Cybersecurity Bachelor of Science Degree
Cybersecurity
Bachelor of Science Degree
- RIT /
- Golisano College of Computing and Information Sciences /
- Academics /
- Cybersecurity BS
Overview for Cybersecurity BS
Why Study Cybersecurity at RIT
RIT’s new Global Cybersecurity Institute is one of the world’s leading cybersecurity education and research centers. This 52,000-square-foot, state-of-the-art facility was designed for a holistic, multidisciplinary approach to cybersecurity.
RIT’s Cyber Range and Training Center is capable of hosting more than 5,000 virtual machines simultaneously in immersive scenarios that simulate countless cyber scenarios ranging from industrial to governmental and military.
RIT students are recognized as powerhouse competitors in both offensive and defensive cybersecurity competitions. We won the 2021 Collegiate Penetration Testing Competition Global Finals and the 2013 Collegiate Cyber Defense Competition National Championship.
RIT is designated as a National Center of Academic Excellence in Cybersecurity Research and Education by the National Security Agency.
Accelerated Bachelor’s/Master’s Available: Earn both your bachelor’s and your master’s in less time and with a cost savings, giving you a competitive advantage in your field.
STEM-OPT Visa Eligible: The STEM Optional Practical Training (OPT) program allows full-time, on-campus international students on an F-1 student visa to stay and work in the U.S. for up to three years after graduation.
The scope and demand of computer systems and networks, and the span of these systems, increases in organizations every day. At the same time, dependence on computer systems security and computing security technologies is growing dramatically, as is the creation of malicious software that attacks computing systems and networks. Computer systems security is now a major concern for organizations large and small to ensure information stays secure for the privacy of client/customer information, efficient business success, and smooth continuity in operations. As a result, there is an urgent demand for highly trained computing security professionals who can secure and protect an organization’s digital assets from relentless attack. In addition, there is a critical need for the continued development of advanced computer security technologies, including hardware and software infrastructures, to both house valuable digital assets and ensure their protection.
RIT’s Cybersecurity Bachelor's Degree
RIT’s bachelor of science in cybersecurity produces professionals who understand the people and processes that impact computer systems security. In addition to acquiring state-of-the-art knowledge in protecting digital assets of large or small organizations, you will learn to proactively identify security vulnerabilities in software, hardware, and infrastructure, and provide and implement actionable solutions that protect the assets of an organization. You will learn to collect digital forensic evidence to reveal network and data breach incidents, attribute the attackers or origin of attack, assess the extent of the damage or loss of information, and design strategies that ensure information is protected from future attacks.
Cybersecurity Curriculum
In the first two years of the program, RIT’s cybersecurity major provides you with a solid foundation in computer science and mathematics. Core courses include a programming sequence, an ethics course, a computer networking and system administration sequence, and foundation courses in computer and network security.
Starting in the third year, you will begin an in-depth exploration of a range of aspects of cybersecurity with advanced electives that allow you to design the focus of your cybersecurity degree. You may choose from an extensive selection of advanced topics in the areas of the network and system security, digital forensics and malware, software security, data security and privacy, and cyber analytics and intelligence. You can expand your knowledge of cybersecurity in one of several disciplines, including network and systems security, digital forensics and malware, security software, and security management. You may also use advanced elective courses to create a customized cluster to address an area of professional interest. To help you apply your cybersecurity courses to the real-world, and gain valuable career experience, you’ll complete two blocks of cooperative education.
ESL Global Cybersecurity Institute: Advancing Cybersecurity Education
As a student in the cybersecurity bachelor’s degree, you'll have the opportunity to take courses and participate in events at the ESL Global Cybersecurity Institute, a state-of-the-art, 52,000-square-foot facility designed for advanced cybersecurity education, training, and research. You will learn from experts who have developed a world-class curriculum that covers cybersecurity to managing information systems as you build secure systems and new technologies. You'll also have access to the Cyber Range, which generates the real world feel of responding to a cybersecurity crisis for governments and industries to test their security and identify innovative/effective solutions.
Careers in Cybersecurity
The cybersecurity field is growing rapidly, with demand for cybersecurity experts outpacing the number of students graduating from cybersecurity majors nationwide. According to the U.S. Bureau of Labor Statistics, employment in cybersecurity will grow by 31 percent by the year 2029, creating excellent career opportunities for graduates of RIT’s cybersecurity degree.
Nearly every single industry needs cybersecurity experts, from aviation and banking, to automotive, health care, energy, retail, education, government, and more. You’ll be well prepared for jobs in cybersecurity as a data scientist, data analyst, information security analyst, cybersecurity engineer, cybersecurity specialist, systems engineer, security architect, application security administrator, artificial intelligence security specialist, cloud security architect, cryptographer, cyber operations specialist, cybercrime Investigator, and more.
Combined Accelerated Bachelor’s/Master’s Degrees
Today’s careers require advanced degrees grounded in real-world experience. RIT’s Combined Accelerated Bachelor’s/Master’s Degrees enable you to earn both a bachelor’s and a master’s degree in as little as five years of study, all while gaining the valuable hands-on experience that comes from co-ops, internships, research, study abroad, and more.
- Cybersecurity BS/Cybersecurity MS: The BS/MS pathway in cybersecurity offers a comprehensive education in this critical and rapidly growing field. The BS program lays a strong foundation, equipping students with essential skills in preserving information assets, identifying vulnerabilities, and conducting digital forensics. Building on this, the MS program delves into advanced topics such as enterprise-level security strategies and trusted computing, as well as research topics like Internet-of-Things (IoT) security and covert communications. This powerful combination prepares graduates to not only tackle complex security challenges but also to guide the industry's future. Through hands-on experience with partner companies and collaboration with research leaders in cybersecurity and AI, students gain real-world skills that are highly sought after by employers. Graduates of this accelerated program are uniquely positioned to become leaders in the cybersecurity field, ready to develop and implement innovative solutions, and protect critical digital infrastructure in various sectors, from finance to national security.
