You might be using an unsupported or outdated browser. To get the best possible experience please use the latest version of Chrome, Firefox, Safari, or Microsoft Edge to view this website.

Earning A Ph.D. In Cybersecurity: Everything You Need To Know

Mariah St. John

Updated: Jan 1, 2024, 3:30pm

Earning A Ph.D. In Cybersecurity: Everything You Need To Know

A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management.

Cybersecurity Ph.D. programs allow students and professionals to build on their knowledge and skills. Candidates gain experience working with emerging technologies across artificial intelligence, data science and cloud computing to optimize organizational performance. This article overviews cybersecurity doctoral degree options, including standard admission requirements, common coursework and potential career paths.

Why You Can Trust Forbes Advisor Education

Forbes Advisor’s education editors are committed to producing unbiased rankings and informative articles covering online colleges, tech bootcamps and career paths. Our ranking methodologies use data from the National Center for Education Statistics , education providers, and reputable educational and professional organizations. An advisory board of educators and other subject matter experts reviews and verifies our content to bring you trustworthy, up-to-date information. Advertisers do not influence our rankings or editorial content.

  • Over 3,868 accredited, nonprofit colleges and universities analyzed nationwide
  • 52 reputable tech bootcamp providers evaluated for our rankings
  • All content is fact-checked and updated on an annual basis
  • Rankings undergo five rounds of fact-checking
  • Only 7.12% of all colleges, universities and bootcamp providers we consider are awarded

What to Expect From a Ph.D. in Cybersecurity

A Ph.D. in cybersecurity provides students with a comprehensive education encompassing technology, data science, leadership, management, ethics and policy. Requirements, course loads and curriculums for these programs vary by school. In most cases, students need to complete between 50 and 70 credits, which typically takes three to seven years.

Several components make up the Ph.D. curriculum, including professional research and theory, an extensive literature review and dissertation preparation. In addition to coursework, Ph.D. students must fulfill teaching and research responsibilities.

Core concepts and topics can include:

  • Machine learning
  • Information theory
  • Applied cryptology
  • Theory of computation
  • Artificial intelligence
  • Network security

Degree Finder

Doctor of philosophy vs. doctor of science vs. doctor of information technology.

When deciding which cybersecurity doctoral program to pursue, you can choose from the following degree options:

  • Ph.D. in cybersecurity
  • Doctor of Science (D.Sc.) in cybersecurity
  • Doctor of Information Technology (DIT)

Ph.D. in Cybersecurity

In general, a Ph.D. in cybersecurity is a research-based degree program that prepares graduates for advanced roles in academia. This degree focuses on research and theory, catering to students and professionals looking to expand their teaching opportunities and become professors or researchers.

D.Sc. in Cybersecurity

A D.Sc. focuses on practical applications of theory in management and leadership roles. Students may research cybersecurity’s emerging theoretical and technical components. This degree suits students who are interested in policy development.

A D.I.T. program serves professionals who are looking to advance their knowledge and expertise in technology and computing. Learners may develop the skills needed to lead an organization. Students can choose a specialization, such as cybersecurity, computer science or data science.

What Kinds of Exams are Required During a Ph.D. Program?

In addition to coursework and a dissertation, students working toward their cybersecurity doctorate must complete exams. In most Ph.D. programs, learners must take three exams.

  • A qualifying exam, which occurs during the early stages of the program
  • A preliminary exam to demonstrate a candidate’s readiness to begin their dissertation and research
  • The final exam, through which a candidate defends their dissertation and research work

Common Courses in a Cybersecurity Ph.D.

Coursework for cybersecurity Ph.D. programs varies among schools. Each program sets a unique curriculum. Below you’ll find just a few examples and variations of common course titles for cybersecurity doctoral programs.

Advanced Security Risk Management and Assessment

Courses on advanced security risk management and assessment provide an overview of methodologies for strategic decision-making. Students analyze various management techniques to develop cyber defense procedures to reduce and address breaches.

Research and Practice in Information Technology

In courses on research and practice in information technology, students analyze research across the spectrum of IT disciplines. Learners review concepts, methodologies and techniques used in computer science, information systems, information management and software engineering research.

This course introduces students to key research paradigms, including the principles of research ethics, design and methods of data collection and analysis as relevant to IT research.

Law, Policy, Ethics and Compliance

Courses on law, policy, ethics and compliance provide an overview of legal, ethical and policy-related cybersecurity issues. Students analyze domestic and international security law, compliance issues and legal principles. Learners critically evaluate policy documents across business sectors to understand how to comply with varying laws and regulations while addressing cybersecurity challenges.

Dissertation

Each doctoral candidate must write a dissertation, or a formal research paper, that presents findings from original research carried out during the duration of the program under the guidance of faculty advisors. Students create the documentation for their dissertation topic, obtain approval from advisors and submit any required information to their institution’s research board.

How to Get Admitted to a Cybersecurity Doctoral Program

The admission requirements for a cybersecurity doctoral program can differ depending on the school. Typically, applicants must have at least an undergraduate degree, such as a bachelor’s degree in cybersecurity . However, some programs require a master’s in cybersecurity or a related subject.

Ph.D. students coming from undergraduate programs may earn their master’s degrees as they complete their doctoral requirements. Those coming from master’s programs may have to complete fewer credits to earn their doctorate.

In addition to submitting a completed application and paying any application fees, standard admission requirements typically include the following.

  • Submit undergraduate transcripts.
  • Meet a minimum GPA requirement.
  • Submit GRE scores.
  • Submit letters of recommendation.
  • Write an admissions essay or personal statement.
  • Submit a résumé or CV with relevant professional experience and educational accomplishments.

What Can You Do With a Ph.D. in Cybersecurity?

Is this cybersecurity degree worth it? A Ph.D. in cybersecurity can help you qualify for various management positions, teaching jobs, research roles and other career opportunities in the information security field.

Below we list some potential careers for cybersecurity doctoral graduates. Cybersecurity job requirements vary widely depending on the specific title and organization. While the main responsibilities for each role are generally consistent across the field, details may vary among industries and workplaces.

We sourced the below salary data from Payscale .

Chief Information Security Officer

Average Annual Salary : Over $174,000 per year Qualifications : At least a master’s degree in cybersecurity, computer science, IT or a closely related field Job Description : A chief information security officer (CISO) is a C-suite management role. These professionals oversee information and data security for an organization, along with IT. CISOs offer strategic oversight on the design, development, implementation and maintenance of security solutions. They ensure organizations are adhering to necessary regulations, protocols and legal obligations.

Director of Operations

Average Annual Salary : Over $100,000 per year Qualifications : A master’s degree is the minimum educational requirement. Certifications and extensive experience can give you an advantage. Job Description : A director of operations oversees an organization’s cybersecurity operations and incident responses. They are responsible for building and cultivating integrated teams to address cyberattacks and threats. These professionals are accountable for timely and strategic responses to risks and security threats.

