Cybersecurity Resources

Accreditations and Designations

Accreditation

Middle States Commission on Higher Education

Designations

Center of Academic Excellence in Cybersecurity Education and Research by the National Security Agency (NSA) and the Department of Homeland Security (DHS)

BS Student Resources

Meet your advisors

Students with last names beginning A-K

 

Students with last names beginning L-Z

Liz Martin headshot
Academic Advisor
Advising
Golisano College of Computing and Information Sciences
585-475-2189

 

A matriculated student in the B.S. in Computing Security needs to take 6 elective courses. It is required to take 3 courses from one of the following clusters, and 3 courses from the approved Advanced Electives. 

Any student starting before Fall 2023- take any of the 6 advanced electives from the list below. Clusters are no longer required.

Any student starting Fall 2023 or later- take any 5 of the advanced electives from the list below.

Electives:

  • CSCI 455 Principles of Computer Security
  • CSCI 464 Xtreme Theory
  • CSCI 531 Introduction to Security Measurement
  • CSCI 532 Introduction to Intelligent Security Systems
  • **CSCI 622 Data Security and Privacy
  • **CSCI 642 Secure Coding
  • **CSCI 762 Advanced Cryptography
  • CSEC 461 Computer System Security
  • CSEC 462 Network Security and Forensics
  • CSEC 464 Computer Systems Forensics
  • CSEC 465 Network & System Security Audit
  • CSEC 466 Introduction to Malware
  • CSEC 467 Mobile Device Security and Forensics
  • CSEC 468 Risk Management for Information Security
  • CSEC 471 Penetration Testing Frameworks & Methodologies
  • CSEC 473 Cyber Defense Techniques
  • CSEC 470 Covert Communications (WI)
  • CSEC 476 Malware Reverse Engineering
  • CSEC 477 Disaster Recovery Planning and Business Continuity
  • CSEC 520 Cyber Analytics and Machine Learning
  • CSEC 559 Hacking for Defense
  • CSEC 559 Offensive Security Engineering
  • CSEC 559 Trusted Computing System Security
  • CSEC 559 Usable Security and Privacy
  • CSEC 569 Wireless Security
  • **CSEC 731 Web Server and Application Security Audits
  • SWEN 261 Introduction to Software Engineering
  • SWEN 331 Engineering Secure Software

Michelle Magee, mamoce@rit.edu, Cybersecurity (BS) (Last Names A-D)

Andrea Tuttle, agtoce@rit.edu, Cybersecurity (BS) (Last Names E-Q)

Angela Pezzimenti, acpoce@rit.edu,  Cybersecurity (BS) (Last Names R-Z), Cybersecurity (MS)

BS Curriculum Flowcharts

CSEC Flowchart 2231 MATH 171

Curriculum flowchart 2231

CSEC Flowchart 2231 MATH 181

Curriculum flowchart 2231

CSEC Flowchart 2221 MATH 171

Curriculum flowchart for 2221

CSEC Flowchart 2221 MATH 181

Curriculum Flowchart

 

CSEC Flowchart 2221 MATH 181A

Curriculum flowchart

BS/MS Student Resources

BS/MS Overview and Eligibility The BS/MS in the Computing Security program is for undergraduate students who wish to earn both a BS and MS in Computing Security. A student accepted into this program will be able to take up to three graduate courses (9 semester credit hours) in Computing Security and apply them to both the BS and MS degree requirements. These courses would take the place of three of the advanced security courses in the undergraduate degree and will be considered electives in the graduate degree. This three course overlap will give students the opportunity to complete both degrees in five years given careful planning and execution.

Admissions Requirements:
  • 1. Students must have a minimum cumulative GPA of a 3.25.
  • 2. Student must be at least third year standing.
  • 3. Students must complete 20 semester credits of computing coursework before applying.
  • 4. For students whose BS curriculum requires co-op, a minimum of 1 co-op must be completed before applying.
  • 5. Students must complete a brief statement outlining why they are interested in the BS/MS program and what area of focus they think they are interested in pursuing.
  • 6. Students must provide one letter of recommendation from a GCCIS professor explaining your potential for the BS/MS program. *It is important to note that we cannot guarantee acceptance into the BS/MS program even if entrance criteria are met, as it will depend on the demand and on the space available in our program from term to term.

