Bachelor of Science in Cybersecurity
Cybersecurity
Bachelor of Science Degree
- RIT/
- RIT Dubai/
- Academics and Learning/
- Undergraduate Degrees/
- Bachelor of Science in Cybersecurity
Accredited by the UAE Ministry of Education
In RIT’s Cybersecurity degree you’ll learn to preserve assets, identify security vulnerabilities, prove threats occurred, and design strategies for data recovery.
Overview
As technology advances at a rapid rate, protecting individuals, companies, government entities and global organizations from cyber threats is becoming a huge sector, with career opportunities spanning the globe. Our Bachelor of Science in Cybersecurity has been designed to prepare you to excel in this rapidly growing area. If you love computer science, crave a program that offers a hands-on curriculum and a range of active learning experiences and gives plenty of opportunities for independent exploration at an advanced level, the Bachelor of Science in Cybersecurity will be a perfect.
Considered a leading program in computing and network security and forensics by industry experts including the U.S. Department of Homeland Security, the Department of Defense and the National Security Agency, the degree offers you a high level of specialization beyond what is provided by more general majors in Information Systems or Information Technology. You’ll begin by getting to grips with a wide breadth of computing disciplines including programming, scripting, databases, computing security, cryptography, security policy, networks, systems and network administration. You’ll then have the chance to focus on a particular area of security such as forensics, mobile device forensics or network/computing system security. By the time you graduate you will be an expert in the identification of computer security vulnerabilities, the detection of computer security exploits, and the prevention or mitigation of the resulting attack, making you highly employable. Your job responsibilities may include security assessment, cybersecurity, network security, computer and network forensics, cryptography, penetration testing, information security risk management, and cyber policy & law.
Typical Job Titles
Assistant Reverse Engineer | Application Security Engineer |
Cyber Security Analyst | Cyber Threat Responder |
Security Software Specialist | Penetration Tester |
Security Assurance Engineer | Security Consultant |
Site Reliability Engineer | Threat Analyst |
Technical Assessments Consultant | Vehicle Cybersecurity Engineer |
Industries
Health Care
Government
Medical Devices
Electronic and Computer Hardware
Utilities and Renewable Energy
Internet and Software
Telecommunications
Mission Statement
The mission of the Cybersecurity program is to advance the state of the art in cybersecurity knowledge and provide world-class education in the knowledge, skills, and mindset needed to have a great career as a cybersecurity professional.
Program Educational Objectives
The Cybersecurity Program Educational Objectives (PEO) are broad statements that describe what graduates are expected to attain within a few years of graduation. Program educational objectives are based on the needs of the program’s constituencies. The Cybersecurity faculty, in conjunction with its constituents, has established the following program educational objectives:
- PEO 1: Graduates will be employable in cyber security and cyber forensics professional positions in both the private and public sectors.
- PEO 2: Graduates will have appropriate foundational skills to become lifelong learners within their field.
- PEO 3: Graduates will be prepared to work as team members and to adopt leadership positions as necessary.
- PEO 4: Graduates will be prepared for
Program Learning Outcomes
- Analyze complex cybersecurity issues, employing theories and principles of cybersecurity to solve problems using current and emerging technologies.
- Develop and implement software solutions for cybersecurity challenges and demonstrate fluency in the development process.
- Design solutions for cybersecurity issues by employing principles of cybersecurity and incorporating interdisciplinary perspectives such as business, psychology, and policy and law.
- Apply critical thinking skills and advanced knowledge to manage risk or compliance by evaluating evidence.
- Assess the ethical considerations that arise in the cybersecurity field.
- Work effectively in teams to accomplish a goal.
- Write clear technical documents and make effective oral presentations demonstrating adaptability and continual learning ability.
Curriculum
Students are required to complete 126 semester credit hours of core courses and advanced courses as well as cooperative education. Core courses include a programming sequence, an ethics course, a computer networking and system administration sequence, and foundation courses in computer and network security. Advanced courses allow students to design the focus of their information security coursework.