Education Program Director

Average Annual Salary : Over $68,000 per year Qualifications : At least a master’s degree and relevant work experience Job Description : Education program directors design and implement educational programs for the public or members of an organization. These professionals oversee all aspects of organizational initiatives, budgets and hiring staff. Education program directors develop various educational materials, including the curriculum for classes and content for conferences and lectures.

Featured Online Schools

Learn about start dates, transferring credits, availability of financial credit and much more by clicking 'Visit Site'

Frequently Asked Questions About Cybersecurity Ph.D.s

Is it worth getting a ph.d. in cybersecurity.

Earning a Ph.D. in cybersecurity can expand your career opportunities, increase your earning potential and help you qualify for high-level management positions. The U.S. Bureau of Labor Statistics (BLS) projects employment opportunities for information security specialists, including cybersecurity professionals, to grow by 32% from 2022 to 2032.

What can I do with a Ph.D. in cybersecurity?

A Ph.D. in cybersecurity is the highest academic credential available in the field. Depending on your degree option, you can qualify for positions in the education sector to teach, apply for leadership positions and pursue other high-level positions in the field.

  • Best Online Bachelor’s Degrees In Cybersecurity
  • Best Master’s In Computer Science Online
  • Best Online Data Science Master’s Degrees
  • Best Online Master’s In Computer Engineering
  • Best Online Master’s In Information Technology Programs
  • Best Software Engineering Master’s Online
  • Best Master’s In Cybersecurity Online Degrees
  • Best Online Computer Programming Degrees
  • Best Online Information Technology Degree
  • Best Online Software Engineering Degrees
  • Best Online Computer Science Degrees
  • How To Become A Cybersecurity Analyst
  • How To Become a Web Developer
  • How To Become A Sales Engineer
  • How To Become a Software Engineer
  • Careers In Cybersecurity
  • 10 Careers In Game Design To Consider
  • How To Become A Cybersecurity Engineer
  • How To Become A Game Developer
  • Earning An Associate In Computer Science
  • Earning A Bachelor’s Degree In Cybersecurity
  • How To Become A Cybersecurity Specialist
  • Cybersecurity Salary Guide
  • The 7 Best Programming Languages To Learn For Beginners
  • How Long Does It Take To Learn Coding? And Other Coding Questions
  • How To Learn Python For Free
  • Artificial Intelligence In Education
  • Cybersecurity Degree Guide
  • Software Developer Vs. Software Engineer
  • What Is CISSP Certification? Qualifications, Benefits And Salary
  • Ask A Tech Recruiter

How To Become A Machine Learning Engineer

How To Become A Machine Learning Engineer

Sheryl Grey

How To Become A Data Scientist

Garrett Andrews

How To Become A Computer Systems Analyst: A Step-By-Step Guide

Nneoma Uche

How To Become A Cloud Engineer

Matt Whittle

How To Become A Computer Engineer: A Step-By-Step Guide

Liz Simmons

How To Become A Data Analyst: A Step-By-Step Guide

Mariah is a Berlin-based writer with six years of experience in writing, localizing and SEO-optimizing short- and long-form content across multiple niches, including higher education, digital marketing and travel. Her writing expertise extends to brand strategies and driving small business growth through targeted content. In the last three years, she's primarily produced education-focused content, writing on topics like degree programs, trade schools and career pathways.

Ph.D. in Cybersecurity in the United States: A Comprehensive Guide For 2024

Phd in cybersecurity in usa

The number of potential programs open to students interested in seeking a Ph.D. in cybersecurity is one predictor of the industry’s growth and development.

Moving outside the realm of computer science, cybersecurity experts are now receiving education in fields such as law, politics, management, and planning, among many others.

It would also go through some things to think about while looking for the best Ph.D. curriculum, such as course standards and tuition costs.

Until recently, cybersecurity Ph.D. programs , like other cutting-edge technology areas, were often testing grounds for specialty positions in advanced studies, mostly for government departments (such as the CIA, NSA, and FBI), or closely adjacent research organizations or entities.

Table of Contents

Can You Have a Ph.D. in Cybersecurity?

A Ph.D. in Cybersecurity gives applicants a solid base in computer science when concentrating on advanced research in information technology security.

Data collection, program exploitation, reverse engineering, and malicious code analysis are among the techniques studied in this course.

Students learn how to spot cybercrime and safeguard sensitive data stored on devices and servers.

Students develop their problem-solving and decision-making capabilities when they focus on different cybercrimes.

They become familiar with ideas and proficient in the skills used to tackle technical and intelligence applications.

Is a Ph.D. Much Harder Than a Masters?

It is rare to see a doctoral degree with the official designation of Ph.D. in Cybersecurity. Although many initiatives focused on cybersecurity, it is uncommon to see a program with a cybersecurity major.

The cybersecurity Ph.D. program is a research-based doctoral program that requires candidates to specialize in areas such as cyberinfrastructure, human-centered computing, and embedded devices, to mention a couple.

The Ph.D. program lasts between five and seven years. Two years are spent taking graduate courses and qualifying exams.

In comparison, the remaining three to five years are spent doing independent studies for a mandatory dissertation, which is a scientific, systematic account of the student’s work.

Cybersecurity is an interesting field for computer-savvy people who like a challenge. It is also an interesting area because there are so many career options and opportunities for advancement.

Is a Ph.D. in Cyber Security Worth It?

Many students interested in the fascinating world of cybersecurity wonder if a Ph.D. would benefit them if they chose this profession as a profession.

Although doctoral degrees are not necessarily needed to work in cybersecurity, getting a Ph.D. would only boost a resume and place the applicant in a position to compete for jobs that are not open to those with lesser degrees.

Although a Ph.D. is not needed for most cybersecurity positions , it can be advantageous. The more schooling a student gets, the more job chances he or she would have after graduation.

The Ph.D. in Cybersecurity curriculum, on the other hand, is typically designed for students who choose to work in research-based positions such as college professors, business analysts, or policy advisors.

The doctoral degree program can be a complex and costly undertaking.

Students learn useful business skills such as giving speeches, writing reports, working “in the box,” and how to overcome difficult problems.

What Can You Do With a Ph.D. in Cybersecurity?

Suppose you are thinking of getting a doctorate in data security. In that case, you probably do not need to be reminded of the importance of information security and the problems that computer security and information assurance practitioners face.

Was a theoretical prospect, the Internet of Things has come for the long run, which means that by 2025, there will be 27+ billion linked “things.”

To put it another way, the future needs highly trained, expert data security experts. Obtaining a doctorate is one way to fulfill the challenge.

How long does it take to get a Ph.D. in cybersecurity?

A full-time cybersecurity study program in the United States runs for 3 or 4 years. The first year is normally probationary, and it is used to write a thesis proposal outlining your research degree.

It could take the form of online Ph.D. cybersecurity training courses, online doctorate seminars, or placement programs to provide you with an understanding of the computer security market and real-world implementations in your chosen area.

What is the quickest Ph.D. Cybersecurity Degree to get?

Doctor in Philosophy (Ph.D.) programs are offered in several subject areas. The best projects are usually supported by excellent grants, cutting-edge research laboratories, and an abundance of intellectual services.

