials must be submitted to csecadvising@rit.edu by the last day of final exams of the term prior to entry.
You will not be able to enroll in our courses until after our seat restrictions are lifted (please refer to the seat restriction date in SIS). Provided you meet the pre-requisites, you can add yourself to the waitlist which will automatically enroll you after the restrictions are removed (assuming there are open seats).
Students must meet with our academic advisor to discuss the program and how their previous courses will transfer to the new program. This discussion is important, as it will give you a better idea of what the program is about and if it will extend your stay at RIT. This meeting must take place prior to acceptance.


How will I be notified? 
A CSEC academic advisor will notify you by email regarding the admission decision. If accepted, the advisor will assist you with enrollment any additional scheduling assistance still needed for the upcoming semester.


Admissions Criteria:

  • A MINIMUM Term and Cumulative GPA is a 2.8 is expected.
  • Our program includes several math and programming course requirements; skills in these areas are very important.
  • Admissions decisions are made case-by-case. Meeting the minimum requirements does not guarantee acceptance. Change of major applications may be denied based on the above criteria, academic standing or students’ demonstrated ability to succeed in the major, and overall seats and availability in the program.

Recommended Coursework:

Programming GCIS 123 & 124 or Equivalent
Calculus MATH 181 & 182, or MATH 181A & 182A, or MATH 171, 172, & 173
Discrete Math MATH 190
Intro Computing Security CSEC 140


Once you meet with an advisor, they may make other recommendations based on courses you have already completed. This is why it is important to schedule a meeting with one of our advisors.
If you have additional questions, please contact us at 585-475-2963.

Industrial Advisory Board

 

Boardman, Jim Palo Alto Netowrks
Weeks, Ryan Datto
Pickup, Jason Excellus
Palmer, Michael Hearst
Savacool, Richard Nixon Peabody
Kusse, Jennifer Monroe County
Kempster, Ken Federal Reserve Bank of New York
Kalka, Bob IBM
Striebich, Kirk CERT
Pinch, Mike Security Risk Advisors
Wandera, Max Eaton
Pollard, Jeremy Caffiene.tv
Hirwani, Manish SecureWorks
Watt, Timothy Parsons
Platt, Gregory A. USARMY
Colvin, Todd Rochester Regional Health
Stokes, Kristian FUSE Engineering

 

MS Online Student Resources

Student Ambassadors

Student Club

RITSEC is a student club dedicated to teaching "Security Through Community". RITSEC is dedicated to educating and preparing RIT students to compete in security-related competitions, as well as showcasing RIT student talent in the current world of security today. Whether you're new to computing security or a veteran, RITSEC has a place for you. All of the activities we host to promote this learning can be found on our 'Events' page.

We believe security is for anyone who wants to learn and center our activities around multiple aspects of security. This includes live individual and team-based competitions, hands-on training, student run research, and sponsor talks. Our security exercises cover a wide variety of areas in computing security, including penetration testing, Windows and Linux server hardening, web security, network services, and more! Learn more at the RITSEC website.

Student Competition Resources

Information Security Talent Search (ISTS) competition

Global Collegiate Penetration Test Competition

The Northeast Collegiate Cyber Defense League

National Collegiate Cyber Defense Competition

Technical and Lab Resources

Azure Dev Tools for Teaching - Computing Security students and faculty can download certain Microsoft operating systems, development tools and applications
GCCIS Tutoring Center - Tutoring for introductory programming sequence.
VMware Academic Program (VMAP) - Computing Security students and faculty can download certain VMware products
Mirrors.rit.edu - is a mirror of many linux distros and other open-source projects