Computing Security MS

A degree driven by real-time employer demand

Cybersecurity jobs will grow 29% by 2030, outpacing the overall labor market growth. Search our curriculum and you’ll find the expertise and skills posted by employers in this growing field.

The computing security job market


Average Annual Salary


Employment Growth


Postings in IT for Information Security


Job Postings in Last Year

Program Highlights

RIT is a designated National Center of Academic Excellence in Cybersecurity Education and Research by the National Security Agency and Department of Homeland Security. In this master’s degree, you’ll learn from the same distinguished faculty as the on-campus program, and benefit from RIT’s leadership in this field. 

This innovative program is designed to enable students to gain a foundation of computing security knowledge and apply that learning, joining  a team of professionals to solve the challenges of ensuring secure computing environments. Students will prepare to become leaders within their organizations in the implementation of computing security and information assurance policies and practices.

This 30-credit degree may be completed in as few as 24 months. We offer Fall and Spring start dates.

Curriculum packed with high-demand skills

circle connected to smaller circles


Information security skills are found in over ⅓ of job postings, and projected to grow 22%.

icon showing servers connected.


Python skills are projected to grow 61% by 2023.

icon of a gear with checkboxes


DevOps skills are projected to grow 108% by 2023.

two overlapping squares.


NIST Cybersecurity Framework skills are projected to grow 111%.

What you will learn

  • How to manage, analyze, and draw inferences from big data—adapting to a diverse audience using business communication skills to effectively convey your insights 
  • How to use data mining—with tools including machine learning, software like SAS and R—to drive insightful decision-making
  • How to apply statistics to the design and analysis of experiment-based industrial studies and clinical trials


Credits 3
This course is designed to provide students with the advanced concepts needed to establish network security strategies to ensure adequate protection for the corporate environment and yet provide accessibility for the corporate community.
Credits 3
In this course, students will learn in depth knowledge of cryptography and authentication. Students will explore various cryptography algorithms, authentication protocols, and their design and implementation. Students will work on a project to implement a cryptographic algorithm and/or an authentication protocol. The applications of cryptography and authentications in the areas of computer networks and systems and information assurance will also be investigated.
Credits 3
This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess a knowledge of available filesystems on both platforms.
Credits 3
This course discusses the processes and procedures to perform a technical security audit of web servers and web based applications. Students will not only explore Web Servers and Applications/Services threats, but also apply the latest auditing techniques to identify vulnerabilities existing in or stemming from web servers and applications. Students will write and present their findings and recommendations in audit reports on web servers and application vulnerabilities. To be successful in this course students should be knowledgeable in a scripting language and comfortable with the administration of both Linux and Windows platforms.
Credits 3
This course will provide students with an introduction to the principle of risk management and its three key elements: risk analysis, risk assessment and vulnerability assessment. Students will also learn the differences between quantitative and qualitative risk assessment, and details of how security metrics can be modeled/monitored/controlled and how various types of qualitative risk assessment can be applied to the overall assessment process. Several industry case studies will be studied and discussed. Students will work together in teams to conduct risk assessments based on selected case studies or hypothetical scenarios. Finally, they will write and present their risk assessment reports and findings.
Credits 3
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.
Credits 3
Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense.
Credits 3
Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies.
Credits 3
This course explores current topics in Computing Security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.

Earn a credential as-you-go

Earn the advanced certificate in cybersecurity and advance your career, all while working toward your master of science in computing security. Four courses of the MS degree program may be fully applied toward a graduate advanced certificate.

Admission Requirements

  • Hold a baccalaureate degree (or equivalent) from an accredited university or college.
  • Have a minimum cumulative undergraduate GPA of 3.0 (or equivalent) (for borderline cases, professional experience will be taken into account)
  • Have a background in computer programming (two courses)
  • Have satisfactory background in discrete mathematics and one course in statistics. Calculus recommended but not required 
  • Submit official transcripts (in English) of all previously completed undergraduate and graduate course work.
  • Submit a current resume and personal statement.
  • Submit one letter of recommendation from academic or professional sources.
  • GRE scores are not required for domestic applicants.
  • International applicants whose native language is not English must submit scores from the TOEFL, IELTS, or PTE.


The online MS in Computing Security requires 30 credits and costs $1,191 per credit hour (Academic Year 2020 – 2021). This tuition reflects the RIT Online discount of 43% off the MS in Computing Security campus-based program cost.

Keep in mind that there are many options available that may help you lower your costs. Learn more about resources available including:

  • Military tuition benefits
  • Support from employers
  • Private scholarships 
  • Financing 
  • Payment plans

Certain countries are subject to comprehensive embargoes under US Export Controls, which prohibit virtually ALL exports, imports and other transactions without a license or other US Government authorization.