The easiest is not necessarily the shortest, and the quickest is not always the easiest.

The Most Convenient Ph.D. Programs, Both Online and On-Campus

With this in mind, our ranking of the easiest Ph.D. programs covers schools and programs with substantially shortened residency requirements, accelerated classes, credit exchanges, and integrated dissertation colloquia.

Cost /Tuition fee for procuring a Ph.D. in Cybersecurity

Obtaining a Ph.D. requires a significant commitment of both time and resources. Cybersecurity Ph.D. students are balancing the expense of being specialists in the field against the possible return of getting fascinating and possibly lucrative job prospects.

The positive thing is that by the time students reach the Ph.D. level, they have a wide range of financing opportunities, including certain doctoral programs entirely sponsored by the university or academic department.

Additionally, financing is available in research grants and other types of scholarships for students involved in conducting cybersecurity studies.

Fully Funded Ph.D. in Cyber Security in the US

So let me tell you one most important things about a Ph.D. in the United States of America.

Funding is always guaranteed there, now always, but most of the time. So don’t worry about funding. However, students are always encouraged to seek external funding, like through private institutes.

Many universities offer students a basic income because, in the United States of America, students don’t have enough time to do a part-time job while studying.

If you expect that your Ph.D. program will take longer than the standard four to five years, you should consider external funding options to cover the remaining years until you complete your program.

Following are the ways to get funding for your Ph.D. program in the United States of America:

Full funding for your Ph.D. in cybersecurity can cover fees, living costs and other expenses during your student life.

You can also search for some of the Ph.D. funding available using the official tool provided by Education USA.

It’s common for US universities to offer assistantships to graduate students. This is a direct form of funding.

This offers the following benefit:

If you are an American national, you can access a federal loan from the government to finance your Ph.D. studies.

Eligibility Criteria

Benefits provided.

The program is a fully-funded Ph.D. scholarship with a stipend of $3,225 per year to cover living expenses. This studentship is only available to US citizens.

Why are Institutions Offering Fully Funded Scholarships?

Cyber-attacks, including consumer identity leakage and malware attacks, are becoming an increasingly prevalent threat to organizations.

It is evidenced by the fact that all the world’s biggest and most technologically advanced organizations, such as Google and Facebook, have experienced significant cybersecurity breaches.

While psychological and behavioral sciences research is highly applicable to these topics, there is an interdisciplinary disparity between this evidence base and its relevance to cybersecurity challenges .

Cybersecurity Ph.D. Scholarships For 2024

Cybersecurity scholarships are essentially “free money” for universities. You should not have to return the funds, as you will, for a loan.

How To Apply For a Scholarship in Cybersecurity Ph.D. Programs

You must be eligible to apply for a data security scholarship. This requirement is normally fulfilled by enrolling in cybersecurity degree programs .

And, if you qualify, you fill out an application. Being a US citizen or permanent resident is a common requirement. You will also be required to demonstrate your status as a current student enrolled in an accredited institution.

Often people make choices based on their financial situation, which means you’ll need to have your family income tax records or fill out a FAFSA. Aside from that, many providers wish to learn about you and your objectives.

Programs to raise public awareness of the issue and draw talented young minds to the discipline are becoming more common and are beginning to impact.

At the moment, though, there is a growing demand for doctorate degrees in cybersecurity. High-level executive positions, higher-education faculty jobs, and advanced research programs are all in greater need than there are applicants to fill them.

Online Ph.D. in Cyber Security

BREYER STATE UNIVERSITY Online Doctoral Programs for One Year – ethereal accelerated doctorate in grief therapy. This online program is by far the most accessible on our list, with tuition starting at merely $3,550.

When new 1-year virtual doctoral programs become available, they will be added to this list. This list was most recently revised on April 1, 2019.

On the other hand, the DPS degrees are almost enticingly dedicated to the highest stages of instruction in hands-on practical experience and skills rather than philosophy and science.

Doctoral programs of all three types are now open to those seeking to progress their careers to the top of the cybersecurity sector.

There is a critical need for information security experts in the world. Still, there is also an essential need to increase the ability of our educational institutions to train new practitioners.

List of Ph.D. in Cyber Security Colleges in the United States

Specific information on what and school needs (such as a GRE score or previous academic work), as well as the number of credits needed, projected expenses, and a guide to the curriculum, should be available.

ArizonaTempeArizona State University
ArizonaTucsonUniversity of Arizona
CaliforniaMontereyNaval Postgraduate School
CaliforniaDavisUniversity of California-Davis
ColoradoGoldenColorado School of Mines
ColoradoColorado SpringsUniversity of Colorado Colorado Springs
IdahoMoscowUniversity of Idaho
IllinoisChampaignThe University of Illinois at Urbana-Champaign
IndianaBloomingtonIndiana University Bloomington
IndianaBloomingtonIndiana University Bloomington
IndianaWest LafayettePurdue University
IndianaWest LafayettePurdue University
IowaAmesIowa State University
IowaAmesIowa State University
IowaAmesIowa State University
MassachusettsBostonNortheastern University
MassachusettsWorcesterWorcester Polytechnic Institute
MississippiMississippiMississippi State University
MissouriColumbiaUniversity of Missouri-ColumbiaPh.D. in Computer Science with a focus in Information Assurance
New JerseyHobokenStevens Institute of Technology
New YorkRochesterRochester Institute of Technology
North CarolinaCharlotteThe University of North Carolina at Charlotte
PennsylvaniaPittsburghCarnegie Mellon University
TennesseeKnoxvilleThe University of Tennessee
TennesseeKnoxvilleThe University of Tennessee
TexasHuntsvilleSam Houston State University
VirginiaBlacksburgVirginia Tech

How much does a Ph.D. Holder in Cyber Security Make in the United States?

Individuals employed in R&D receive an average annual salary of $113,199. At the same time, information technology analysts earn about $98,600, and computer science professors earn more than $160,500.

Ph.D. in Cybersecurity: Career Outlook!

According to the prediction of the US Bureau of Labor Statistics, employment growth for information security analysts is estimated to be 32% between 2019 and 2029. Computer science professors are still doing well in terms of career development.

There is still a scarcity of trained cybersecurity specialists, especially at the doctorate level. Earning a Ph.D. in Cybersecurity may be a very good choice.

Concluding Note

Historically, cybercrime demanded resources and a degree of complexity that necessitated advanced preparation or abilities.

However, because of the internet’s pervasiveness, cybercrime is becoming more popular.

Trying to forecast what potential cybersecurity threats could look like and then developing tools and systems to defend against such threats is an intriguing aspect of the cybersecurity sector.

Kevin James

Related posts, 5 best cybersecurity bootcamps for beginners in 2024.

The world of cybersecurity is complicated. New cybersecurity technologies are being developed every day, and they all need to be… 

Top Best Cybersecurity Certifications For Career Growth (2024)

Cybersecurity law degrees in the united states: a complete guide (2024).

Northeastern University

Academic Catalog 2024-2025

Cybersecurity, phd.