- Cybersecurity BS/Science, Technology, and Public Policy MS: The BS/MS pathway in cybersecurity and science, technology, and public policy offers a unique interdisciplinary approach to addressing digital security challenges. The BS in cybersecurity provides a robust technical foundation, teaching students to protect information assets, identify vulnerabilities, and conduct digital forensics. This technical expertise is then complemented by the MS in science, technology, and public policy, which examines how government and society impact and are impacted by threats and innovation in cybersecurity. Through research opportunities and co-op experiences, students gain practical insights into how cybersecurity and privacy concerns shape industry practices and government policies. This unique combination prepares graduates for diverse leadership roles at the intersection of technology and policy. Alumni are well-positioned to guide organizations in developing comprehensive cybersecurity strategies, influence public policy in the digital realm, and bridge the gap between technical experts and policymakers in both private and public sectors.
- +1 MBA: Students who enroll in a qualifying undergraduate degree have the opportunity to add an MBA to their bachelor’s degree after their first year of study, depending on their program. Learn how the +1 MBA can accelerate your learning and position you for success.
Apply for Fall 2025
First-year students can apply for Early Decision II by Jan. 1 to get an admissions and financial aid assessment by mid-January.
Meet us on campus
Learn about academics, co-op and internships, financial aid, and more.
Careers and Cooperative Education
Typical Job Titles
Assistant Reverse Engineer | Application Security Engineer | Cyber Security Analyst |
Cyber Threat Responder | Security Software Specialist | Penetration Tester |
Security Assurance Engineer | Security Consultant | Site Reliability Engineer |
Threat Analyst | Technical Assessments Consultant | Vehicle Cybersecurity Engineer |
Industries
-
Electronic and Computer Hardware
-
Government (Local, State, Federal)
-
Health Care
-
Internet and Software
-
Medical Devices
-
Telecommunications
-
Utilities and Renewable Energy
Cooperative Education
What’s different about an RIT education? It’s the career experience you gain by completing cooperative education and internships with top companies in every single industry. You’ll earn more than a degree. You’ll gain real-world career experience that sets you apart. It’s exposure–early and often–to a variety of professional work environments, career paths, and industries.
Co-ops and internships take your knowledge and turn it into know-how. Your computing co-ops will provide hands-on experience that enables you to apply your computing knowledge in professional settings while you make valuable connections between classwork and real-world applications.
Students in the cybersecurity bachelor’s degree are required to complete two blocks of cooperative education experience.
Featured Work and Profiles
-
Student Educates Public on Cybersecurity and Earns Prestigious Scholarship
Jaime Campanelli educates students and senior citizens about online safety and cybersecurity careers as a NSF CyberCorps Scholarship for Service (SFS) recipient.
Read More about Student Educates Public on Cybersecurity and Earns Prestigious Scholarship -
Meet Jonathan Bateman
“...I believe that as technologists, there needs to be a better emphasis on how we use our technology in different spaces because ultimately people are social beings—cultural beings—and the way that...
Read More about Meet Jonathan Bateman
Curriculum for 2024-2025 for Cybersecurity BS
Current Students: See Curriculum Requirements
Cybersecurity, BS degree, typical course sequence
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-140 | Introduction to Cybersecurity This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises. Lecture 3 (Fall, Spring). |
3 |
GCIS-123 | Software Development and Problem Solving I (General Education) A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments. Lab 6 (Fall, Spring). |
4 |
GCIS-124 | Software Development and Problem Solving II (General Education) A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security. (Prerequisite: C- or better in SWEN-123 or CSEC-123 or GCIS-123 or equivalent course.) Lab 6 (Fall, Spring, Summer). |
4 |
MATH-181 | Calculus I (General Education – Mathematical Perspective A) This is the first in a two-course sequence intended for students majoring in mathematics, science, or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers functions, limits, continuity, the derivative, rules of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals. (Prerequisites: MATH-111 or (NMTH-220 and NMTH-260 or NMTH-272 or NMTH-275) or equivalent courses with a minimum grade of B-, or a score of at least 60% on the RIT Mathematics Placement Exam.) Lecture 4 (Fall, Spring). |
4 |
MATH-182 | Calculus II (General Education – Mathematical Perspective B) This is the second in a two-course sequence. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves, and polar coordinates. (Prerequisites: C- or better in MATH-181 or MATH-181A or equivalent course.) Lecture 4 (Fall, Spring). |
4 |
MATH-190 | Discrete Mathematics for Computing (General Education) This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students’ mathematical sophistication and their ability to handle abstract problems. (Co-requisites: MATH-182 or MATH-182A or MATH-172 or equivalent courses.) Lecture 3, Recitation 1 (Fall, Spring). |
3 |
NSSA-241 | Introduction to Routing and Switching This course provides an introduction to wired network infrastructures, topologies, technologies, and the protocols required for effective end-to-end communication. Basic security concepts for TCP/IP based technologies are introduced. Networking layers 1, 2, and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models as reference. Course topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, switching technology, and routed and routing protocols common in TCP/IP networks. The lab assignments mirror the lecture content , providing an experiential learning component for each topic covered. (Prerequisites: NSSA-102 or CSEC-101 or CSEC-140 or NACT-151 or CSCI-250 or equivalent courses.) Lab 2, Lecture 3 (Fall, Spring). |
3 |
YOPS-10 | RIT 365: RIT Connections RIT 365 students participate in experiential learning opportunities designed to launch them into their career at RIT, support them in making multiple and varied connections across the university, and immerse them in processes of competency development. Students will plan for and reflect on their first-year experiences, receive feedback, and develop a personal plan for future action in order to develop foundational self-awareness and recognize broad-based professional competencies. (This class is restricted to incoming 1st year or global campus students.) Lecture 1 (Fall, Spring). |
0 |
General Education – Ethical Perspective |
3 | |
General Education – Global Perspective |
3 | |
General Education – First Year Writing (WI) |
3 | |
Second Year | ||
CSEC-099 | Cooperative Education Seminar This course helps students prepare for co-operative education employment (“co-op”) by developing job search strategies and material. Students will explore current and emerging aspects of the Computing Security field with employers, alumni and current students who have already been on co-op. Students are introduced to RIT’s Office of Career Services and Cooperative Education and learn about professional and ethical responsibilities for their co-op and subsequent professional experiences. Students will work collaboratively to build résumés and to prepare for interviews. (Prerequisites: This class is restricted to students with at least 2nd year standing.) Lecture 1 (Fall, Spring). |
0 |
CSEC-201 | Programming for Information Security This course builds upon basic programming skills to give students the programming knowledge necessary to study computing security. Students will be introduced to network programming, memory management, and operating system calls along with associated security concepts. Specific focus will placed on understanding the compilation process and on the relation between high-level programming concepts and low-level programming concepts, culminating in identifying and exploiting memory corruption vulnerabilities. (Prerequisites: (CSEC-101 or CSEC-140) and (CSCI-142 or GCIS-124 or GCIS-127 or CSCI-242) or equivalent courses.) Lecture 3 (Fall, Spring). |
3 |
CSEC-202 | Reverse Engineering Fundamentals This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis. (Prerequisite: CSEC-201 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
CSEC-499 | Cooperative Education in CSEC (summer) Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load. (Enrollment in this course requires permission from the department offering the course.) CO OP (Fall, Spring, Summer). |
0 |
Choose one of the following: | 3 |
|
MATH-241 | Linear Algebra (General Education) This course is an introduction to the basic concepts of linear algebra, and techniques of matrix manipulation. Topics include linear transformations, Gaussian elimination, matrix arithmetic, determinants, vector spaces, linear independence, basis, null space, row space, and column space of a matrix, eigenvalues, eigenvectors, change of basis, similarity and diagonalization. Various applications are studied throughout the course. (Prerequisites: MATH-190 or MATH-200 or MATH-219 or MATH-220 or MATH-221 or MATH-221H or equivalent course.) Lecture 3 (Fall, Spring). |
|
STAT-257 | Statistical Interference (General Education) Learn how data furthers understanding of science and engineering. This course covers basic statistical concepts, sampling theory, hypothesis testing, confidence intervals, point estimation, and simple linear regression. A statistical software package such as MINITAB will be used for data analysis and statistical applications. (Prerequisites: MATH-251.
NOTE: Students cannot receive credit for both MATH-252 and STAT-257 nor for both STAT-205 and STAT-257.) Lecture 3 (Fall, Spring). |
|
MATH-251 | Probability and Statistics I (General Education) This course introduces sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistics to real-world problems. A statistical package such as Minitab or R is used for data analysis and statistical applications. (Prerequisites: MATH-173 or MATH-182 or MATH 182A or equivalent course.) Lecture 3, Recitation 1 (Fall, Spring, Summer). |
3 |
NSSA-221 | Systems Administration I This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies. (Prerequisites: NSSA-241 and (NSSA-220 or CSCI-141 or GCIS-123 or GCIS-127) or equivalent courses.) Lab 2, Lecture 4 (Fall, Spring). |
3 |
NSSA-245 | Network Services This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services. (Prerequisites: NSSA-241 and (NSSA-220 or CSCI-141 or GCIS-123) and NSSA-221 or equivalent courses.) Lab 4, Lecture 4 (Fall, Spring). |
3 |
General Education – Social Perspective |
3 | |
General Education – Artistic Perspective |
3 | |
General Education – Natural Science Inquiry Perspective† |
4 | |
General Education – Scientific Principles Perspective† |
4 | |
Third Year | ||
CSCI-462 | Introduction to Cryptography This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. Students cannot take and receive credit for this course if they have credit for CSCI-662. (Prerequisites: (CSCI-243 or SWEN-262 or CSEC-202) and (MATH-190 or MATH-200) or equivalent courses.) Lecture 3 (Fall, Spring, Summer). |
3 |
CSEC-310 | Endpoint Security Engineering This course will discuss cybersecurity defensive measures and their application to protecting computing endpoints. The course will focus on studying, analyzing, and understanding vulnerabilities and threats along with the preventative and detective controls necessary to mitigate risk. Defensive endpoint-based controls will be explored and applied with hands-on exercises. (Prerequisites: (CSEC-101 or CSEC-102 or CSEC-140) and NSSA-245 or equivalent courses.) Lab 2, Lecture 2 (Fall, Spring). |
3 |
CSEC-380 | Principles of Web Application Security This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ. (Prerequisites: (CSEC-101 or CSEC-102 or CSEC-140) and NSSA-245 or equivalent courses.) Lecture 3 (Spring). |
3 |
CSEC-472 | Authentication and Security Models (WI-PR) Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area. (Prerequisites: CSEC-362 or CSCI-462 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
CSEC-499 | Cooperative Education in CSEC (summer) Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load. (Enrollment in this course requires permission from the department offering the course.) CO OP (Fall, Spring, Summer). |
0 |
ISTE-230 | Introduction to Database and Data Modeling A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. Note: students should have one course in object-oriented programming. (Prerequisites: ISTE-120 or ISTE-200 or IGME-101 or IGME-105 or CSCI-140 or CSCI-142 or NACA-161 or NMAD-180 or BIOL-135 or GCIS-123 or GCIS-127 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
PUBL-363 | Cyber Security Policy and Law (General Education) Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The
central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws. Lecture 3 (Fall, Spring). |
3 |
General Education – Immersion 1 |
3 | |
CSEC Electives |
3 | |
Open Electives |
6 | |
Fourth Year | ||
CSEC-490 | Capstone in Computing Security (WI-PR) This is a capstone course for students in the cybersecurity program. Students will review a series of short modules on topics such as teamwork, project management, report writing, and presentations, and will work in teams to apply their knowledge and skills to real-world projects in various areas of cybersecurity. Projects may require performing security analysis of systems, networks, software, policies, etc., devising and implementing security solutions in real-world applications. (4th-year status and departmental approval) (This course is restricted to INFOSEC-BS students with 4th year standing.) Project 1 (Fall, Spring). |
3 |
Choose one of the following: | 3 |
|
PHIL-102 | Introduction to Moral Issues (General Education) This course examines ethical questions that arise in the course of day-to-day individual and social life. Some consideration will be given to ethical theory and its application to such questions, but emphasis will be on basic moral questions and practical issues. Examples of typical issues to be examined are: What are the grounds for moral obligations like keeping promises or obeying the law? How do we reason about what to do? Examples of typical moral issues that may be introduced are capital punishment, euthanasia, abortion, corporate responsibility, the treatment of animals, and so forth. Lecture 3 (Fall, Spring). |
|
PHIL-202 | Foundations of Moral Philosophy (General Education) This course is a survey of foundational, and normative, approaches to moral philosophy and their motivating moral questions. Topics will include virtue ethics, deontology, consequentialism, and other approaches. Some of the questions to be examined are: How is human nature related to morality? What are the grounds for moral obligations? Is there an ultimate moral principle? How do we reason about what to do? Can reason determine how we ought to live? What are moral judgments? Are there universal goods? What constitutes a morally worthwhile life? Can morality itself be challenged? Lecture 3 (Fall). |
|
PHIL-306 | Professional Ethics (General Education) This course critically examines ethical issues that arise in professional life. The course will examine not only the general relationship between ethics and professional life but the particular consequences of ethical considerations within the student's own profession and the professions of others with whom the student must live and work. Lecture 3 (Fall). |
|
CSEC Electives |
12 | |
General Education – Immersion 2, 3 |
6 | |
Open Electives |
6 | |
Total Semester Credit Hours | 126 |
Please see General Education Curriculum (GE) for more information.
