Computing Security Resources

Accreditations and Designations

Accreditation

Middle States Commission on Higher Education

Designations

Center of Academic Excellence in Cybersecurity Education and Research by the National Security Agency (NSA) and the Department of Homeland Security (DHS)

BS Student Resources

Meet your advisors

Students with last names beginning A-K

 

Students with last names beginning L-Z

 

A matriculated student in the B.S. in Computing Security needs to take 6 elective courses. It is required to take 3 courses from one of the following clusters, and 3 courses from the approved Advanced Electives. If the course has

Students can create customized clusters for their special interests provided compositions of clusters are vested by one faculty, one student academic advisor, and approved by the department chair. Courses in a customized cluster should be on the list of approved advanced elective courses of Computing Security. To be counted as a cluster course, a GCCIS course not on the list of advanced elective courses of Computing Security needs to be approved by the chair on a case by case basis, or simply such a course can be counted as a free elective for students. A course prepended with an asterisk is a required course for the cluster.

* Required course.

Network and System Security:

  • *CSEC 461 Computer System Security
  • *CSEC 462 Network Security and Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSEC 473 Cyber Defense Techniques
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Offensive Security Engineering
  • CSEC 530 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy
  • CSEC 569 Wireless Security

Forensics & Malware:

  • *CSEC 464 Computer Systems Forensics
  • *CSEC 476 Malware Reverse Engineering
  • CSEC 462 Network Security and Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 470 Covert Communications (WI-GE)
  • CSEC 520 Cyber Analytics and Machine Learning

Software Security:

  • *SWEN 261 Introduction to Software Engineering
  • *SWEN 331 Engineering Secure Software
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 468 Risk Management for Information Security
  • CSEC 559 Hacking for Defense
  • CSEC 559 Offensive Security
  • CSEC 559 Blockchain and Smart Contracts
  • CSEC 530 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy

  • **CSEC 731 Web Server and Application Security Audits
  • **CSCI 622 Data Security and Privacy
  • **CSCI 642 Secure Coding

Security Management and Evaluation:

  • *CSEC 468 Risk Management for Information Security
  • *CSEC 477 Disaster Recovery Planning and Business Continuity
  • CSEC 465 Network & System Security Audit
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSCI 531 Introduction to Security Measurement
  • CSCI 532 Introduction to Intelligent Security Systems
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Hacking for Defense
  • CSEC 559 Usable Security and Privacy

Electives:

  • CSCI 455 Principles of Computer Security
  • CSCI 464 Xtreme Theory
  • CSCI 531 Introduction to Security Measurement
  • CSCI 532 Introduction to Intelligent Security Systems
  • **CSCI 622 Data Security and Privacy
  • **CSCI 642 Secure Coding
  • **CSCI 762 Advanced Cryptography
  • CSEC 461 Computer System Security
  • CSEC 462 Network Security and Forensics
  • CSEC 464 Computer Systems Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 466 Introduction to Malware
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 468 Risk Management for Information Security
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSEC 473 Cyber Defense Techniques
  • CSEC 470 Covert Communications (WI)
  • CSEC 476 Malware Reverse Engineering
  • CSEC 477 Disaster Recovery Planning and Business Continuity
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Hacking for Defense
  • CSEC 559 Offensive Security Engineering
  • CSEC 559 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy
  • CSEC 569 Wireless Security
  • **CSEC 731 Web Server and Application Security Audits
  • SWEN 261 Introduction to Software Engineering
  • SWEN 331 Engineering Secure Software

BS/MS Student Resources

BS/MS Overview and Eligibility The BS/MS in the Computing Security program is for undergraduate students who wish to earn both a BS and MS in Computing Security. A student accepted into this program will be able to take up to three graduate courses (9 semester credit hours) in Computing Security and apply them to both the BS and MS degree requirements. These courses would take the place of three of the advanced security courses in the undergraduate degree and will be considered electives in the graduate degree. This three course overlap will give students the opportunity to complete both degrees in five years given careful planning and execution.

Admissions Requirements:
  • 1. Students must have a minimum cumulative GPA of a 3.25.
  • 2. Student must be at least third year standing.
  • 3. Students must complete 20 semester credits of computing coursework before applying.
  • 4. For students whose BS curriculum requires co-op, a minimum of 1 co-op must be completed before applying.
  • 5. Students must complete a brief statement outlining why they are interested in the BS/MS program and what area of focus they think they are interested in pursuing.
  • 6. Students must provide one letter of recommendation from a GCCIS professor explaining your potential for the BS/MS program. *It is important to note that we cannot guarantee acceptance into the BS/MS program even if entrance criteria are met, as it will depend on the demand and on the space available in our program from term to term.

**All students who turn in an official Change of Program Application Form will be evaluated at the end of the term once grades for the current term post. It should be noted that a student will not receive their Bachelor’s degree until the requirements for both the BS and MS degrees have both been completed. 