A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Students who choose the PhD in Cybersecurity program have a strong desire to pursue academic research solving critical cybersecurity challenges facing today’s society. The PhD program is a natural path for students in the college’s  Master of Science in Cybersecurity  program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers. Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to  gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science

A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a National Center of Academic Excellence in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations

The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern University’s Khoury College of Computer Sciences, the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities

Access to research projects at Northeastern’s research centers focused on security:

The Cybersecurity and Privacy Institute :  The mission of Northeastern's Cybersecurity and Privacy Institute is to safeguard critical technology. Forging partnerships with experts in industry, government, and academia worldwide, the Institute’s faculty and students develop, protect, and enhance technologies on which the world relies—from mobile devices and “smart” IoT applications to tomorrow’s self-driving cars and delivery drones. Their expertise spans algorithm auditing; cloud security; cryptography; differential privacy; embedded device security; internet-scale security measurements; machine learning; big data; security, malware, and advanced threats; network protocols and security; web and mobile security; and wireless network security.

The International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware, and vulnerability analysis; intrusion detection; and other computer security issues.

The ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

The benefits of the Boston area:

  • World-renowned for academic and research excellence, the Boston area is also home to some of the nation’s largest Department of Defense contractors and government and independent labs such as MIT Lincoln Lab, MITRE, and Draper Lab.

Degree Requirements

The PhD in Cybersecurity degree requires completion of at least 48 semester semester hours beyond a bachelor’s degree. Students who enter with an undergraduate degree will typically need four to five years to complete the program, and they will be awarded a master’s degree en route to the PhD.

Doctoral Degree Candidacy

A student is considered a PhD degree candidate after completing the core courses with at least a 3.500 GPA, with no grades lower than a B in the core courses, and either publishing a paper in a strong conference or journal or passing an oral exam that is conducted by a committee of three cybersecurity faculty members and based on paper(s) written by the student.

One year of continuous full-time study is required after admission to the PhD candidacy. During this period, the student will be expected to make substantial progress in preparing for the comprehensive examination.

Teaching Requirement

All cybersecurity PhD students must satisfy the teaching requirement in order to graduate. This requirement is fulfilled when the student works as a teaching assistant or instructor of record for one semester and during this semester:

  • Teaches at least three hours of classes
  • Prepares at least one assignment or quiz or equivalent

PhD students are expected to satisfy the teaching requirement some time after completing their first year and at least one semester prior to scheduling their PhD defense. 

Dissertation Advising

The doctoral dissertation advising team for each student consists of two cybersecurity faculty members, one in a technical area. When appropriate, the second faculty advisor will be from the policy/social science area.

Dissertation Committee

With the help of the advisor, a student selects the committee, consisting of at least four members, to be approved by the PhD cybersecurity curriculum committee. The four members must include the advisor, two internal members, and an external member.

Comprehensive Examination

A PhD student must submit a written dissertation proposal and present it to the dissertation committee. The proposal should identify the research problem, the research plan, and the potential impact of the research on the field. The presentation of the proposal will be made in an open forum, and the student must successfully defend it before the dissertation committee after the public presentation.

Dissertation Defense

A PhD student must complete and defend a dissertation that involves original research in cybersecurity.

Awarding of Master’s Degrees

Students who enter the PhD in Cybersecurity program with a bachelor’s degree have the option of earning a master's degree from one of the departments participating in the program. To do so, they must meet all of the department’s degree requirements.

  • Concentrations and course offerings may vary by campus and/or by program modality.  Please consult with your advisor or admissions coach for the course availability each term at your campus or within your program modality.  
  • Certain options within the program may be  required  at certain campuses or for certain program modalities.  Please consult with your advisor or admissions coach for requirements at your campus or for your program modality. 

Bachelor’s Degree Entrance

Complete all courses and requirements listed below unless otherwise indicated.

Teaching Qualifying exam and area exam Annual review Dissertation proposal Dissertation committee Dissertation defense

Core Requirements

A grade of B or higher is required in each core course. A cumulative 3.500 grade-point average is required for the core requirement.

Course List
Code Title Hours
Foundations
Cyberlaw: Privacy, Ethics, and Digital Rights4
Software Vulnerabilities and Security4
or  Introduction to Software Security
Network Security4
or  Computer Hardware and System Security

Electives and Tracks

Course List
Code Title Hours
Note: Consult faculty advisor for other acceptable courses.
Tracks
Select at least two courses from one track:8
Compilers
Wireless Network
Digital Signal Processing
Computer Architecture
Mobile and Wireless Networking
Computer Hardware Security
Fundamentals of Computer Networking
Machine Learning
Deep Learning
Introduction to Machine Learning and Pattern Recognition
Advanced Machine Learning
Wireless Network
Network Security
Foundations of Distributed Systems
Seminar in Computer Security
Computer System Security
Wireless Sensor Networks and the Internet of Things
Wireless Communication Systems
Digital Communications
Mobile and Wireless Networking
Fundamentals of Computer Networks
Compilers
Intensive Computer Systems
Foundations of Distributed Systems
Computer System Security
Network Security
Wireless and Mobile Systems Security
Computer Architecture
Advanced Algorithms
Complexity Theory
Foundations of Cryptography
Seminar in Theoretical Computer Science
Information Theory
Empirical Research Methods
Privacy, Security, and Usability
Theory and Methods in Human Computer Interaction
Research Methods in the Social Sciences
Qualitative Methods
Statistical Analysis
Quantitative Analysis
Criminology
Evidence-Based Crime Policy
Security Risk Management and Assessment
Information System Forensics
Decision Making for Critical Infrastructure
Security and Resilience Policy
Electives
Selected in consultation with advisor from graduate-level CS and ECE courses and graduate-level courses offered by the College of Social Sciences and Humanities, including CRIM, CS, CY, DS, EECE, INSH, MATH and POLS.28

Dissertation

Course List
Code Title Hours
Dissertation Term 1
Dissertation Term 2
Complete the following (repeatable) course until graduation:
Dissertation Continuation

Program Credit/GPA Requirements

48 total semester hours required Minimum 3.000 GPA required

Incoming PhD in Cybersecurity students who have already completed a Master of Science in an adjacent field may petition to the graduate program administration for advanced entry. Advanced entry petitions are reviewed by the program administration on a case-by-case basis. Please note that advanced entry does not waive by itself any part of the PhD coursework requirements. As a degree conferral requirement, a minimum of 16 semester hours of coursework beyond the 32 semester hours of the master’s degree is required of advanced entry PhD students (48 semester hours is required of standard entry PhD students). A grade of B or higher is required in each course. A cumulative 3.500 GPA is required for the core requirement.

Refer to the PhD Cybersecurity overview for admission to candidacy requirements.

Refer to the PhD Cybersecurity  overview  for residency requirements.

Refer to the PhD Cybersecurity  overview for teaching requirements.

Refer to the PhD Cybersecurity  overview for dissertation advising requirements.

Refer to the PhD Cybersecurity  overview for dissertation committee requirements.

Refer to the PhD Cybersecurity  overview  for comprehensive examination requirements.

Refer to the PhD Cybersecurity  overview  for dissertation defense and completion requirements.

