Bachelor's Degree in Cybersecurity – The College of Saint Rose

On November 30, 2023, The College of Saint Rose Board of Trustees voted to cease academic instruction after the end of the 2023-2024 academic year. The College will continue to serve its undergraduate and graduate students, and offer a full Spring 2024 course schedule. Read More

Our program at Saint Rose is unique because the curriculum combines a strong foundation of computer science with criminal justice, organizational behavior and psychology, math and statistics, and research – so you understand not only computer systems, but also the criminals who want to compromise them.
Put these skills into action in intercollegiate competitions, like the Federal Reserve Bank of New York and the Federal Reserve Board of Governors’ College Fed Challenge, and through your classes connect with seasoned cybersecurity experts working in the field who act as teachers, mentors, and advisors.
Unlike some colleges and universities with technology majors, we don’t look to weed students out, we lift them up – helping them to be successful in the classroom and preparing them for success in their careers. And we make sure they get real-world experience by requiring an internship as part of the program.
If you want a challenging, exciting career using your intelligence, creativity, and tech know how to keep people and their data safe, Saint Rose offers the perfect preparation.
If you’re interested in a more generalized degree, consider the Saint Rose BS in computer science, which is also offered as an accelerated degree with our MS and MBA programs.
Explore our 2-in-4 programs
We take advantage of Saint Rose’s bench strengths in criminal justice, psychology, and business to give you a comprehensive understanding of the organizational and behavioral elements behind cybercrime, in addition to a rigorous foundation in computer science.
Our faculty are great scholars, but your success is their top priority. Unlike large research institutions, Saint Rose is a place where professors invest in their students and put their energy into teaching, making for compelling classes and great learning outcomes.

I have extensive experience in high-performance computing, parallel architectures and parallelization techniques. My expertise includes compiler technology, cybersecurity, and cloud computing, and my research interests include high-performance computing, cybersecurity, and novel approaches to teaching computer science. I have more than 20 years of industry experience, including with GE, and have filed over 10 U.S. patents, and authored over 25 peer-reviewed papers and technical reports

My teaching interests include artificial intelligence, cybersecurity, data communications and networking, bioinformatics, and discrete mathematics. My Insider Threat course inspired the College’s cybersecurity major. And in my spare time, I’m a musician, playing and creating music is something I love. Rock on.

I have published research on the hands-on teaching of computer science, interdisciplinary approaches to teaching computer science in K-12, using iPhone applications to teach computer science, and optimizing fuel-cell operation. My other teaching interests include python, C programming, Java, computer organization, and assembly programming.

I have extensive experience in high-performance computing, parallel architectures and parallelization techniques. My expertise includes compiler technology, cybersecurity, and cloud computing, and my research interests include high-performance computing, cybersecurity, and novel approaches to teaching computer science. I have more than 20 years of industry experience, including with GE, and have filed over 10 U.S. patents, and authored over 25 peer-reviewed papers and technical reports

My teaching interests include artificial intelligence, cybersecurity, data communications and networking, bioinformatics, and discrete mathematics. My Insider Threat course inspired the College’s cybersecurity major. And in my spare time, I’m a musician, playing and creating music is something I love. Rock on.

I have published research on the hands-on teaching of computer science, interdisciplinary approaches to teaching computer science in K-12, using iPhone applications to teach computer science, and optimizing fuel-cell operation. My other teaching interests include python, C programming, Java, computer organization, and assembly programming.

I’ve taught students in courses ranging from Intro to Computer Science to Data Structures and Algorithm Analysis. I love mentoring students and bring a unique prospective, having spent part of my career in the restaurant industry.

I love working with students to help them learn real-world programming techniques and I’m known for cracking a joke or two along the way. I teach Intro to Computer Science for undergrads, as well as graduate courses.

I’ve taught students in courses ranging from Intro to Computer Science to Data Structures and Algorithm Analysis. I love mentoring students and bring a unique prospective, having spent part of my career in the restaurant industry.

I love working with students to help them learn real-world programming techniques and I’m known for cracking a joke or two along the way. I teach Intro to Computer Science for undergrads, as well as graduate courses.
Jobs for cybersecurity graduates are in high demand and are expected to continue to increase at a fast rate.
With average annual salaries in the field of $116,000, or $55.77 per hour, careers in cybersecurity can be some of the most lucrative.
Graduates can find careers in fields like software and information security, computer forensics, cryptanalyst, and other types of analysts and engineers.
Not all careers in cybersecurity require coding but the higher you advance, the more you’ll need to understand the programming languages to analyze lines of code. Knowledge in SQL for data management, PHP, Javascript, Python, and C and C++ may be required.

Getting a Bachelor’s Degree in Cybersecurity
Of course, if you have any questions, please reach out. We’re here to help.
Dean of The School of Math & Sciences, Professor of Computer Information Systems
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site, we will assume you have agreed to our policy.

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *