Rochester Institute of Technology

Academic Program Overviews

Student Skills & Capabilities, Salary Data, Career Information 

Computing Security BS

Program Overview

 The BS in Computing Security is designed for students who are interested in computer science and eager to defend the industry and national cyberinfrastructure from constant attacks by adversaries. The program aims to equip students with fundamental to advanced knowledge and skills in computing security and nurture their critical thinking, creativity, and problem-solving acumen. 
Graduates from the program will be able to identify computing systems and network vulnerabilities, as well as detect and prevent attempts of intrusion and exploitation. They will be capable of conducting professional penetration testing for an enterprise network or perform a security assessment for applications and IoT devices.   They will also be able to execute a detailed digital forensic investigation after a cyber breach. Lastly, they will have the knowledge needed to diagnose the extent of the attack to mitigate damage and assess the extent of any information loss.  
Coursework in the Computing Security program includes a complement of core courses which provides students with a firm foundation in computer programming, networking, systems administration, and computing security fundamentals. In advanced studies, students can select from a variety of concentration areas such as network and systems security, digital forensics and malware analysis, or software and application security including security coding, which allows students to gain in-depth knowledge in their areas of interest.

Degrees Awarded

  • Bachelor of Science

Enrollment

  • Approximately 375 students are enrolled in the Computing Security degree program.

Cooperative Education & Experiential Education Component

  • Students are required to complete two co-op work assignments.

Salary Information

Co-op:        $21.53               $9.00 - $50.00
BS:              $75,306

Student Skills & Capabilities

End of the Second Academic Year
Basic computer and network security awareness as well as exposure to security policy and legal issues.  Strong programming skills in various computing language including Sripting, Python, Java, C/C++. Direct experience in a variety of computing environments on multiple platforms, including Windows, MacOS, and Linux. Basic system administration functions.
 
During the Third and Fourth Academic Year
Intermediate to advanced computing security techniques associated various focused specialty areas such as System and Network Security, Digital Forensics, Malware Analysis, Security Software Development, and Database Security.

Accreditation

Accreditations
RIT is accredited by the Middle States Commission on Higher Education which is the unit of the Middle States Association of Colleges and Schools that accredits degree-granting colleges and universities in the Middle States region, which includes Delaware, the District of Columbia, Maryland, New Jersey, New York, Pennsylvania, Puerto Rico, and the US Virgin Islands.
 

Designations
RIT has been designated as a National Center of Academic Excellence in Cyber Defense Education and Research by National Security Agency and Department of Homeland Security.

 

Equipment & Facilities

RIT students have access to hundreds of computers which are distributed over several specialty labs. These labs include: Security Lab, Air-Gap Lab, Networking Lab, the Systems Administration Lab, programming labs and database labs. Each of these facilities is fully equipped with high performance workstation machines and make extensive use of virtualization technologies to provide a wide variety of operating system environments.  Labs have a full array of networking equipment from a variety of vendors, equipped with wireless access points with 802.11a,b,g,n protocols, layer 3 switches, as well as network simulation, network data capture and virtualization software. Security Lab includes a full assortment of firewalls, IDS, VPN bundles, layer 3 switches, routers, digital forensics software, and various other pieces of security-related software. Air-Gap Lab has a standalone cloud infrastructure along with 10 sets of servers and network devices for students to configure their own enterprise networks in cyber-attack and defense exercises and Pentesting projects. Computing security students have access to commercial grade enterprise security produces such as IBM QRadar SIEM suit, McAfee ePO suit, Splunk, etc., and forensics tools such as EnCase, and FTK.

Training / Qualifications

Information security continues to develop as a career field, and many schools are responding with information security programs for prospective job seekers. Currently, a well-rounded computer education is preferred. Employers of information security analysts may prefer applicants who have a master’s degree in information systems. Important Qualities: Analytical skills. Analysts must study computer systems and networks and assess risks to determine how security policies and protocols can be improved. Detail oriented. Because cyberattacks can be difficult to detect, analysts pay careful attention to their computer systems and watch for minor changes in performance. Ingenuity. Analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks. Problem-solving skills. Analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Job Titles

Computer Security Analyst, Cyber Security Engineer, Information Security Analyst, Junior Security Engineer
Malware Analyst, Network Engineer, Security Analyst, Site Reliability Engineer, Systems Engineer

Significant Points

  • RIT is a top 100 National University: https://www.rit.edu/overview/rankings-and-recognition,
  • with a dedicated department for Computing Security, being the first university in the U.S. to offer an academic department devoted entirely to the field (https://csec.rit.edu/),
  • inside a dedicated college for Computing and Information Sciences (http://www.rit.edu/gccis/).
  • Our department is designated as a Center of Academic Excellence in both Research and Education by National Security Agency and Department of Homeland Security: http://www.rit.edu/news/story.php?id=62888&source=enewsletter.
  • RIT boasts a dedicated Center for Cybersecurity which partners with industry leaders to understand cybersecurity needs and serves as a hub for various research projects: https://www.rit.edu/cybersecurity/.
  • The Center has major RIT support-(over $2M): https://www.rit.edu/showcase/index.php?id=342 RIT just received a $50M gift, of which $20M goes to cybersecurity: http://www.rit.edu/news/story.php?id=65352.
  • Our Collegiate Cyber Defense Competition (CCDC) team won Nationals in 2013: https://www.rit.edu/gccis/computingsecurity/news/rit-ccdc-team-heading-nationals.
  • Our department created the Collegiate Penetration Testing Competition and now hosts the National event (NCPTC): http://www.nationalcptc.org/

Selected Employer Hiring Partners

Apple, Bank of America, Cisco, Eaton Corporation, FBI, IBM Corporation, Indeed.com, Intuit, JPMorgan Chase, Juniper Networks, Lockheed Martin, Mitre Corporation, National Security Agency, Parsons, Paychex, Raytheon, Ultimate Software, Symantec Corporation, Wegmans

Contact Us

We appreciate your interest in your career and we will make every effort to help you succeed. Access information about services at https://www.rit.edu/careerservices.
 

Michelle A. Magee, Senior Associate Director Employer Engagements & Partnerships
This email address is being protected from spambots. You need JavaScript enabled to view it.; 585.475.7824; 585.475.2301
Rochester Institute of Technology. Office of Career Services and Cooperative Education
Bausch & Lomb Center 57 Lomb Memorial Drive
Rochester NY  14623-5603