Core Requirement

Students must maintain a minimum GPA of 3.500 as well as earn a grade of B or better in each core course.

Course List
Code Title Hours
Consult your faculty advisor for approved courses.16

Minimum 16 semester hours required Minimum 3.000 GPA required

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2023-24 Undergraduate Day PDF

2023-24 CPS Undergraduate PDF

2023-24 Graduate/Law PDF

2023-24 Course Descriptions PDF

  • Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

a student listens to a lecture

PhD in Cybersecurity

The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

  • Explore plan of study
  • View program requirements
  • How to apply
  • Request info

phd in cyber security duration

PhD students at Khoury College gain deep knowledge and invaluable experience—preparing them for a career in academia as well as research.

phd in cyber security duration

Our flagship campus in Boston is just minutes away from esteemed universities, exciting start-ups, and leaders in tech, finance, health care, and more.

phd in cyber security duration

Research Projects

December 15, 2023

Khoury Graduate Admissions Team

  • Financial support

January 1, 1066

January 1, 1492

Khoury Align Admissions Team

  • How to Apply
  • Cost & Financial Aid

Northeastern University - Khoury College of Computer Sciences

Khoury Social

Khoury College youtube link

Contact Khoury

phd in cyber security duration

I'm seeking information for

phd in cyber security duration

Cyber Insight

Breaking Down the Timeframe: Getting a PhD in Cyber Security

Updated on: June 17, 2023

phd in cyber security duration

Getting a PhD in Cyber Security is a tough, yet rewarding, journey. I should know, since I’ve been through it myself, and it was quite a challenge. It takes time, dedication, and a lot of hard work to break down the timeframe and reach your ultimate goal. From the endless hours of reading and conducting research to defending your dissertation, the journey to obtaining a PhD in Cyber Security is not for the faint of heart. But once you’ve reached that endpoint, the feeling of fulfillment and accomplishment will all be worth it. In this piece, I’ll walk you through the steps of breaking down the timeframe for a PhD in Cyber Security and share some psychological and emotional hooks to keep you motivated along the way.

How long does it take to get your PhD in cyber security?

Here are some key points to consider when exploring the timeline for earning a PhD in Cybersecurity:

  • A bachelor’s degree is typically required to enter a PhD program in Cybersecurity.
  • The program requires the completion of at least 48 semester hours of coursework, in addition to research and dissertation requirements.
  • Full-time students can expect to spend at least 4-5 years in the program, although part-time study options may be available that can extend the timeline.
  • The timeline can also be affected by the student’s research interests and the time it takes to conduct their research.
  • Some universities may offer an advanced master’s degree as part of the PhD program, which can add an additional year or two to the timeline.

Overall, earning a PhD in Cybersecurity is a rigorous and challenging program that requires a significant time commitment. However, for those who are passionate about the field and willing to put in the work, a PhD in Cybersecurity can open up many exciting career opportunities in the fast-growing field of cybersecurity.

???? Pro Tips:

1. Research Your Options: Before you begin pursuing a PhD in cyber security, take some time to research what programs are available. You should consider factors such as program length, cost, and course requirements to find the program that best suits your needs.

2. Set Goals: Pursuing a PhD is a significant undertaking that requires a clear sense of purpose. Define your goals and keep them in mind as you work towards completing your degree.

3. Stay Disciplined: A PhD in cyber security will require a lot of work, and it’s important to stay disciplined. Develop a schedule that allows you to balance your academic work with other commitments.

4. Seek Support: Pursuing a PhD can be a lonely experience. Seek support from friends, family, and colleagues, and join groups related to your field to network and connect with others.

5. Don’t Give Up: Completing a PhD in cyber security is challenging, but it’s important to remember that it’s also incredibly rewarding. Don’t give up when you encounter setbacks or difficulties, and keep your eye on the prize: a respected degree that will set you up for success in the field of cyber security.

Overview of a PhD in Cybersecurity

A PhD in Cybersecurity is a highly advanced degree that provides students with specialized knowledge in the field of cybersecurity. This degree is designed for those who wish to pursue a career in research or teaching in higher education, as well as those who want to work in industry as cybersecurity experts. The program covers a wide range of topics, including network security, cryptography, cybercrime, and digital forensics. Graduates of PhD in Cybersecurity programs are highly sought after for their knowledge and expertise in the rapidly growing field of cybersecurity.

Minimum Credit Requirement for a PhD in Cybersecurity

The minimum credit requirement for a PhD in Cybersecurity is typically 48 semester hours. This includes coursework in areas such as computer science, mathematics, and cybersecurity. In addition to coursework, students must also complete a dissertation or research project, which is a significant piece of original research in the field of cybersecurity. The dissertation must be approved by a committee of faculty members and defended in front of the committee and other members of the academic community.

Timeframe for Completing a PhD in Cybersecurity

The timeframe for completing a PhD in Cybersecurity varies depending on several factors, including whether the student is pursuing the degree full-time or part-time, the student’s educational background, and the requirements of the specific program. Generally, students who start with an undergraduate degree will typically require four to five years to finish the degree. Students who already have a master’s degree in a related field may be able to complete the program in less time.

Factors Affecting the Duration of a PhD in Cybersecurity

Several factors can affect the duration of a PhD in Cybersecurity. These include the availability of funding, the student’s ability to conduct research, and the student’s progress in the program. It is important to note that pursuing a PhD in Cybersecurity requires a significant investment of time and effort, and students should be prepared to commit several years of their lives to this endeavor.

Some common factors that can affect the duration of a PhD in Cybersecurity are:

  • The amount of time the student is able to devote to the program
  • The availability of funding and resources
  • The complexity of the research project or dissertation
  • The student’s prior educational background and experience

Common Pathways to a PhD in Cybersecurity

There are several common pathways to a PhD in Cybersecurity. These include:

  • Starting with a Bachelor’s degree in Cybersecurity
  • Earning a Master’s degree in Cybersecurity before pursuing a PhD
  • Starting with a Bachelor’s degree in Computer Science or a related field and taking courses in Cybersecurity
  • For those currently working in the industry, pursuing a PhD in Cybersecurity part-time

Each pathway has its own advantages and disadvantages, and students should carefully consider their options before deciding on a particular pathway.

Dual Degree Options for a PhD in Cybersecurity

For students interested in pursuing a highly specialized career, there are several dual degree options available in Cybersecurity. These include:

  • PhD/MBA: This dual degree program combines a PhD in Cybersecurity with a Master’s in Business Administration.
  • PhD/JD: This dual degree program combines a PhD in Cybersecurity with a Juris Doctor degree in Law.
  • PhD/MD: This dual degree program combines a PhD in Cybersecurity with a Doctor of Medicine degree.

These dual degree options allow students to gain expertise in both cybersecurity and another field, which can open up a wider range of career opportunities. However, these programs are typically longer and more intensive than a traditional PhD in Cybersecurity program.

