Rochester Institute of Technology, Dubai (RIT Dubai)  Follow

Computing Security Undergraduate Program, RIT Dubai, UAE

Publish Date: May 04, 2016

Please visit Global Education Fair 2016 in Yerevan (14 May 2016, Best Western Congress Hotel, Picasso Hall) for more information about this program and scholarship opportunities

Program overview

The BS in Computing Security is designed to produce graduates who will be experts in the identification of computer security vulnerabilities, the detection of computer security exploits, and the prevention or mitigation of the resulting attacks. Students also understand the forensic requirements needed to prove an attack occurred, identify its origin, assess the extent of the damage or loss of information, and design strategies that ensure data can be recovered.

The unique degree was developed to respond to the increasing need for undergraduate advanced studies in the areas of computing and network security and forensics. An important goal is to provide students with a level of specialization in computing security beyond what is provided by more general majors offered in information systems or information technology. The program allows the student to focus on a particular area of security such as forensics, mobile device forensics, or network or computing system security.

The hands-on and experiential nature of our curriculum provides our students with the opportunity to be among the best in this discipline when they graduate. Our unique blend of active learning, lab based courses, and opportunities for independent exploration at the advanced levels make our program a leader in this discipline.

POSSIBLE CAREER OPTIONS

Positions in computing security are found in nearly every area of commerce. From small local businesses to large multi-national corporations, they all depend on a complex networking infrastructure to conduct their business and require security professionals to maintain these systems. The graduates of computing security from RIT Dubai are expertly prepared to provide the support demanded by enterprises of all sizes as well as national, state, and local security agencies. Possible career options are: system security analysts and designers, enterprise system security architects, or IT systems forensics consultants and investigators.

Student Learning Outcomes:

a.    Secure Programming: Program securely, accessing data and hardware to solve security and forensic problems
b.    Requirement Analysis: Identify requirements from users & communicate with users, peers and management to meet those requirements
c.    Secure Configuration: Configure and secure computers and network services and perform technical audits to assert control effectiveness
d.    Malware Analysis: Analyze malicious software and identify evidence of such software
e.    Network Security: Analyze, defend against, and respond to computer and network attacks
f.    Digital Forensic: Discover, collect, preserve, analyze and present digital forensic evidence
g.    Ethics: Assess the ethical ramifications of working in the security field
h.    Teamwork: Work effectively in team environments to accomplish a goal
i.    Professional Development:  Explain current and future expectations of a Security professional

CURRICULUM

Students are required to complete 126 semester credit hours of core courses and advanced courses as well as cooperative education. Core courses include a programming sequence, an ethics course, a computer networking and system administration sequence, and foundation courses in computer and network security. Advanced courses allow students to design the focus of their information security course work.

ADVANCED ELECTIVES

Students complete ve advanced security electives that expand students knowledge in one of several disciplines of security, including system security, network security, forensics, malware, secure software development, database and application security, security evaluation, or theory.
 
 

Additional information

Cooperative education
Cooperative education is a required component of the major. Co-op enables students to work in a variety of organizations, from small- or medium-sized businesses to large international companies or law enforcement organizations, that require computer systems or computer networks. These may be security-centric businesses (law enforcement agencies, security auditors) to users of information technology (manufacturing companies, school districts, health care).
 
Co-ops provide real-world experience and a competitive edge when applying for jobs after graduation. Typically, the first co-op occurs during the summer following the second year. The remaining co-ops may occur during the student's third year or the following summer. Students must complete the co-op requirement prior to completing their course work.
 
Please visit Global Education Fair 2016 in Yerevan (14 May 2016, Best Western Congress Hotel, Picasso Hall) for more information about this program and scholarship opportunities

Further Official Information

Link to Original

Similar Opportunities


Disciplines

Programming

Study Levels

Undergraduate

Eligible Countries

International

Host Countries

United Arab Emirates