(WI) Refers to a writing intensive course within the major.
* Please see Wellness Education Requirement for more information. Students completing bachelor's degrees are required to complete two different Wellness courses.
† Students must complete one of the following lab science sequences: (a) University Physics I, II (PHYS-211, 212); (b) General & Analytical Chemistry I, II and Labs (CHMG-141, 142, 145, 146); or (c) General Biology I, II, and Labs (BIOL-101, 102, 103, 104). Students are free to choose from approved science electives that either extend or complement their lab science selection.
Combined Accelerated Bachelor's/Master's Degrees
The curriculum below outlines the typical course sequence(s) for combined accelerated degrees available with this bachelor's degree.
Cybersecurity, BS/MS degree, typical course sequence
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-140 | Introduction to Cybersecurity This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises. Lecture 3 (Fall, Spring). |
3 |
GCIS-123 | Software Development and Problem Solving I (General Education) A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments. Lab 6 (Fall, Spring). |
4 |
GCIS-124 | Software Development and Problem Solving II (General Education) A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security. (Prerequisite: C- or better in SWEN-123 or CSEC-123 or GCIS-123 or equivalent course.) Lab 6 (Fall, Spring, Summer). |
4 |
MATH-181 | Calculus I (General Education – Mathematical Perspective A) This is the first in a two-course sequence intended for students majoring in mathematics, science, or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers functions, limits, continuity, the derivative, rules of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals. (Prerequisites: MATH-111 or (NMTH-220 and NMTH-260 or NMTH-272 or NMTH-275) or equivalent courses with a minimum grade of B-, or a score of at least 60% on the RIT Mathematics Placement Exam.) Lecture 4 (Fall, Spring). |
4 |
MATH-182 | Calculus II (General Education – Mathematical Perspective B) This is the second in a two-course sequence. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves, and polar coordinates. (Prerequisites: C- or better in MATH-181 or MATH-181A or equivalent course.) Lecture 4 (Fall, Spring). |
4 |
MATH-190 | Discrete Mathematics for Computing (General Education) This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students’ mathematical sophistication and their ability to handle abstract problems. (Co-requisites: MATH-182 or MATH-182A or MATH-172 or equivalent courses.) Lecture 3, Recitation 1 (Fall, Spring). |
3 |
NSSA-241 | Introduction to Routing and Switching This course provides an introduction to wired network infrastructures, topologies, technologies, and the protocols required for effective end-to-end communication. Basic security concepts for TCP/IP based technologies are introduced. Networking layers 1, 2, and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models as reference. Course topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, switching technology, and routed and routing protocols common in TCP/IP networks. The lab assignments mirror the lecture content , providing an experiential learning component for each topic covered. (Prerequisites: NSSA-102 or CSEC-101 or CSEC-140 or NACT-151 or CSCI-250 or equivalent courses.) Lab 2, Lecture 3 (Fall, Spring). |
3 |
YOPS-10 | RIT 365: RIT Connections RIT 365 students participate in experiential learning opportunities designed to launch them into their career at RIT, support them in making multiple and varied connections across the university, and immerse them in processes of competency development. Students will plan for and reflect on their first-year experiences, receive feedback, and develop a personal plan for future action in order to develop foundational self-awareness and recognize broad-based professional competencies. (This class is restricted to incoming 1st year or global campus students.) Lecture 1 (Fall, Spring). |
0 |
General Education – Global Perspective |
3 | |
General Education – Ethical Perspective |
3 | |
General Education – First Year Writing (WI) |
3 | |
Second Year | ||
CSEC-99 | Cooperative Education Seminar This course helps students prepare for co-operative education employment (“co-op”) by developing job search strategies and material. Students will explore current and emerging aspects of the Computing Security field with employers, alumni and current students who have already been on co-op. Students are introduced to RIT’s Office of Career Services and Cooperative Education and learn about professional and ethical responsibilities for their co-op and subsequent professional experiences. Students will work collaboratively to build résumés and to prepare for interviews. (Prerequisites: This class is restricted to students with at least 2nd year standing.) Lecture 1 (Fall, Spring). |
0 |
CSEC-201 | Programming for Information Security This course builds upon basic programming skills to give students the programming knowledge necessary to study computing security. Students will be introduced to network programming, memory management, and operating system calls along with associated security concepts. Specific focus will placed on understanding the compilation process and on the relation between high-level programming concepts and low-level programming concepts, culminating in identifying and exploiting memory corruption vulnerabilities. (Prerequisites: (CSEC-101 or CSEC-140) and (CSCI-142 or GCIS-124 or GCIS-127 or CSCI-242) or equivalent courses.) Lecture 3 (Fall, Spring). |
3 |
CSEC-202 | Reverse Engineering Fundamentals This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis. (Prerequisite: CSEC-201 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
CSEC-499 | Cooperative Education in CSEC (summer) Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load. (Enrollment in this course requires permission from the department offering the course.) CO OP (Fall, Spring, Summer). |
0 |
Choose one of the following: | 3 |
|
MATH-241 | Linear Algebra This course is an introduction to the basic concepts of linear algebra, and techniques of matrix manipulation. Topics include linear transformations, Gaussian elimination, matrix arithmetic, determinants, vector spaces, linear independence, basis, null space, row space, and column space of a matrix, eigenvalues, eigenvectors, change of basis, similarity and diagonalization. Various applications are studied throughout the course. (Prerequisites: MATH-190 or MATH-200 or MATH-219 or MATH-220 or MATH-221 or MATH-221H or equivalent course.) Lecture 3 (Fall, Spring). |
|
STAT-257 | Statistical Inference Learn how data furthers understanding of science and engineering. This course covers basic statistical concepts, sampling theory, hypothesis testing, confidence intervals, point estimation, and simple linear regression. A statistical software package such as MINITAB will be used for data analysis and statistical applications. (Prerequisites: MATH-251.