**All students who turn in an official Change of Program Application Form will be evaluated at the end of the term once grades for the current term post. It should be noted that a student will not receive their Bachelor’s degree until the requirements for both the BS and MS degrees have both been completed. 

Academic details:
  • You can “double-count” up to three courses (9 semester credits) in the BS and MS degrees (typically in the Advanced elective area).
  • You “officially” become a graduate student at year level 6 when you have earned 126 semester credits. From this point on, you will be able to register yourself for graduate courses in SIS on the graduate career; until then, you will need to register graduate courses on the undergraduate career
  • The lowest passing grade in the graduate program is “C”. You must have a minimum 3.0 GPA in your graduate program in order to earn your MS degree.
  • There is no grade replacement in the graduate program. All courses taken and all grades earned remain on your transcript and count in your GPA.
  • In order to be considered full time as an undergraduate student, you must be enrolled in a minimum of 12 semester credits. As a graduate student, you must be enrolled in a minimum of 9 semester credits to be considered full time, however, graduate students are eligible for up to 2 Full Time Equivalencies (FTE) based on remaining course requirements.
  • Avoid duplicate course material, if you take a class listed below at the undergraduate level you cannot take it at the graduate level. Below is a list of duplicate courses between the BS and MS programs.

Undergraduate Course Graduate Course

 

CSEC 461 -------- CSEC 742

CSEC 202 -------- CSEC 743

CSEC 464 -------- CSEC 730

CSEC 470 -------- CSEC 750

CSCI 462 -------- CSEC 604


Completing the program:

  • ALL undergraduate degree requirements must be complete (including wellness and co-op) before you can register for the MS Project, MS Capstone, or Thesis.
  • You must work with the Sr. Staff Specialist to register for either MS Thesis, MS Project, or MS Capstone Course by submitting assigned proposal. Make sure you watch for deadlines
  • If you submit a Thesis proposal you have one year to complete the defense before the proposal expires.
  • There is a 7-year rule in place for all graduate programs. You must complete your graduate work within 7 years of the semester in which you took your first graduate course that counts toward the MS degree.
Financial:
  • You are eligible for a BS/MS tuition discount on the graduate tuition rates. The discount that you receive should bring your graduate tuition charges close to that which you paid for undergraduate. Work with your financial aid counselor for more information.
  • As a graduate student, you can apply for Graduate and Teaching Assistantships (GA/TA) both in the CSEC department and across campus. These positions usually pay a tuition benefit as well as a salary. You might want to check with your Financial Aid Advisor to see if the BS/MS discount or the GA/TA position is more beneficial.   
Administrative:
  • Your program code changes from UCIS, INFOSEC-BS to UCIS, INFOSEC-BS, CSEC-U to GCIS, COMPSEC-MS, CSEC-G.
  • Your courses are split into sections on your transcript by undergraduate and graduate and each has its own GPA statistics.
  • Since you can apply for graduation for your BS and MS degrees separately on SIS, we would like you to apply for your BS degree AND your MS degree at the SAME time. You should apply for BOTH degrees after you have completed 15 graduate semester credits toward your MS degree requirements. 

Prospective Students

Current RIT students that are interested in a Change of Program (COP) into Cybersecurity must do the following to be considered for the program:

1. Prospective Change of Program students are required to meet with an academic advisor in the Cybersecurity Department.

  •  You can stop by GOL-1770 or call 585-475-2963 to schedule that meeting. 
  • Students with Last Name A-K with meet with Rachael Waldrop, L-Z with Liz Martin.

2. Complete the Change of Program form with your current academic advisor. They will email the form to csecadvising@rit.edu to include with your application materials.

3. Submit a personal statement via email addressing the following:

  • Why are you applying?
  • What are your academic strengths & weaknesses?
  • What areas in computing are you passionate about?
  • What are your future goals/career interests?
  • Why do you feel your current major is not the right “fit” for your future goals?
  • Why do you believe this major is the right “fit” for your future goals?

4. If you have not taken Calculus, contact examasst@rit.edu to take the Math Placement Exam.

5. Contact Financial Aid to understand any aid implications a change of major could have.

6. All application materials must be submitted to csecadvising@rit.edu by the last day of final exams of the term prior to entry.