Academic details:
  • You can “double-count” up to three courses (9 semester credits) in the BS and MS degrees (typically in the Advanced elective area).
  • You “officially” become a graduate student at year level 6 when you have earned 126 semester credits. From this point on, you will be able to register yourself for graduate courses in SIS on the graduate career; until then, you will need to register graduate courses on the undergraduate career
  • The lowest passing grade in the graduate program is “C”. You must have a minimum 3.0 GPA in your graduate program in order to earn your MS degree.
  • There is no grade replacement in the graduate program. All courses taken and all grades earned remain on your transcript and count in your GPA.
  • In order to be considered full time as an undergraduate student, you must be enrolled in a minimum of 12 semester credits. As a graduate student, you must be enrolled in a minimum of 9 semester credits to be considered full time, however, graduate students are eligible for up to 2 Full Time Equivalencies (FTE) based on remaining course requirements.
  • Avoid duplicate course material, if you take a class listed below at the undergraduate level you cannot take it at the graduate level. Below is a list of duplicate courses between the BS and MS programs.

Undergraduate Course Graduate Course

 

CSEC 461 -------- CSEC 742

CSEC 202 -------- CSEC 743

CSEC 464 -------- CSEC 730

CSEC 470 -------- CSEC 750

CSCI 462 -------- CSEC 604


Completing the program:

  • ALL undergraduate degree requirements must be complete (including wellness and co-op) before you can register for the MS Project, MS Capstone, or Thesis.
  • You must work with the Sr. Staff Specialist to register for either MS Thesis, MS Project, or MS Capstone Course by submitting assigned proposal. Make sure you watch for deadlines
  • If you submit a Thesis proposal you have one year to complete the defense before the proposal expires.
  • There is a 7-year rule in place for all graduate programs. You must complete your graduate work within 7 years of the semester in which you took your first graduate course that counts toward the MS degree.
Financial:
  • You are eligible for a BS/MS tuition discount on the graduate tuition rates. The discount that you receive should bring your graduate tuition charges close to that which you paid for undergraduate. Work with your financial aid counselor for more information.
  • As a graduate student, you can apply for Graduate and Teaching Assistantships (GA/TA) both in the CSEC department and across campus. These positions usually pay a tuition benefit as well as a salary. You might want to check with your Financial Aid Advisor to see if the BS/MS discount or the GA/TA position is more beneficial.   
Administrative:
  • Your program code changes from UCIS, INFOSEC-BS to UCIS, INFOSEC-BS, CSEC-U to GCIS, COMPSEC-MS, CSEC-G.
  • Your courses are split into sections on your transcript by undergraduate and graduate and each has its own GPA statistics.
  • Since you can apply for graduation for your BS and MS degrees separately on SIS, we would like you to apply for your BS degree AND your MS degree at the SAME time. You should apply for BOTH degrees after you have completed 15 graduate semester credits toward your MS degree requirements. 

Industrial Advisory Board

 

Boardman, Jim Palo Alto Netowrks
Weeks, Ryan Datto
Pickup, Jason Excellus
Palmer, Michael Hearst
Savacool, Richard Nixon Peabody
Kusse, Jennifer Monroe County
Kempster, Ken Federal Reserve Bank of New York
Kalka, Bob IBM
Striebich, Kirk CERT
Pinch, Mike Security Risk Advisors
Wandera, Max Eaton
Pollard, Jeremy Caffiene.tv
Hirwani, Manish SecureWorks
Watt, Timothy Parsons
Platt, Gregory A. USARMY
Colvin, Todd Rochester Regional Health
Stokes, Kristian FUSE Engineering

 

MS Online Student Resources

Student Ambassadors

Student Club

RITSEC is a student club dedicated to teaching "Security Through Community". RITSEC is dedicated to educating and preparing RIT students to compete in security-related competitions, as well as showcasing RIT student talent in the current world of security today. Whether you're new to computing security or a veteran, RITSEC has a place for you. All of the activities we host to promote this learning can be found on our 'Events' page.

We believe security is for anyone who wants to learn and center our activities around multiple aspects of security. This includes live individual and team-based competitions, hands-on training, student run research, and sponsor talks. Our security exercises cover a wide variety of areas in computing security, including penetration testing, Windows and Linux server hardening, web security, network services, and more! Learn more at the RITSEC website.

Student Competition Resources

Information Security Talent Search (ISTS) competition

Global Collegiate Penetration Test Competition

The Northeast Collegiate Cyber Defense League

National Collegiate Cyber Defense Competition

Technical and Lab Resources

Azure Dev Tools for Teaching - Computing Security students and faculty can download certain Microsoft operating systems, development tools and applications
GCCIS Tutoring Center - Tutoring for introductory programming sequence.
VMware Academic Program (VMAP) - Computing Security students and faculty can download certain VMware products
Mirrors.rit.edu - is a mirror of many linux distros and other open-source projects