NOTE: Students cannot receive credit for both MATH-252 and STAT-257 nor for both STAT-205 and STAT-257.) Lecture 3 (Fall, Spring). |
|
MATH-251 | Probability and Statistics I (General Education) This course introduces sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistics to real-world problems. A statistical package such as Minitab or R is used for data analysis and statistical applications. (Prerequisites: MATH-173 or MATH-182 or MATH 182A or equivalent course.) Lecture 3, Recitation 1 (Fall, Spring, Summer). |
3 |
NSSA-221 | Systems Administration I This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies. (Prerequisites: NSSA-241 and (NSSA-220 or CSCI-141 or GCIS-123 or GCIS-127) or equivalent courses.) Lab 2, Lecture 4 (Fall, Spring). |
3 |
NSSA-245 | Network Services This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services. (Prerequisites: NSSA-241 and (NSSA-220 or CSCI-141 or GCIS-123) and NSSA-221 or equivalent courses.) Lab 4, Lecture 4 (Fall, Spring). |
3 |
General Education – Artistic Perspective |
3 | |
General Education – Social Perspective |
3 | |
General Education – Natural Science Inquiry Perspective: Lab Science I† |
4 | |
General Education – Scientific Principles Perspective: Lab Science II† |
4 | |
Third Year | ||
CSEC-310 | Endpoint Security Engineering This course will discuss cybersecurity defensive measures and their application to protecting computing endpoints. The course will focus on studying, analyzing, and understanding vulnerabilities and threats along with the preventative and detective controls necessary to mitigate risk. Defensive endpoint-based controls will be explored and applied with hands-on exercises. (Prerequisites: (CSEC-101 or CSEC-102 or CSEC-140) and NSSA-245 or equivalent courses.) Lab 2, Lecture 2 (Fall, Spring). |
3 |
CSEC-380 | Principles of Web Application Security This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ. (Prerequisites: (CSEC-101 or CSEC-102 or CSEC-140) and NSSA-245 or equivalent courses.) Lecture 3 (Spring). |
3 |
CSEC-472 | Authentication and Security Models (WI-PR) Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area. (Prerequisites: CSEC-362 or CSCI-462 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
CSEC-499 | Cooperative Education in CSEC (summer) Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load. (Enrollment in this course requires permission from the department offering the course.) CO OP (Fall, Spring, Summer). |
0 |
CSCI-462 | Introduction to Cryptography This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. Students cannot take and receive credit for this course if they have credit for CSCI-662. (Prerequisites: (CSCI-243 or SWEN-262 or CSEC-202) and (MATH-190 or MATH-200) or equivalent courses.) Lecture 3 (Fall, Spring, Summer). |
3 |
ISTE-230 | Introduction to Database and Data Modeling A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. Note: students should have one course in object-oriented programming. (Prerequisites: ISTE-120 or ISTE-200 or IGME-101 or IGME-105 or CSCI-140 or CSCI-142 or NACA-161 or NMAD-180 or BIOL-135 or GCIS-123 or GCIS-127 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
PUBL-363 | Cyber Security Policy and Law (General Education) Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The
central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws. Lecture 3 (Fall, Spring). |
3 |
CSEC Graduate Elective |
3 | |
Open Electives |
6 | |
General Education – Immersion 1 |
3 | |
Fourth Year | ||
CSEC-490 | Capstone in Computing Security (WI-PR) This is a capstone course for students in the cybersecurity program. Students will review a series of short modules on topics such as teamwork, project management, report writing, and presentations, and will work in teams to apply their knowledge and skills to real-world projects in various areas of cybersecurity. Projects may require performing security analysis of systems, networks, software, policies, etc., devising and implementing security solutions in real-world applications. (4th-year status and departmental approval) (This course is restricted to INFOSEC-BS students with 4th year standing.) Project 1 (Fall, Spring). |
3 |
Choose one of the following: | 3 |
|
PHIL-102 | Introduction to Moral Issues This course examines ethical questions that arise in the course of day-to-day individual and social life. Some consideration will be given to ethical theory and its application to such questions, but emphasis will be on basic moral questions and practical issues. Examples of typical issues to be examined are: What are the grounds for moral obligations like keeping promises or obeying the law? How do we reason about what to do? Examples of typical moral issues that may be introduced are capital punishment, euthanasia, abortion, corporate responsibility, the treatment of animals, and so forth. Lecture 3 (Fall, Spring). |
|
PHIL-202 | Foundations of Moral Philosophy This course is a survey of foundational, and normative, approaches to moral philosophy and their motivating moral questions. Topics will include virtue ethics, deontology, consequentialism, and other approaches. Some of the questions to be examined are: How is human nature related to morality? What are the grounds for moral obligations? Is there an ultimate moral principle? How do we reason about what to do? Can reason determine how we ought to live? What are moral judgments? Are there universal goods? What constitutes a morally worthwhile life? Can morality itself be challenged? Lecture 3 (Fall). |
|
PHIL-306 | Professional Ethics This course critically examines ethical issues that arise in professional life. The course will examine not only the general relationship between ethics and professional life but the particular consequences of ethical considerations within the student's own profession and the professions of others with whom the student must live and work. Lecture 3 (Fall). |
|
CSEC Undergraduate Electives |
6 | |
CSEC Graduate Elective |
3 | |
CSEC Graduate Research Elective |
3 | |
General Education – Immersion 2, 3 |
6 | |
Open Electives |
6 | |
Fifth Year | ||
CSEC-604 | Cryptography and Authentication In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics. (Prerequisites: (MATH-190 and BS/MS students in Computing Security) or students matriculated in the COMPSEC-MS program.) Lecture 3 (Fall). |
3 |
CSEC-742 | Computer System Security The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall). |
3 |
CSEC Graduate Research Elective |
3 | |
CSEC Graduate Electives |
6 | |
Choose one of the following culminating experiences: | ||
CSEC-790 | MS Thesis This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference. (Enrollment in this course requires permission from the department offering the course.) Thesis (Fall, Spring, Summer). |
6 |
CSEC Graduate Research Elective, plus one (1) additional CSEC Graduate Elective |
||
Total Semester Credit Hours | 147 |
Please see General Education Curriculum (GE) for more information.
