Justin Pelletier Headshot

Justin Pelletier

Director of the GCI Cyber Range and Training Center
Department of Computing Security
Golisano College of Computing and Information Sciences

Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Justin Pelletier

Director of the GCI Cyber Range and Training Center
Department of Computing Security
Golisano College of Computing and Information Sciences


BS, Stonehill College; MBA, Rochester Institute of Technology; Ph.D., Capella University


Justin Pelletier, of the Computing Security Department at Rochester Institute of Technology (RIT), is the Director of Cyber Training, Testing, and Outreach for RIT's Global Cybersecurity Institute. Through the Eaton Cybersecurity SAFE Lab, he trains and leads student teams to perform device and network security assessments for partner organizations. He is also the international director of the Collegiate Penetration Testing Competition, which brings together the top cyber talent from across the globe to evaluate and showcase student technical and communication skills. He holds a PhD in Information Assurance and Security, an MBA in Entrepreneurship, and a BS in Computer Science. Dr. Pelletier has taught at the undergraduate and graduate levels and helped to bring the Hacking for Defense initiative to RIT. His current research interests include social network econometrics, machine learning in structural models, and decision attack graphs. 


Currently Teaching

3 Credits
This course explores current topics in Computing Security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.
3 Credits
As more users access remote systems, the job of identifying and authenticating those users at distance becomes increasingly difficult. The growing impact of attackers on identification and authentication systems puts additional strain on our ability to ensure that only authorized users obtain access to controlled or critical resources. This course reviews basic cryptology techniques and introduces their application to contemporary authentication methods.
3 Credits
Advanced study of MIS topics reflecting contemporary issues and/or current technological advancements impacting the development, implementation and management of information systems in organizations. Seminar topics have ranged from new technological developments to management security issues in MIS systems. Topics for a specific semester will be announced prior to the course offering.
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.
3 Credits
Topics and subject areas that are not among the courses listed here are frequently offered under the special topics title. Under the same title also may be found experimental courses that may be offered for the first time. Such courses are offered in a formal format; that is, regularly scheduled class sessions with an instructor. The level of complexity is commensurate with a senior-level undergraduate technical course.

Latest News

  • August 6, 2019

    Artist rendering of glass building.

    Global Cybersecurity Institute to open in 2020

    Cybercrime is costing the world trillions of dollars, and analysts say that there aren’t enough qualified professionals to prevent those attacks. To address this problem, RIT is creating the Global Cybersecurity Institute (GCI), aimed at meeting the demand for computing security and artificial intelligence professionals, while developing future technologies, protocols and human understanding needed to address the global cybersecurity crisis.

Select Scholarship

Journal Paper
Pelletier, J.M. "Longitudinal Analysis of Information Security Incident Spillover Effects." Journal of Management Science and Business Intelligence 3. (2018): 15-20. Web.
Peer Reviewed/Juried Poster Presentation
Pelletier, J.M. "The Race to Feld and Secure Autonomous Combat Units." Proceedings of the 2018 USENIX Summit on Hot Topics in Security, Baltimore, MD. Ed. David Brumley, Parisa Tabriz. Baltimore, MD: n.p..
Published Conference Proceedings
Pelletier, J.M. and Shita, M. "Optimizing Alternative Futures: Assuring Security in the Event of Machine Superintelligence." Proceedings of the Proceedings of the International Conference on Intelligent Computing and Big Data, Houston, TX, 6-7 April, 2018. Ed. Bruce O'Neal, Yu Sun. Houston, TX: IBII, Print.
Hair, N., Santa, J., and Pelletier, J.M. "Loring Online Students’ Perceptions of Website Customer Experience." Proceedings of the OLC Accelerate 2018. Orlando, FL. Ed. Katie Fife Schuster. Orlando, Florida: OLC, 2018. Print.