In conclusion, pursuing a PhD in Cybersecurity is a significant investment of time and effort, but can lead to a highly rewarding career in a rapidly growing field. Students should carefully consider their options and choose a pathway that best fits their individual goals and interests. By taking the time to carefully research and plan their education, students can set themselves up for success in the exciting field of cybersecurity.

most recent

phd in cyber security duration

Cybersecurity Basics

What are the three approaches to security in cyber security: explained.

phd in cyber security duration

Services & Solutions

What is security solution and why it matters: ultimate guide.

phd in cyber security duration

Training & Certification

Is a masters in cybersecurity worth the investment.

phd in cyber security duration

What is the Cyber Security Strategy Objective? Protecting Against Breaches.

phd in cyber security duration

What is Dart in Cyber Security? A Powerful Tool for Threat Detection.

phd in cyber security duration

Decoding SLED: Is Public Sector Cybersecurity the Same?

PH +1 000 000 0000

24 M Drive East Hampton, NY 11937

© 2024 INFO

PhD Graduate Education at Northeastern University logo

This program engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities. It prepares students from diverse backgrounds and interests to advance the reliability and security of cyberspace as researchers, faculty members, and policy advisors.

In The News

Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?

Live Nation Entertainment blamed bots for the Taylor Swift ticket fiasco. Is it a legitimate explanation or just an excuse?

The smart home tech inside your home is less secure than you think, new Northeastern research finds

The smart home tech inside your home is less secure than you think, new Northeastern research finds

The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

  • Admitted PhD students are guaranteed full tuition scholarship and are supported with stipends or fellowships for the first five years of their program
  • Northeastern University has been designated by the National Security Agency and the U.S. Department of Homeland Security as a Center of Academic Excellence in Information Assurance/Cyber Defense, in IA Research, and in Cyber Operations
  • Boston area is home to some of the nation’s largest Department of Defense contractors as well as prestigious government and independent labs, such as MIT Lincoln Lab, MITRE, and Draper Lab
  • Interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs and makes it unique in the Boston area
  • Learn to identify, formulate, and solve complex engineering/scientific/societal/quantitative problems related to cybersecurity and privacy
  • Learn to explain and apply cybersecurity design principles, as appropriate to the program’s educational objectives
  • Learn to develop solutions that meet specified end-user needs with consideration of security, privacy, safety, and welfare, as well as global, cultural, social, and economic factors
  • Produce and defend original research in an area of cybersecurity
  • Be able to communicate research results effectively in both oral and written forms

A PhD in Cybersecurity opens doors to diverse and high-demand careers. Graduates can excel in various roles, including:

  • Tenure-track faculty
  • Policy advisor
  • Chief information security officer
  • Security consultant
  • Threat intelligence analyst
  • Research scientist

Application Materials

  • Online application and fee
  • Unofficial undergraduate/graduate transcripts (you can submit official transcripts from all colleges/universities attended at the time of admission)
  • Statement of purpose that should include career goals and expected outcomes and benefits from the program
  • Recent professional resume listing detailed position responsibilities
  • Three confidential letters of recommendation
  • GRE Test Scores Optional
  • Degree earned or in progress at an U.S. institution
  • Degree earned or in progress at an institution where English is the only medium of instruction
  • Official exam scores from either the TOEFL iBT, IELTS, or  PTE exam
  • Applicants seeking enrollment should apply through this link .

Application

Applicants must submit the online application and all required admission materials no later than the stated deadlines to be considered for admission. Admissions decisions are made on a rolling basis.

Applicants are reviewed annually for admission to the Fall Term:

  • December 15

The deposit deadline is April 15th. 

  • Program Website

Request Information for PhD in Cybersecurity

Arizona State University

Computer Science (Cybersecurity), PhD

  • Program description
  • At a glance
  • Degree requirements
  • Admission requirements
  • Tuition information
  • Application deadlines
  • Career opportunities
  • Contact information

Computer, Cybersecurity, Information, Information Assurance, Security, approved for STEM-OPT extension, assurance, enggradcs, foundation, network, systems

A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.

The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance.

The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including applied cryptography, computer and network security, computer forensics, data and information security and software security.

According to the National Security Agency, information assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. This includes providing restoration of information systems by incorporating protection, detection and reaction capabilities.

Domestic students enrolled in the cybersecurity concentration are eligible for federal fellowships, such as the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. For more information, students can visit the Cybersecurity and Trusted Foundations website

ASU is certified as a National Center of Academic Excellence in Information Assurance Education and a National Center of Academic Excellence in Information Assurance - Research by the National Security Agency and the Department of Homeland Security. Information assurance courseware at ASU has been certified by the Information Assurance Courseware Evaluation Program to satisfy the standards for Information Systems Security Professionals (NSTISSI 4011) and Senior Systems Managers (CNSSI 4012).

This program may be eligible for an Optional Practical Training extension for up to 24 months. This OPT work authorization period may help international students gain skills and experience in the U.S. Those interested in an OPT extension should review ASU degrees that qualify for the STEM-OPT extension at ASU's International Students and Scholars Center website.

The OPT extension only applies to students on an F-1 visa and does not apply to students completing a degree through ASU Online.

  • College/school: Ira A. Fulton Schools of Engineering
  • Location: Tempe
  • STEM-OPT extension eligible: Yes

84 credit hours, a written comprehensive exam, a prospectus and a dissertation

Required Core Areas (9 credit hours) applications (3) foundations (3) systems (3)

Concentration (9 credit hours) CSE 543 Information Assurance and Security (3) Choose two: CSE 539 Applied Cryptography (3) CSE 545 Software Security (3) CSE 548 Advanced Computer Network Security (3)

Research (18 credit hours) CSE 792 Research (18)

Electives and Additional Research (36 credit hours)

Culminating Experience (12 credit hours) CSE 799 Dissertation (12)

Additional Curriculum Information Courses that are used to satisfy the core area requirement cannot be used to satisfy electives or other requirements. A grade of "B" or better is required for core courses.

18 credit hours of CSE 792 Research are required, and up to 54 credit hours are allowed on the plan of study. Students with research credit hours in excess of 18 add these credit hours to their electives and additional research.

Electives include:

  • additional CSE 792 Research credit hours (up to 36 credit hours allowed beyond the required 18)
  • computer science courses of which up to 18 credit hours of CSE 590 and CSE 790: Reading and Conference is allowed
  • up to six credit hours of interdisciplinary electives in other academic units that are subject to program chair approval

When approved by the academic unit and the Graduate College, this program allows 30 credit hours from a previously awarded master's degree to be used for this degree.

A maximum of three credit hours of 400-level coursework may be applied on the plan of study.

Applicants must fulfill the requirements of both the Graduate College and the Ira A. Fulton Schools of Engineering.

Applicants are eligible to apply to the program if they have earned a bachelor's degree in computer science, computer engineering or a closely related area. Most applicants should have earned a master's degree, but exceptional undergraduate applicants may be admitted directly into the doctoral program.

Applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in the last 60 hours of their first bachelor's degree program, or applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in an applicable master's degree program.