(WI) Refers to a writing intensive course within the major.
* Please see Wellness Education Requirement for more information. Students completing bachelor's degrees are required to complete two different Wellness courses.
† Students must complete one of the following lab science sequences: University Physics I and University Physics II (PHYS-211/212), General & Analytical Chemistry I, General & Analytical Chemistry I Lab, General & Analytical Chemistry II, and General & Analytical Chemistry II Lab (CHMG-141/142/145/146), or General Biology I, General Biology I Lab, General Biology II, and General Biology II Lab (BIOL-101/102/103/104).
Cybersecurity, BS degree/Science, Technology and Public Policy, MS degree, typical course sequence
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-140 | Introduction to Cybersecurity This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises. Lecture 3 (Fall, Spring). |
3 |
GCIS-123 | Software Development and Problem Solving I (General Education) A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments. Lab 6 (Fall, Spring). |
4 |
GCIS-124 | Software Development and Problem Solving II (General Education) A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security. (Prerequisite: C- or better in SWEN-123 or CSEC-123 or GCIS-123 or equivalent course.) Lab 6 (Fall, Spring, Summer). |
4 |
MATH-181 | Calculus I (General Education – Mathematical Perspective A) This is the first in a two-course sequence intended for students majoring in mathematics, science, or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers functions, limits, continuity, the derivative, rules of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals. (Prerequisites: MATH-111 or (NMTH-220 and NMTH-260 or NMTH-272 or NMTH-275) or equivalent courses with a minimum grade of B-, or a score of at least 60% on the RIT Mathematics Placement Exam.) Lecture 4 (Fall, Spring). |
4 |
MATH-182 | Calculus II (General Education – Mathematical Perspective B) This is the second in a two-course sequence. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves, and polar coordinates. (Prerequisites: C- or better in MATH-181 or MATH-181A or equivalent course.) Lecture 4 (Fall, Spring). |
4 |
MATH-190 | Discrete Mathematics for Computing (General Education) This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students’ mathematical sophistication and their ability to handle abstract problems. (Co-requisites: MATH-182 or MATH-182A or MATH-172 or equivalent courses.) Lecture 3, Recitation 1 (Fall, Spring). |
3 |
NSSA-241 | Introduction to Routing and Switching This course provides an introduction to wired network infrastructures, topologies, technologies, and the protocols required for effective end-to-end communication. Basic security concepts for TCP/IP based technologies are introduced. Networking layers 1, 2, and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models as reference. Course topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, switching technology, and routed and routing protocols common in TCP/IP networks. The lab assignments mirror the lecture content , providing an experiential learning component for each topic covered. (Prerequisites: NSSA-102 or CSEC-101 or CSEC-140 or NACT-151 or CSCI-250 or equivalent courses.) Lab 2, Lecture 3 (Fall, Spring). |
3 |
YOPS-10 | RIT 365: RIT Connections RIT 365 students participate in experiential learning opportunities designed to launch them into their career at RIT, support them in making multiple and varied connections across the university, and immerse them in processes of competency development. Students will plan for and reflect on their first-year experiences, receive feedback, and develop a personal plan for future action in order to develop foundational self-awareness and recognize broad-based professional competencies. (This class is restricted to incoming 1st year or global campus students.) Lecture 1 (Fall, Spring). |
0 |
General Education – Ethical Perspective |
3 | |
General Education – Global Perspective |
3 | |
General Education – First Year Writing (WI) |
3 | |
Second Year | ||
CSEC-099 | Cooperative Education Seminar This course helps students prepare for co-operative education employment (“co-op”) by developing job search strategies and material. Students will explore current and emerging aspects of the Computing Security field with employers, alumni and current students who have already been on co-op. Students are introduced to RIT’s Office of Career Services and Cooperative Education and learn about professional and ethical responsibilities for their co-op and subsequent professional experiences. Students will work collaboratively to build résumés and to prepare for interviews. (Prerequisites: This class is restricted to students with at least 2nd year standing.) Lecture 1 (Fall, Spring). |
0 |
CSEC-201 | Programming for Information Security This course builds upon basic programming skills to give students the programming knowledge necessary to study computing security. Students will be introduced to network programming, memory management, and operating system calls along with associated security concepts. Specific focus will placed on understanding the compilation process and on the relation between high-level programming concepts and low-level programming concepts, culminating in identifying and exploiting memory corruption vulnerabilities. (Prerequisites: (CSEC-101 or CSEC-140) and (CSCI-142 or GCIS-124 or GCIS-127 or CSCI-242) or equivalent courses.) Lecture 3 (Fall, Spring). |
3 |
CSEC-202 | Reverse Engineering Fundamentals This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis. (Prerequisite: CSEC-201 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
CSEC-499 | Cooperative Education in CSEC (summer) Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load. (Enrollment in this course requires permission from the department offering the course.) CO OP (Fall, Spring, Summer). |
0 |
MATH-251 | Probability and Statistics (General Education) This course introduces sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistics to real-world problems. A statistical package such as Minitab or R is used for data analysis and statistical applications. (Prerequisites: MATH-173 or MATH-182 or MATH 182A or equivalent course.) Lecture 3, Recitation 1 (Fall, Spring, Summer). |
3 |
Choose one of the following: | 3 |
|
MATH-241 | Linear Algebra This course is an introduction to the basic concepts of linear algebra, and techniques of matrix manipulation. Topics include linear transformations, Gaussian elimination, matrix arithmetic, determinants, vector spaces, linear independence, basis, null space, row space, and column space of a matrix, eigenvalues, eigenvectors, change of basis, similarity and diagonalization. Various applications are studied throughout the course. (Prerequisites: MATH-190 or MATH-200 or MATH-219 or MATH-220 or MATH-221 or MATH-221H or equivalent course.) Lecture 3 (Fall, Spring). |
|
STAT-257 | Statistical Inference Learn how data furthers understanding of science and engineering. This course covers basic statistical concepts, sampling theory, hypothesis testing, confidence intervals, point estimation, and simple linear regression. A statistical software package such as MINITAB will be used for data analysis and statistical applications. (Prerequisites: MATH-251.
