The major in Computer Science and Information Security offers the computing, quantitative and analytical expertise public and private organizations need to advance the practice of digital forensics and cybersecurity. The program provides the foundational background in computing that is needed to thwart the abuse and misuse of computers, data networks, information systems and information infrastructures, in the environment of ever advancing digital technology. The courses in the Computer Science and Information Security major prepare students for direct entry into the profession as well as entry into graduate and professional programs that rely on computing and quantitative methods, especially in areas related to digital forensics and cybersecurity.
Major Requirements
CSCI Courses That Meet General Education Requirements
Year-Round Major Advising
Advisor |
Email Address |
Mr. Christopher Church | cchurch@jjay.cuny.edu |
Professor Ahmad |
|
Professor Ramansenthil |
|
Professor Jain |
|
Professor Johnson |
|
Professor Obaidat |
|
Professor Khodjaeva |
|
Professor Holst |
Registration and Major Holds
Sophomores with 45-59 credits may have a hold on their registration. The hold will be removed when they have an appointment with a major advisor. This discussion will encourage wise planning and allow students to ask any questions they may have about the major. How do you know if you have a major hold? Go to CUNYfirst and complete the following steps:
-
Check the Holds box of your CUNYfirst Student Center. If "Advisement Required" appears, click on “details.”
-
Click on “Advisement Required.”
-
See which type of advisement you need. If you must see a major advisor, then make a major advising appointment following the steps preferred by this department.
.
Avoid Course Planning Mistakes!
-
Transfer students who have general CSCI credit (but not transfer courses specifically equivalent to CSCI major courses) should consult with a CSCI major advisor as soon as possible after their credits are evaluated to see if those credits may be used towards the major.
-
Be sure to make use of course planning resources. The Sample Four Year Plan provides a guideline for one way to complete all degree requirements with this major. Additionally, given the highly sequenced nature of the CSCI major, students should consult this Course Flow Chart when planning future semesters.
-
Remember that you will need at least a 2.0 GPA in the major and at least a 2.0 overall GPA to graduate.
Monitor Your Progress in the Major (Major Checklist, Sample 4 yr Plan)
-
DegreeWorks degree audit - Use this online planning tool to track your overall progress toward graduation. You will see which of your general education and major requirements are completed, in progress, or still needed. Refer to the DegreeWorks FAQs to better understand how to use this helpful tool. Note: be sure to confirm the accuracy of your degree audit with a general advisor and major advisor.
-
Computer Science and Information Security Major Checklist - Fill out this printable worksheet to keep track of which major requirements you have completed and which ones you still need.
-
Sample Four Year Plan - See an example of how you could complete all your degree requirements (major, general education, electives) and graduate in four years! Remember that this sample plan shows just one possible way to combine your requirements. Transfer students in particular should work with advisors to determine a plan that works best for them. All CSCI majors should consult this Course Flow Chart while planning future semesters so they are aware of course sequences.
Meet with a General Academic Advisor
A General Academic Advisor will confirm what general academic requirements you still need, make suggestions about smart course planning that will help you graduate without delays, discuss your interest in adding a minor or second major, inform you about opportunities such as study abroad, discuss general questions and concerns, and make helpful referrals. Visit the Academic Advisement Center's webpage for more information.
Graduate School Preparation
Career Preparation
-
security analyst
-
malware analyst
-
vulnerability handler
-
software engineer / programmer
-
security engineer
-
system administrator
-
security architect
-
computer forensic analyst
-
reverse engineer