Cybersecurity Risk Management Minor
- RIT /
- Rochester Institute of Technology /
- Academics /
- Cybersecurity Risk Management Minor
Overview for Cybersecurity Risk Management Minor
With the prevalence of data breaches and cyber-attacks, securing intellectual properties and customer’s personally identifiable information has become increasingly challenging in business, government, and academia. It is commonly recognized that a key factor for having a cyber-secured environment and operations is well-trained employees with good cyber hygiene. A small human error may lead to a disastrous cyber incident. The cybersecurity risk management minor is designed for students in non-computing majors who are interested in learning about cybersecurity and developing the knowledge and skills to support organizations in their efforts to protect their computing and informational resources. Students learn the basics of computing and cybersecurity and then gain knowledge and practice in cybersecurity policy and law, risk management, and business continuity plans in the event of a cybersecurity attack.
Notes about this minor:
- This minor is closed to students majoring in computing security or any combined accelerated degree (BS/MS) that includes the BS in cybersecurity
- Posting of the minor on the student's academic transcript requires a minimum GPA of 2.0 in the minor.
- Notations may appear in the curriculum chart below outlining pre-requisites, co-requisites, and other curriculum requirements (see footnotes).
- At least nine semester credit hours of the minor must consist of specific courses not required by the student’s degree program.
The plan code for Cybersecurity Risk Management Minor is CYBRISK-MN.
Curriculum for 2025-2026 for Cybersecurity Risk Management Minor
Current Students: See Curriculum Requirements
Cybersecurity Risk Management Minor
Code | Title | Hours |
---|---|---|
Required Courses | ||
CSEC-140 | Introduction to Cybersecurity | 3 |
ISCH-110 | Principles of Computing | 3 |
PUBL-363 | Cyber Security Policy and Law | 3 |
Electives | ||
Select two of the following: | 6 | |
Cryptography and Authentication | ||
Risk Management for Information Security | ||
Disaster Recovery Planning and Business Continuity | ||
Total Hours | 15 |
Contact
- Liz Martin
- Academic Advisor
- Advising
- Golisano College of Computing and Information Sciences
- 585‑475‑2189
- ejhics@rit.edu
Department of Cybersecurity