NOTE: Students cannot receive credit for both MATH-252 and STAT-257 nor for both STAT-205 and STAT-257.) Lecture 3 (Fall, Spring). |
|
NSSA-221 | Systems Administration I This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies. (Prerequisites: NSSA-241 and (NSSA-220 or CSCI-141 or GCIS-123 or GCIS-127) or equivalent courses.) Lab 2, Lecture 4 (Fall, Spring). |
3 |
NSSA-245 | Network Services This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services. (Prerequisites: NSSA-241 and (NSSA-220 or CSCI-141 or GCIS-123) and NSSA-221 or equivalent courses.) Lab 4, Lecture 4 (Fall, Spring). |
3 |
General Education – Artistic Perspective |
3 | |
General Education – Social Perspective |
3 | |
General Education – Natural Science Inquiry Perspective† |
4 | |
General Education – Scientific Principles Perspective† |
4 | |
Third Year | ||
CSCI-462 | Introduction to Cryptography This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. Students cannot take and receive credit for this course if they have credit for CSCI-662. (Prerequisites: (CSCI-243 or SWEN-262 or CSEC-202) and (MATH-190 or MATH-200) or equivalent courses.) Lecture 3 (Fall, Spring, Summer). |
3 |
CSEC-310 | Endpoint Security Engineering This course will discuss cybersecurity defensive measures and their application to protecting computing endpoints. The course will focus on studying, analyzing, and understanding vulnerabilities and threats along with the preventative and detective controls necessary to mitigate risk. Defensive endpoint-based controls will be explored and applied with hands-on exercises. (Prerequisites: (CSEC-101 or CSEC-102 or CSEC-140) and NSSA-245 or equivalent courses.) Lab 2, Lecture 2 (Fall, Spring). |
3 |
CSEC-380 | Principles of Web Application Security This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ. (Prerequisites: (CSEC-101 or CSEC-102 or CSEC-140) and NSSA-245 or equivalent courses.) Lecture 3 (Spring). |
3 |
CSEC-472 | Authentication and Security Models (WI-PR) Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area. (Prerequisites: CSEC-362 or CSCI-462 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
CSEC-499 | Cooperative Education in CSEC (summer) Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load. (Enrollment in this course requires permission from the department offering the course.) CO OP (Fall, Spring, Summer). |
0 |
ISTE-230 | Introduction to Database and Data Modeling A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. Note: students should have one course in object-oriented programming. (Prerequisites: ISTE-120 or ISTE-200 or IGME-101 or IGME-105 or CSCI-140 or CSCI-142 or NACA-161 or NMAD-180 or BIOL-135 or GCIS-123 or GCIS-127 or equivalent course.) Lec/Lab 3 (Fall, Spring). |
3 |
PUBL-363 | Cyber Security Policy and Law (General Education) Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The
central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws. Lecture 3 (Fall, Spring). |
3 |
CSEC Elective |
3 | |
Open Electives |
6 | |
General Education – Immersion 1 |
3 | |
Fourth Year | ||
CSEC-490 | Capstone in Computing Security This is a capstone course for students in the cybersecurity program. Students will review a series of short modules on topics such as teamwork, project management, report writing, and presentations, and will work in teams to apply their knowledge and skills to real-world projects in various areas of cybersecurity. Projects may require performing security analysis of systems, networks, software, policies, etc., devising and implementing security solutions in real-world applications. (4th-year status and departmental approval) (This course is restricted to INFOSEC-BS students with 4th year standing.) Project 1 (Fall, Spring). |
3 |
PUBL-701 | Graduate Policy Analysis This course provides graduate students with necessary tools to help them become effective policy analysts. The course places particular emphasis on understanding the policy process, the different approaches to policy analysis, and the application of quantitative and qualitative methods for evaluating public policies. Students will apply these tools to contemporary public policy decision making at the local, state, federal, and international levels. Lecture 3 (Fall). |
3 |
PUBL-702 | Graduate Decision Analysis This course provides students with an introduction to decision science and analysis. The course focuses on several important tools for making good decisions, including decision trees, including forecasting, risk analysis, and multi-attribute decision making. Students will apply these tools to contemporary public policy decision making at the local, state, federal, and international levels. Lecture 3 (Spring). |
3 |
Choose one of the following: | 3 |
|
PHIL-102 | Introduction to Moral Issues This course examines ethical questions that arise in the course of day-to-day individual and social life. Some consideration will be given to ethical theory and its application to such questions, but emphasis will be on basic moral questions and practical issues. Examples of typical issues to be examined are: What are the grounds for moral obligations like keeping promises or obeying the law? How do we reason about what to do? Examples of typical moral issues that may be introduced are capital punishment, euthanasia, abortion, corporate responsibility, the treatment of animals, and so forth. Lecture 3 (Fall, Spring). |
|
PHIL-202 | Foundations of Moral Philosophy This course is a survey of foundational, and normative, approaches to moral philosophy and their motivating moral questions. Topics will include virtue ethics, deontology, consequentialism, and other approaches. Some of the questions to be examined are: How is human nature related to morality? What are the grounds for moral obligations? Is there an ultimate moral principle? How do we reason about what to do? Can reason determine how we ought to live? What are moral judgments? Are there universal goods? What constitutes a morally worthwhile life? Can morality itself be challenged? Lecture 3 (Fall). |
|
PHIL-306 | Professional Ethics This course critically examines ethical issues that arise in professional life. The course will examine not only the general relationship between ethics and professional life but the particular consequences of ethical considerations within the student's own profession and the professions of others with whom the student must live and work. Lecture 3 (Fall). |
|
CSEC Electives |
12 | |
General Education – Immersion 2, 3 |
6 | |
Fifth Year | ||