All applicants must submit:

  • graduate admission application and application fee
  • official transcripts from every university attended
  • three letters of recommendation
  • a statement of purpose
  • curriculum vitae or resume
  • proof of English proficiency

Additional Application Information An applicant whose native language is not English must provide proof of English proficiency regardless of their current residency.

GRE scores are optional.

If the student is assigned any deficiency coursework upon admission, those classes must be completed with a grade of "C" (scale is 4.00 = "A") or higher within two semesters of admission to the program. Deficiency courses include:

CSE 230 Computer Organization and Assembly Language Programming CSE 310 Data Structures and Algorithms CSE 330 Operating Systems CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science

The applicant's undergraduate GPA and depth of preparation in computer science and engineering are the primary factors affecting admission.

SessionModalityDeadlineType
Session A/CIn Person 12/31Final
SessionModalityDeadlineType
Session A/CIn Person 08/01Final

Graduates with a doctorate in computer science are able to analyze, understand and apply key theories and algorithms used in the field of computer science. They are also able to generate and evaluate new theories, algorithms and software modules that can advance the field of computer science. Graduates have a competitive advantage when it comes to securing employment.

Career examples include:

  • computer science researcher
  • computer science security professor
  • data scientist engineer
  • machine learning, AI or computer vision engineer
  • machine learning, AI or computer vision scientist

Computer Science and Engineering Program | CTRPT 105 [email protected] 480-965-3199

click back to top

phd in cyber security duration

  • Doing a PhD in Cyber Security

What Does a PhD in Cyber Security Focus On?

A PhD in Cyber Security equips students with expert knowledge in computing, cybercrime and digital technology policy. A PhD involves original research into a specific field of cybersecurity and can allow cyber security graduate students to work with emerging technologies and tools to tackle issues society faces as technology rapidly advances.

According to the UK National Cyber Security Strategy 2016-2021 , there will be an estimated shortage of 350,000 cybersecurity professionals by 2022. There is therefore a high demand for cyber security graduates and doctorates. A PhD in Cyber Security could lead to a career in an emerging industry.

A list of Cybersecurity topics at doctorate level is provided below:

  • Cryptography
  • Artificial Intelligence and Robotics
  • Systems Security and Testing
  • Cryptocurrency and Blockchains
  • Privacy, Confidentiality and Ethics
  • Software Security
  • Digital Forensics
  • Security Risk Management
  • Network Security
  • Digital Technology Policy
  • Quantum Computing

Minimum Entry Requirements for A PhD in Cyber Security

UK Doctoral Cyber Security programmes usually require graduate students to possess, or expect to achieve, as a minimum a 2:1 upper second class bachelor’s degree in computer science, or related subject such as Mathematics. It should be noted that due to the interdisciplinary challenges in cyber security, related subjects can vary depending on the focus of research and may include areas such as Electrical Engineering , Civil Engineering, Social Sciences, Psychology and Law. A lower second class (2:2) bachelor’s degree may be accepted if the graduate student has a master’s degree or graduate cyber security work experience. Applicants with international equivalent qualifications are also considered.

Another requirement for research projects is proof of English Language ability. Universities will expect international students to provide English Level Qualifications, for example IELTS, TOEFL (iBT) or Pearson PTE scores.

Browse PhDs in Cyber Security

Application of artificial intelligence to multiphysics problems in materials design, from text to tech: shaping the future of physics-based simulations with ai-driven generative models, study of the human-vehicle interactions by a high-end dynamic driving simulator, coventry university postgraduate research studentships, discovery of solid state electrolytes using deep learning, how long does it take to get a phd in cyber security.

In the UK, a full time cybersecurity research project lasts around 3 to 4 years. The first year is usually probationary and will be used to develop a thesis proposal that outlines your research degree. The remaining time will be used to carry out your research, produce and submit your thesis and undertake the Viva . Part-time cybersecurity projects may take 6 to 7 years to complete. A full-time cyber security MPhil usually lasts for 1 to 2 years.

In addition to developing your thesis proposal, the first year is also used to allow your supervisor to identify additional cybersecurity training that would assist in your research project. This may come in the form of online PhD cybersecurity training modules, online doctorate lectures, or placement opportunities to give you an insight into the cyber security industry and real world applications in your chosen field.

Costs and Funding

A UK doctoral student can expect to pay around £5,500 per year in tuition fees for a 2021/22 PhD programme in Cyber Security. Typical tuition fees for EU and overseas students are around £25,000 per academic year. Part-time tuition fees are normally proportioned according to the research programme length.

Most institutions have Centres for Doctoral Training in Cyber Security, which offer a number of Engineering and Physical Sciences Research Council (EPSRC) studentships to eligible applicants. These studentships and grants cover tuition fees, and can provide a maintenance stipend and research travel expenses.

You may also be eligible for a Postgraduate Doctoral Loan which helps with course fees and living costs associated with a cyber-security research project.

PhD in Cyber Security Salary and Career Paths

As companies become more reliant on technology, the risk of cyber-attacks and other compromises in security becomes more pressing. In fact, according to The Annual Crime Survey in 2017 , two thirds of UK businesses were hit by cyber-attacks. Because of this, and the recognised shortage of cybersecurity professionals and graduates/doctorates, companies, both public and private, are investing large amounts of money into developing their cyber security. These companies look to a PhD student with a cyber security degree as someone who can help develop this. A PhD in Cyber Security reflects the demand for security specialists.

Typical employers for cybersecurity doctorates include Intel, NASA, Microsoft, Google and Lloyds TSB, though the full list of employers is extensive due to the increasing reliance on technology in almost all industries, and the overlap with other disciplines such as computer science and information science. The doctoral degree also allows for international reach, as it is a highly applicable field of knowledge for any country. Many of the employers are based in the US, for example, NASA and Google. Common jobs for Cyber Security PhD students include:

  • Cyber Security Analyst – Perhaps the most logical career path for cybersecurity doctorates is to become a cyber-security analyst. Doctorates in this role are responsible for detecting, managing and preventing cyber-attacks, and developing cyber defences to protect a company’s IT infrastructure. Senior cyber security analysts in the UK can earn around £50,000. Those with managerial duties or expert knowledge can earn over £80,000. As such, the PhD in cyber security salary tends to be higher than counterparts with similar levels of experience.
  • Penetration Testing – In this role, cybersecurity PhD students carry out controlled cyber-attacks on a company’s IT infrastructure to find weak points in security. This will then be used to advise the company on how to manage cyber risk and prevent such attacks from real cyber criminals in the future. One of the advantages of penetration testing is that it lends itself to freelance work. With experience, freelance penetration testers can earn over £500 a day. Again, a cybersecurity doctoral degree is a valuable qualification to hold as it demonstrates your credibility and expertise.
  • Teaching – Some doctoral students use their cybersecurity degree to stay in Higher Education. Here they can continue their study as a researcher working in a University School or Faculty alongside other researchers, or transition into a teaching role as a professor or lecturer. As a lecturer, you can tailor your study content and also supervise a doctorate in cybersecurity in your field of interest.

Browse PhDs Now

Join thousands of students.

Join thousands of other students and stay up to date with the latest PhD programmes, funding opportunities and advice.