Typical Course Sequence
Total Credit Hours - 126
Course | Sem. Cr. Hrs. | |
---|---|---|
First Year | ||
CSEC-140 |
Introduction to Cybersecurity
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
|
3 |
GCIS-123 |
Software Development and Problem Solving I
A first course introducing students to the fundamentals of computational problem solving. Students will learn a systematic approach to problem solving, including how to frame a problem in computational terms, how to decompose larger problems into smaller components, how to implement innovative software solutions using a contemporary programming language, how to critically debug their solutions, and how to assess the adequacy of the software solution. Additional topics include an introduction to object-oriented programming and data structures such as arrays and stacks. Students will complete both in-class and out-of-class assignments.
|
4 |
GCIS-124 |
Software Development and Problem Solving II
A second course that delves further into computational problem solving, now with a focus on an object-oriented perspective. There is a continued emphasis on basic software design, testing & verification, and incremental development. Key topics include theoretical abstractions such as classes, objects, encapsulation, inheritance, interfaces, polymorphism, software design comprising multiple classes with UML, data structures (e.g. lists, trees, sets, maps, and graphs), exception/error handling, I/O including files and networking, concurrency, and graphical user interfaces. Additional topics include basic software design principles (coupling, cohesion, information expert, open-closed principle, etc.), test driven development, design patterns, data integrity, and data security.
|
4 |
UWRT-150 |
FYW: Writing Seminar
Writing Seminar is a three-credit course limited to 19 students per section. The course is designed to develop first-year students’ proficiency in analytical and rhetorical reading and writing, and critical thinking. Students will read, understand, and interpret a variety of non-fiction texts representing different cultural perspectives and/or academic disciplines. These texts are designed to challenge students intellectually and to stimulate their writing for a variety of contexts and purposes. Through inquiry-based assignment sequences, students will develop academic research and literacy practices that will be further strengthened throughout their academic careers. Particular attention will be given to the writing process, including an emphasis on teacher-student conferencing, critical self-assessment, class discussion, peer review, formal and informal writing, research, and revision. Small class size promotes frequent student-instructor and student-student interaction. The course also emphasizes the principles of intellectual property and academic integrity for both current academic and future professional writing.
|
3 |
MATH-181 |
Calculus I
This is the first in a two-course sequence intended for students majoring in mathematics, science, or engineering. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers functions, limits, continuity, the derivative, rules of differentiation, applications of the derivative, Riemann sums, definite integrals, and indefinite integrals.
|
4 |
MATH-182 |
Calculus II
This is the second in a two-course sequence. It emphasizes the understanding of concepts, and using them to solve physical problems. The course covers techniques of integration including integration by parts, partial fractions, improper integrals, applications of integration, representing functions by infinite series, convergence and divergence of series, parametric curves, and polar coordinates.
|
4 |
MATH-190 |
Discrete Mathematics for Computing
This course introduces students to ideas and techniques from discrete mathematics that are widely used in Computer Science. Students will learn about the fundamentals of propositional and predicate calculus, set theory, relations, recursive structures and counting. This course will help increase students’ mathematical sophistication and their ability to handle abstract problems.
|
3 |
NSSA-241 |
Introduction to Routing and Switching
This course provides an introduction to wired network infrastructures, topologies, technologies, and the protocols required for effective end-to-end communication. Basic security concepts for TCP/IP based technologies are introduced. Networking layers 1, 2, and 3 are examined in-depth using the International Standards Organization’s Open Systems Interconnection and TCP/IP models as reference. Course topics focus on the TCP/IP protocol suite, the Ethernet LAN protocol, switching technology, and routed and routing protocols common in TCP/IP networks. The lab assignments mirror the lecture content , providing an experiential learning component for each topic covered.