You will not be able to enroll in our courses until after our seat restrictions are lifted (please refer to the seat restriction date in SIS). Provided you meet the pre-requisites, you can add yourself to the waitlist which will automatically enroll you after the restrictions are removed (assuming there are open seats).


Students must meet with our academic advisor to discuss the program and how their previous courses will transfer to the new program. This discussion is important, as it will give you a better idea of what the program is about and if it will extend your stay at RIT. This meeting must take place prior to acceptance.


How will I be notified? 
A CSEC academic advisor will notify you by email regarding the admission decision. If accepted, the advisor will assist you with enrollment any additional scheduling assistance still needed for the upcoming semester.

Admissions Criteria: 

  • A MINIMUM Term and Cumulative GPA is a 3.0 is expected.
  • Our program includes several math and programming course requirements; skills in these areas are very important.
  • Admissions decisions are made case-by-case. Meeting the minimum requirements does not guarantee acceptance. Change of major applications may be denied based on the above criteria, academic standing or students’ demonstrated ability to succeed in the major, and overall seats and availability in the program.

Recommended Coursework:

Programming GCIS 123 & 124 or Equivalent
Calculus MATH 181 & 182, or MATH 181A & 182A, or MATH 171, 172, & 173
Discrete Math MATH 190
Intro Computing Security CSEC 140


Once you meet with an advisor, they may make other recommendations based on courses you have already completed. This is why it is important to schedule a meeting with one of our advisors.
If you have additional questions, please contact us at 585-475-2963.

Industrial Advisory Board

The Cybersecurity Department at RIT's Industry Advisory Board (IAB) comprises cybersecurity executives who provide invaluable advice and guidance to the academic department. These board members help ensure that the department's programs are aligned with the current demands of the cybersecurity landscape, enhancing both the educational and research aspects of the curriculum. 

Their contributions benefit students by:

  1. Curriculum Enhancement: Offering insights that help update and refine the curriculum to keep pace with industry trends and technologies.
  2. Career Preparation: Sharing real-world experiences and expectations, better preparing students for successful careers in cybersecurity.
  3. Networking Opportunities: Providing students with connections to industry leaders, which can lead to internships, mentorships, and job placements.
  4. Research Development: Supporting the department’s shift towards more research-oriented goals, thereby helping to position RIT as a leader in cybersecurity innovation.

Current Members: 

Todd Colvin

BeautyHealth/Hydrafacial

Emilyann Fogarty NYSERNet
Steve Frank Kaiser Permanente
Meridangela Gutierrez Jhong Accenture
Bob Kalka IBM
Daniel Krebs Monroe County
Shannon McHale Google Cloud
Kenneth Nero Army Cyber Institute
Mike Pinch

Security Risk Advisors

Nishi Prasad Protiviti
Richard Savacool Nixon Peabody
Jennifer Spencer  RHIO
Bob Steron Interactions, LLC
Jared Stroud JHU APL
Ashish Suri VMWare
Max Wandera Eaton
Annette Warren iSecure

 

MS Online Student Resources

Student Ambassadors

Student Club

RITSEC is a student club dedicated to teaching "Security Through Community". RITSEC is dedicated to educating and preparing RIT students to compete in security-related competitions, as well as showcasing RIT student talent in the current world of security today. Whether you're new to computing security or a veteran, RITSEC has a place for you. All of the activities we host to promote this learning can be found on our 'Events' page.

We believe security is for anyone who wants to learn and center our activities around multiple aspects of security. This includes live individual and team-based competitions, hands-on training, student run research, and sponsor talks. Our security exercises cover a wide variety of areas in computing security, including penetration testing, Windows and Linux server hardening, web security, network services, and more! Learn more at the RITSEC website.

Student Competition Resources

Information Security Talent Search (ISTS) competition

Global Collegiate Penetration Test Competition

The Northeast Collegiate Cyber Defense League

National Collegiate Cyber Defense Competition

Technical and Lab Resources

Azure Dev Tools for Teaching - Computing Security students and faculty can download certain Microsoft operating systems, development tools and applications
GCCIS Tutoring Center - Tutoring for introductory programming sequence.
VMware Academic Program (VMAP) - Computing Security students and faculty can open a ticket here to gain access to VMware's IT Academy 
Mirrors.rit.edu - is a mirror of many linux distros and other open-source projects