Rob Olson Headshot

Rob Olson

Lecturer

Department of Computing Security
Golisano College of Computing and Information Sciences

585-475-4601
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Rob Olson

Lecturer

Department of Computing Security
Golisano College of Computing and Information Sciences

Education

BS, MS, State University College at Fredonia; MS, Nova Southeastern University

Bio

Rob Olson is a lecturer and the Undergraduate Program Director in the Department of Computing Security. Prior to being hired at R.I.T., he taught in the Department of Computer & Information SciencesĀ at the State University of New York at Fredonia where he taught an extensive range of courses in programming, security, and artificial intelligence. He holds a M.S. in Interdisciplinary Studies focusing on Cognitive Science from S.U.N.Y. Fredonia and a Masters of Management Information Systems from Nova Southeastern University. Additionally, he is also a Certified Ethical Hacker, a Certified Information Systems Security Professional, and an Offensive Security Certified Professional. His interests are in penetration testing, web and mobile application security, and privacy.

585-475-4601

Currently Teaching

CSEC-499
0 Credits
Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load.
CSEC-498
0 Credits
Students will gain experience and a better understanding of the field of cybersecurity by gaining practical experience in an area to which cybersecurity is commonly applied, such as software development, networking, or system administration. The goal of this co-op will be to gain a better understanding of the fundamental technologies used in the cybersecurity industry and experience in how professional teams in cybersecurity-adjacent fields operate. Students will be evaluated by their employer. If a transfer student, one term in residence must be completed at RIT carrying a full academic load. (Permission of the Department)
CSEC-467
3 Credits
This course will be an in-depth study of security, incident response, and forensics as applied to the hardening and protection of mobile devices. Students will learn issues specific to the security of and vulnerabilities of mobile devices as well as forensics tools and incident response techniques used to reveal activities and information related to mobile devices.
CSEC-731
3 Credits
This course discusses the processes and procedures to perform a technical security audit of web servers and web based applications. Students will not only explore Web Servers and Applications/Services threats, but also apply the latest auditing techniques to identify vulnerabilities existing in or stemming from web servers and applications. Students will write and present their findings and recommendations in audit reports on web servers and application vulnerabilities. To be successful in this course students should be knowledgeable in a scripting language and comfortable with the administration of both Linux and Windows platforms.
CSEC-140
3 Credits
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
CSEC-490
3 Credits
This is a capstone course for students in the information security and forensics program. Students will apply knowledge and skills learned and work on real world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.

In the News