|
3 |
YOPS-10 |
RIT 365: RIT Connections
RIT 365 students participate in experiential learning opportunities designed to launch them into their career at RIT, support them in making multiple and varied connections across the university, and immerse them in processes of competency development. Students will plan for and reflect on their first-year experiences, receive feedback, and develop a personal plan for future action in order to develop foundational self-awareness and recognize broad-based professional competencies.
|
0 |
General Education–Artistic Perspective A : Islamic Culture Course | 3 | |
Second Year | ||
CSEC-201 |
Programming for Information Security
This course builds upon basic programming skills to give students the programming knowledge necessary to study computing security. Students will be introduced to network programming, memory management, and operating system calls along with associated security concepts. Specific focus will placed on understanding the compilation process and on the relation between high-level programming concepts and low-level programming concepts, culminating in identifying and exploiting memory corruption vulnerabilities.
|
3 |
MATH-251 |
Probability and Statistics
This course introduces sample spaces and events, axioms of probability, counting techniques, conditional probability and independence, distributions of discrete and continuous random variables, joint distributions (discrete and continuous), the central limit theorem, descriptive statistics, interval estimation, and applications of probability and statistics to real-world problems. A statistical package such as Minitab or R is used for data analysis and statistical applications.
|
3 |
CSEC-202 |
Reverse Engineering Fundamentals
This course will teach students the core concepts needed to analyze unknown source code. Students will study a variety of low-level programming languages and how high-level programming language structures relate to low-level programming languages. Students will learn study tools and techniques used for both static and dynamic analysis of unknown binaries, providing the foundation for further study in malware analysis.
|
3 |
NSSA-221 |
Systems Administration I
This course is designed to give students an understanding of the role of the system administrator in large organizations. This will be accomplished through a discussion of many of the tasks and tools of system administration. Students will participate in both a lecture section and a separate lab section. The technologies discussed in this class include: operating systems, system security, and service deployment strategies.
|
3 |
NSSA-245 |
Network Services
This course will investigate the protocols used to support network based services and the tasks involved in configuring and administering those services in virtualized Linux and Windows internet working environments. Topics include an overview of the TCP/IP protocol suite, in-depth discussions of the transport layer protocols, TCP and UDP, administration of network based services including the Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS), Secure Shell (SSH), and Voice Over IP (VoIP). Students completing this course will have thorough theoretical knowledge of the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP), as well as experience in administering, monitoring, securing and troubleshooting an internet work of computer systems running these protocols and services.
|
3 |
CSEC-99 |
Cooperative Education Seminar
This course helps students prepare for co-operative education employment (“co-op”) by developing job search strategies and material. Students will explore current and emerging aspects of the Computing Security field with employers, alumni and current students who have already been on co-op. Students are introduced to RIT’s Office of Career Services and Cooperative Education and learn about professional and ethical responsibilities for their co-op and subsequent professional experiences. Students will work collaboratively to build résumés and to prepare for interviews.
|
0 |
MATH-241/ MATH-252 | Linear Algebra / Prob & Stats II | 3 |
Lab Science Sequence | 8 | |
PHYS-211 | University Physics I | |
PHYS-212 | University Physics II | |
CHMG-141 + CHMG-145 | General and Analytical Chemistry I + Lab | |
CHMG-142 + CHMG-146 | General and Analytical Chemistry II + Lab | |
BIOL-101 + BIOL-103 | General Biology I + Lab | |
BIOL-102 + BIOL-104 | General Biology II + Lab | |
General Education–Ethical Perspective | 3 | |
General Education–Social Perspective | 3 | |
Cooperative Education (summer) | ||
Third Year | ||
CSEC–310 |
Endpoint Security Engineering
This course explores Information Security Policy development and deployment as well as Laws (US and International) that impact Information Security. Students in this class with develop policies and analyze how policy impacts an organization. Students will also determine how Federal, State, and international laws impact the Information Security Policies of an organization.
|
3 |
CSCI-462 |
Introduction to Cryptography
This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication.
|
3 |
PUBL-363 |
Cybersecurity Policy and Law
Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The
central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws.