PUBL-700 | Readings in Public Policy An in-depth inquiry into key contemporary public policy issues. Students will be exposed to a wide range of important public policy texts, and will learn how to write a literature review in a policy area of their choosing. (This class is restricted to degree-seeking graduate students or those with permission from instructor.) Seminar (Fall). |
3 |
PUBL-703 | Evaluation and Research Design The focus of this course is on evaluation of program outcomes and research design. Students will explore the questions and methodologies associated with meeting programmatic outcomes, secondary or unanticipated effects, and an analysis of alternative means for achieving program outcomes. Critique of evaluation research methodologies will also be considered. Seminar (Spring). |
3 |
Choose one of the following: | 3 |
|
PUBL-610 | Technological Innovation and Public Policy Technological innovation, the incremental and revolutionary improvements in technology, has been a major driver in economic, social, military, and political change. This course will introduce generic models of innovation that span multiple sectors including: energy, environment, health, and bio- and information-technologies. The course will then analyze how governments choose policies, such as patents, to spur and shape innovation and its impacts on the economy and society. Students will be introduced to a global perspective on innovation policy including economic competitiveness, technology transfer and appropriate technology. Lecture 3 (Spring). |
|
STSO-710 | Graduate Science and Technology Policy Seminar STP examines how local, state, federal and international policies are developed to influence innovation, the transfer of technology and industrial productivity in the United States and other selected nations. It provides a framework for considering the mechanisms of policy as a form of promotion and control for science and technology, even once those innovations are democratized and effectively uncontrollable. Further focus is dedicated to the structure of governance inherent in U.S. domestic policy, limits of that approach, the influences of international actors, and utilizing case studies to demonstrate the challenges inherent in managing differing types of technology. This seminar is restricted to degree-seeking graduate students or those with permission from the instructor. (This class is restricted to degree-seeking graduate students or those with permission from instructor.) Seminar (Biannual). |
|
Public Policy Graduate Electives |
6 | |
Graduate Elective |
3 | |
Choose one of the following: | 6 |
|
PUBL-785 | Capstone Research Experience The Public Policy Capstone Experience serves as a culminating experience for those MS in Science, Technology and Public Policy students who chose this option in the Public Policy Department. Over the course of the semester, students will have the opportunity to investigate and address contemporary topics in science and technology policy using analytic skills and theoretical knowledge learned over the course of their MS degree. Project 1 (Fall, Spring, Summer). |
|
PUBL-790 | Public Policy Thesis The master's thesis in science, technology, and public policy requires the student to select a thesis topic, advisor and committee; prepare a written thesis proposal for approval by the faculty; present and defend the thesis before a thesis committee; and submit a bound copy of the thesis to the library and to the program chair. (Enrollment in this course requires permission from the department offering the course.) Thesis 3 (Fall, Spring, Summer). |
|
PUBL-798 | Comprehensive Exam Research plus two (2) Graduate Electives |
|
Total Semester Credit Hours | 150 |
Please see General Education Curriculum for more information.
(WI) Refers to a writing intensive course within the major.
* Please see Wellness Education Requirement for more information. Students completing bachelor's degrees are required to complete two different Wellness courses.
† Students must complete one of the following lab science sequences: University Physics I and University Physics II (PHYS-211/212), General & Analytical Chemistry I, General & Analytical Chemistry I Lab, General & Analytical Chemistry II, and General & Analytical Chemistry II Lab (CHMG-141/142/145/146), or General Biology I, General Biology I Lab, General Biology II, and General Biology II Lab (BIOL-101/102/103/104).
Admissions and Financial Aid
This program is STEM designated when studying on campus and full time.
First-Year Admission
A strong performance in a college preparatory program is expected. This includes:
- 4 years of English
- 3 years of social studies and/or history
- 4 years of mathematics is required and must include algebra, geometry, algebra 2/trigonometry, and pre-calculus. Calculus is preferred.
- 2-3 years of science is required and must include chemistry or physics; both are preferred.
- Computing electives are preferred.
Transfer Admission
Transfer course recommendations without associate degree
Courses in computer science, calculus, liberal arts; calculus-based physics, chemistry, or biology
Appropriate associate degree programs for transfer
AS degree in computer science, engineering science, or liberal arts
Financial Aid and Scholarships
100% of all incoming first-year and transfer students receive aid.
RIT’s personalized and comprehensive financial aid program includes scholarships, grants, loans, and campus employment programs. When all these are put to work, your actual cost may be much lower than the published estimated cost of attendance.
Learn more about financial aid and scholarships
Related News
-
September 24, 2024
RIT climbs to No. 91 nationally in ‘U.S. News’ best colleges ranking
The new listing of the nation’s prestigious research universities is the highest to date for RIT, a jump of seven spots from last year.
-
September 18, 2024
Two faculty members installed as Kevin O’Sullivan Endowed Professors in Cybersecurity
Billy Brumley and Matthew Wright were appointed for their work in building RIT’s cybersecurity education and research legacy. As one of the highest honors in academia, endowed professorships recognize and support outstanding researchers and educators who profoundly impact the lives of their students.
-
September 10, 2024
RIT faculty play large role in NSF Secure and Trustworthy Cyberspace research
Nine RIT faculty members attended the 2024 Secure and Trustworthy Cyberspace Principal Investigators’ Meeting Sept. 4-5, in Pittsburgh.
Contact
- Rob Olson
- Senior Lecturer
- Department of Cybersecurity
- Golisano College of Computing and Information Sciences
- 585‑475‑2735
- rboics@rit.edu
Department of Cybersecurity