Cybersecurity Advanced Certificate
Cybersecurity
Advanced Certificate
- RIT /
- Golisano College of Computing and Information Sciences /
- Academics /
- Cybersecurity Adv. Cert.
A graduate certificate in cybersecurity that develops a strong foundation in computing security in order to create secure network environments.
Overview for Cybersecurity Adv. Cert.
Gain the fundamental knowledge and expertise in network security and forensics that is necessary for security in networked environments. In the advanced certificate in cybersecurity, you’ll learn to make computers and networks resistant to attack by monitoring intrusions and closing off vulnerabilities.
The application of forensics allows successful attacks on computer systems to be detected. This involves gathering information on the nature and extent of the attack for presentation in a court of law, as well as assessing the extent of the damage to an organization. Courses taken as part of this certificate can transfer into the MS program in computing security.
What is a Graduate Certificate?
A graduate certificate, also called an advanced certificate, is a selection of up to five graduate level courses in a particular area of study. It can serve as a stand-alone credential that provides expertise in a specific topic that enhances your professional knowledge base, or it can serve as the entry point to a master's degree. Some students complete an advanced certificate and apply those credit hours later toward a master's degree.
Curriculum for 2024-2025 for Cybersecurity Adv. Cert.
Current Students: See Curriculum Requirements
Cybersecurity, advanced certificate, typical course sequence
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
Choose four of the following courses: | 12 | |
CSEC-603 | Enterprise Security This course is designed to provide students with the advanced concepts needed to establish network security strategies to ensure adequate protection for the corporate environment and yet provide accessibility for the corporate community. (This course is restricted to students in the COMPSEC-MS program.) Lecture 3 (Spring). |
|
CSEC-730 | Advanced Computer Forensics This course provides students with the latest techniques and methods needed for extracting, preserving and analyzing volatile and nonvolatile information from digital devices. Students will gain exposure to the spectrum of available computer forensics tools along with developing their own tools for “special need” situations. The core forensics procedures necessary for ensuring the admissibility of evidence in court, as well as the legal and ethical implications of the process, will be covered on both Unix and Windows platforms, under multiple file systems. Therefore, students must possess a knowledge of available filesystems on both platforms. (Prerequisites: CSEC-600 or NSSA-221 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lecture 3 (Fall). |
|
CSEC-733 | Information Security Risk Management This course will provide students with an introduction to the principle of risk management and its three key elements: risk analysis, risk assessment and vulnerability assessment. Students will also learn the differences between quantitative and qualitative risk assessment, and details of how security metrics can be modeled/monitored/controlled and how various types of qualitative risk assessment can be applied to the overall assessment process. Several industry case studies will be studied and discussed. Students will work together in teams to conduct risk assessments based on selected case studies or hypothetical scenarios. Finally, they will write and present their risk assessment reports and findings. (Prerequisites: This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lecture 3 (Spring). |
|
CSEC-742 | Computer System Security The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lab 2, Lecture 3 (Fall). |
|
CSEC-743 | Computer Viruses and Malicious Software Computer malware is a computer program with malicious intent. In this course, students will study the history of computer malware, categorizations of malware such as computer viruses, worms, Trojan horses, spyware, etc. Other topics include, but are not limited to, basic structures and functions of malware, malware delivery mechanism, propagation models, anti-malware software, its methods and applications, reverse engineering techniques. Students will conduct research to understand the current state of the computer malware defense and offense. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lec/Lab 3 (Fall, Summer). |
|
CSEC-744 | Network Security Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect. The students will be provided with an understanding of the principles and concepts of wired and wireless data network security. Students will perform a series of laboratory or homework experiments in order to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. Students will engage in attack/defend scenarios to test their deployments against other teams. Students should be knowledgeable in networking technologies. (Prerequisites: CSEC-600 or equivalent course. This course is restricted to BS/MS students in Computing Security and students in the COMPSEC-MS program.) Lecture 3 (Spring). |
|
Total Semester Credit Hours | 12 |
Admissions and Financial Aid
This program is available on-campus only.
Offered | Admit Term(s) | Application Deadline | STEM Designated |
---|---|---|---|
Part‑time | Fall | Rolling | No |
Part-time study is 1‑8 semester credit hours. RIT will not issue a student visa for advanced certificates.
Application Details
To be considered for admission to the Cybersecurity Adv. Cert. program, candidates must fulfill the following requirements:
- Complete an online graduate application.
- Submit copies of official transcript(s) (in English) of all previously completed undergraduate and graduate course work, including any transfer credit earned.
- Hold a baccalaureate degree (or US equivalent) from an accredited university or college in computing security, computer science, software engineering, information technology, networking, computer engineering, electrical engineering, applied mathematics, or computer engineering technology (exceptional students from other fields may be admitted on a contingent basis). A minimum cumulative GPA of 3.0 (or equivalent) is recommended.
- Satisfy prerequisite requirements and/or complete bridge courses prior to starting program coursework.
- Submit a current resume or curriculum vitae.
- Submit a personal statement of educational objectives.
- Submit one letter of recommendation.
- Entrance exam requirements: GRE optional for Fall 2025 applicants. No minimum score requirement.
- Submit English language test scores (TOEFL, IELTS, PTE Academic), if required. Details are below.
English Language Test Scores
International applicants whose native language is not English must submit one of the following official English language test scores. Some international applicants may be considered for an English test requirement waiver.
TOEFL | IELTS | PTE Academic |
---|---|---|
88 | 6.5 | 61 |
International students below the minimum requirement may be considered for conditional admission. Each program requires balanced sub-scores when determining an applicant’s need for additional English language courses.
How to Apply Start or Manage Your Application
Cost and Financial Aid
An RIT graduate degree is an investment with lifelong returns. Graduate tuition varies by degree, the number of credits taken per semester, and delivery method. View the general cost of attendance or estimate the cost of your graduate degree.
A combination of sources can help fund your graduate degree. Learn how to fund your degree
Additional Information
Prerequisites
Applicants must satisfy prerequisite requirements in computing (computer networking theory and practice, and systems administration theory and practice).
Bridge Courses
Based on the evaluation of an applicant's academic and relevant experience, the graduate program director may require some applicants to complete a bridge course to fulfill any gaps in the required prerequisites needed for admission to the program. The bridge course, Introduction to Computing Security (CSEC-600), is not part of the 12 credit hours required for the advanced certificate.
Related News
-
September 18, 2024
Two faculty members installed as Kevin O’Sullivan Endowed Professors in Cybersecurity
Billy Brumley and Matthew Wright were appointed for their work in building RIT’s cybersecurity education and research legacy. As one of the highest honors in academia, endowed professorships recognize and support outstanding researchers and educators who profoundly impact the lives of their students.
-
April 5, 2024
New study investigates illegal child sexual abuse material and anonymity on Tor network
With the help of multidisciplinary researchers from around the globe, Billy Brumley is investigating the availability of child sexual abuse material (CSAM) in order to better understand and combat its widespread dissemination.
-
January 26, 2024
U.S. Securities and Exchange Commission confirms ‘SIM-swapping’ X account hack
WHTM-TV interviews Jonathan Weissman, principal lecturer in the Department of Cybersecurity, about SIM-swapping attacks.
Contact
- Paola Pena Rodriguez
- Senior Assistant Director
- Office of Graduate and Part-Time Enrollment Services
- Enrollment Management
- 585‑475‑5529
- paeges@rit.edu
- Sumita Mishra
- Professor
- Department of Cybersecurity
- Golisano College of Computing and Information Sciences
- 585‑475‑4475
- sumita.mishra@rit.edu
Department of Cybersecurity