Rochester Institute of Technology

Academic Program Overviews

Student Skills & Capabilities, Salary Data, Career Information 

Computing Security BS

Program Overview

The BS in Computing Security is designed to produce graduates who will be experts in identification and detection of computing system
 and network security vulnerabilities and exploits. They will also be skilled in recognizing and deterring cyber-attacks. Of equal importance
for these students is an understanding of the forensic requirements of proving that an attack occurred and where it originated. They will have the knowledge needed to diagnose the extent of the attack so that damage can be mitigated and the extent of any information loss assessed. Their coursework includes a complement of core courses which gives the students a firm foundation in computer programming, networking, systems administration and computing security. This is followed by advanced study where the students select from a variety of specialty areas such as network security, systems security, digital forensics, malware analysis, secure software development and coding, and computing security theory.  This allows the student to gain in depth knowledge in their areas of interest. Although security issues are addressed throughout our curriculum students in the computing security program address security theory and technologies in great depth.

Degrees Awarded

  • Bachelor of Science

Enrollment

  • Approximately 375 students are enrolled in the Computing Security degree program.

Cooperative Education & Experiential Education Component

  • Students are required to complete two co-op work assignments.

Salary Information

Co-op:        $19.77                                  $9.00 - $50.00
BS:              $78,347                                $55,000 - $100,000

Student Skills & Capabilities

End of the Second Academic Year
Basic computer and network security awareness as well as exposure to security policy and legal issues.  Strong programming skills in various computing language including Scripting, Python, Java, C/C++. Direct experience in a variety of computing environments on multiple platforms, including Windows, MacOS, and Linux. Basic system administration functions, including account creation and management.
 
During the Third and Fourth Academic Year
Intermediate to advanced computing security techniques associated various focused specialty areas such as System and Network Security, Digital Forensics, Malware Analysis, Security Software Development, and Database Security.

Accreditation

Accreditations
RIT is accredited by the Middle States Commission on Higher Education which is the unit of the Middle States Association of Colleges and Schools that accredits degree-granting colleges and universities in the Middle States region, which includes Delaware, the District of Columbia, Maryland, New Jersey, New York, Pennsylvania, Puerto Rico, and the US Virgin Islands.
 

Designations
RIT has been designated as a National Center of Academic Excellence in Information Assurance/Cyber Defense by National Security Agency and Department of Homeland Security since 2006.

 

Equipment & Facilities

Our students have access to hundreds of computers which are distributed over several specialty labs. These labs include: the Security Lab, the Air-Gap Lab, the Networking Lab, the Systems Administration Lab, the programming labs and the database labs. Each of these facilities is fully equipped with high performance workstation machines and make extensive use of virtualization technologies to provide a wide variety of operating system environments.  In addition, the labs have a full array of networking equipment from a variety of vendors. The labs are also equipped with wireless access points with 802.11a,b,g,n protocols, layer 3 switches, as well as network simulation, network data capture and virtualization software. The security lab includes a full assortment of firewalls, IDS, VPN bundles, layer 3 switches, routers, digital forensics software, and various other pieces of security related software. The air-gap lab has a standalone cloud infrastructure along with 10 sets of servers and network devices for students to configure their own enterprise networks in cyber attack and defense exercises and Pentesting projects. Additionally, computing security students have access to commercial grade enterprise security produces such as IBM QRadar SIEM suit, McAfee ePO suit, Splunk, etc., and forensics tools such as EnCase, FTK, etc.

Selected Employer Hiring Partners

Apple Inc., Blackrock, BOCES Monroe #2, Box Inc., Brand Networks Inc., Cisco Meraki, Cisco Systems Inc., CliftonLarsonAllen, Coalfire Systems, Corning Inc., Darien Lake Theme Park Resort, Datto Inc., DENTSPLY International, Draper Laboratory, EarthLink Business, Eastman Kodak, FactSet Research Systems Inc., General Dynamics Advanced Information Systems, Global Printing (Global Thinking), Global Response, Hitachi Data Systems, IBM Corp, iCardiac Technologies Inc., IDI Billing Solutions, Innovative Systems, Inc., Interactive Intelligence Inc., ITT Exelis,  JPMorgan Chase, Liberty Mutual, LinkedIn, Mediancom Communications Corp., Metlife, NASA Jet Propulsion Laboratory, National Security Agency, Northrop Grumman, NYS Unified Court System, Oceana Inc., Palantir Technologies, Parsons, PASCO Building Automation Systems, Paychex, Phoenix Energy Supply, Ponte Technologies, PPL Corporation, Pro-Mold Inc., Quanterion Solutions Inc., Raytheon, Reliant Security, RIT – Information Security Office, Rochester General Health System, Southwest Airlines, Symantec Corporation, Syracuse University, Systems Management Planning Inc., The Hershey Company, Time Inc., Trustwave, University of Rochester  - Center for Research Computing, University of Rochester Medical Center – Information Systems Division, UTC Aerospace Systems, Verizon Wireless, Wayfair, Wegmans Food Markets Inc., Wilmorite Management Group LLC, Wyman Gordon

Contact Us

We appreciate your interest in hiring RIT co-ops, graduating students or alumni. We will make every effort to ensure your recruiting endeavor is a success. Call our office and ask to speak with Michelle Magee, the career services coordinator who works with the Computing Security program. For your convenience, you can access information and services through our web site at www.rit.edu/recruit.
 

Michelle A. Magee, Associate Director, This email address is being protected from spambots. You need JavaScript enabled to view it.; 585.475.7824
Rochester Institute of Technology . Office of Career Services and Cooperative Education
Bausch & Lomb Center
57 Lomb Memorial Drive . Rochester NY  14623-5603
585.475.2301


3/17