|
3 |
CSEC-380 |
Principles of Web Application Security
This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ.
|
3 |
CSEC-472 |
Authentication and Security Models
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
|
3 |
ISTE-230 |
Introduction to Database and Data Modeling
A presentation of the fundamental concepts and theories used in organizing and structuring data. Coverage includes the data modeling process, basic relational model, normalization theory, relational algebra, and mapping a data model into a database schema. Structured Query Language is used to illustrate the translation of a data model to physical data organization. Modeling and programming assignments will be required. Note: students should have one course in object-oriented programming.
|
3 |
Cybersecurity Elective 1 | 3 | |
Cybersecurity Elective 2 | 3 | |
General Education–Ethical Perspective | 3 | |
Open Elective 1 | 3 | |
Open Elective 2 | 3 | |
Cooperative Education (summer) | 0 | |
Fourth Year | ||
CSEC-490 |
Capstone in Cybersecurity
This is a capstone course for students in the computing security program. Students will review a series of short modules on topics such as teamwork, project management, report writing, and presentations, and will work in teams to apply their knowledge and skills to real-world projects in various areas of cybersecurity. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.
|
3 |
PHIL-102/202/306 | Ethics Elective | 3 |
Cybersecurity Elective 3 | 3 | |
Cybersecurity Elective 4 | 3 | |
Cybersecurity Elective 5 | 3 | |
General Education–Immersion 1 | 3 | |
General Education–Immersion 2 | 3 | |
General Education–Immersion 3 | 3 | |
Open Elective 3 | 3 | |
Open Elective 4 | 3 |
Advanced Electives
Students complete the advanced security electives that expand students’ knowledge in one of several disciplines of security, including system security, network security, forensics, malware, secure software development, database and application security, security evaluation, or theory.
A matriculated student in the B.S. in Cybersecurity is required to take 5 advanced elective courses. Three of the electives must come from one of the four clusters: Network and System Security, Forensics and Malware, Software Security, or Security Management and Evaluation.
The approved general list of advanced electives is as follows:
-
CSCI-455 Principles of Computer Security
-
CSCI-464 Xtreme Theory
-
CSCI-531 Introduction to Security Measurement
-
CSCI-532 Introduction to Intelligent Security Systems
-
CSCI-622 Data Security and Privacy 5
-
CSCI-642 Secure Coding
-
CSCI-762 Advanced Cryptography
-
CSEC-461 Computer System Security
-
CSEC-462 Network Security and Forensics
-
CSEC-464 Computer Systems Forensics
-
CSEC-465 Network & System Security Audit
-
CSEC-466 Introduction to Malware
-
CSEC-467 Mobile Device Security and Forensics
-
CSEC-468 Risk Management for Information Security
-
CSEC-471 Penetration Testing Frameworks & Methodologies
-
CSEC-473 Cyber Defense Techniques
-
CSEC-470 Covert Communications (WI)
-
CSEC-476 Malware Reverse Engineering
-
CSEC-477 Disaster Recovery Planning and Business Continuity
-
CSEC-520 Cyber Analytics and Machine Learning
-
CSEC-559 Hacking for Defense
-
CSEC-559 Offensive Security Engineering
-
CSEC-559 Trusted Computing System Security
-
CSEC-559 Usable Security and Privacy
-
CSEC-569 Wireless Security
-
CSEC-731 Web Server and Application Security Audits
-
SWEN-261 Introduction to Software Engineering
-
SWEN-331 Engineering Secure Software
To graduate, students need to complete all the requirements as listed in the curriculum graduation policy
Advisory Board
Mr. Eyad Shihabi |
Mr. Taha Khalifa |
Dr. Ayman El Nashar |
Mr. Ghanim Al Falasi |
Ms. Diyaa Zebian |
Mr. Bashar Kilani |
Ms. Ghada Elkeissi |
Dr. Mahmoud Sherif |
Dr. Raed Shubair |