The Gradcafe

  • Majors & Careers
  • Online Grad School
  • Preparing For Grad School
  • Student Life

Top 10 Best Programs for a PhD in Cyber Security

Lisa Marlin

Technology is becoming more and more integrated with our daily lives — with it comes threats from hackers that make your information vulnerable. Indeed, cybersecurity threats  are expected to grow even more in the next few years, making cybersecurity professionals sought-after in the hiring market. Already have an extensive computer science  background? Why not take it to the next level with a PhD in cyber security?

A doctorate degree in cyber security gives you a valuable qualification and in-depth knowledge of cybersecurity challenges. Not only will you be equipped to help organizations protect their crucial information, but you’ll also be qualified to develop strategies for better data security and even teach the subject in university.

Ready to unlock unlimited career potential in the cybersecurity space? Let’s jump into our top programs for cybersecurity PhD programs, including common requirements and costs and future career potential.

Table of Contents

Best Programs for a PhD in Cyber Security

Arizona state university, ira a. fulton schools of engineering.

Ph.D. Computer Science (Cybersecurity)

Arizona State University logo

Arizona State University is certified as a National Center of Academic Excellence for Information Assurance Research and Education (CAEIAE). Its doctorate of cyber security program helps students master key theories and algorithms to apply to a modern computer science realm.

  • Courses:  Data and information systems , information assurance and security, applied Cryptography, and advanced computer network security.
  • Credits:  84
  • Delivery: On-campus
  • Tuition :  $11,720 per year
  • Financial aid:  Scholarships, grants, and loans.
  • Acceptance rate: 88.4%
  • Location:  Phoenix, Arizona

Capitol Technology University

Doctorate (DSc) in Cybersecurity

Capitol University logo

Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense. The school’s doctorate in cybersecurity program is a low-residency online program and was the first of its kind  in the USA.

  • Courses : Situation awareness analysis & action plan processes, information assurance strategic management, information assurance implementation
  • Credits : 54-66
  • Duration : 3 years (8 semesters)
  • Delivery : Online (low residency)
  • Tuition : $933 per credit
  • Financial aid: Loans, Grants, scholarships, work-study
  • Acceptance rate:  84.4%
  • Location : Laurel, MD

Northcentral University, School of Technology

Doctor of Philosophy in Cybersecurity (PhD-CY)

Northcentral University logo

Northcentral University is a regionally accredited university that offers many educational programs for students all over the world with one-on-one mentorship. Its PhD cybersecurity degree has a special emphasis on global security issues and covers international laws and multicultural elements.

  • Courses : Global cybersecurity demand, securing globally distributed infrastructure & support, and governance, audit, compliance & risk
  • Credits : 60
  • Duration : 40-44 months
  • Delivery : Online
  • Tuition : $1,094 per credit
  • Financial aid : Grants, loans, veteran benefits, and third-party scholarships.
  • Acceptance rate : 93%
  • Location : San Diego, CA & Scottsdale, Arizona

University of Colorado – Colorado Springs, College of Engineering and Applied Science

Ph.D. in Security

University of Colorado Springs logo

University of Colorado, Colorado Springs has partnerships with several defense departments, semiconductor manufacturers, and other prominent institutions, thanks to its strategic location. Though students must conduct the majority of the coursework for this doctorate degree in cyber security on-campus, a provision permits some online courses.

  • Courses : System administration & security, applied cryptography, and advanced system security design.
  • Delivery : On-campus
  • Tuition : $918.83 per credit
  • Financial aid : Scholarships, student employment, and loans.
  • Acceptance rate:  89.6%
  • Location : Colorado Springs, Colorado

Northeastern University

Cybersecurity, Ph.D.

Northeastern University logo

Northeastern University promotes a co-operative education philosophy with a blend of classroom learning and professional experience. This cybersecurity PhD program offers the opportunity to conduct research in specialized facilities and labs, including the Cybersecurity & Privacy Institute and International Secure Systems Lab.

  • Courses : Software vulnerabilities & security, computer hardware security, and machine learning in cybersecurity & privacy.
  • Credits : 48
  • Tuition : $1,532 per credit hour
  • Financial aid:  Scholarships, fellowships, assistantships, and company sponsorships.
  • Acceptance rate : 20.5%
  • Location : Boston, Massachusetts

Dakota State University

Cybersecurity, DSc

Dakota State University logo

Dakota State University is known for its specialization in computer education-related programs. Its doctorate in cyber security is delivered through a combination of various distance education methods and a handful of on-campus seminars. You can apply for the program even if you don’t have a master’s degree, but you’ll need to complete an additional 27 credits.

  • Courses : Full scope security testing, cyber security research, and security software engineering.
  • Credits : 61
  • Duration : 3 years
  • Delivery : Online (plus on-campus seminars)
  • Tuition : $210.80 per credit hour
  • Financial aid:  Grants, work-study, and loans.
  • Acceptance rate: 83%
  • Location:  Madison, SD

Purdue University, The Center for Education and Research in Information Assurance and Security (CERIAS)

Interdisciplinary Ph.D. Program in Information Security

Purdue University logo

Purdue University was ranked in the top 10  most innovative universities in 2022 by the US News & World Report. This interdisciplinary cybersecurity PhD program covers ethical, political, and philosophical courses, to provide insight into technology policy issues and information ethics.

  • Courses include:  Information security, advanced network security, and modern ethical theories.
  • Credits: 60
  • Delivery:  On-campus
  • Tuition:  Refer tuition calculator
  • Financial aid:  Fellowships, teaching assistantships, and research assistantships.
  • Acceptance rate: 67.2%
  • Location:  West Lafayette, IN

Nova Southeastern University, College of Computing and Engineering

Ph.D. in Cybersecurity Management

Nova Southeastern University

NSU is considered one of the National Centers of Academic Excellence (NCAE) in cybersecurity. To qualify for this school’s PhD program in cybersecurity, you’ll need to have either a bachelor’s or master’s degree in the field. The school also offers a direct BS to PhD pathway.

  • Courses : Fundamentals of cybersecurity, information security governance, and human-computer interaction.
  • Credits : 51 minimum
  • Delivery : Hybrid
  • Tuition : $1,282 per credit hour
  • Financial aid:  Fellowships, scholarships
  • Acceptance rate:  76.2%
  • Location : Fort Lauderdale, Florida

St Thomas University

Doctor of Business Administration in Cyber Security Management

St, Thomas University logo

St. Thomas University is a non-profit Catholic university that emphasizes global and cultural diversity. Its doctorate of cybersecurity program lets you choose one of three research options: traditional dissertation, action research, and article dissertation.

  • Courses : Cyberlaw, policy & security, cyber security risk management, and information ethics.
  • Duration : 1.5 years plus dissertation
  • Delivery : On-campus, online, and hybrid options
  • Tuition : $1,029 per credit hour
  • Financial aid:  Scholarships, grants, loans, and work-study.
  • Acceptance rate: 59.6%
  • Location : Miami Gardens, FL

George Mason University, Volgenau School of Engineering

Information Technology Ph.D. (Information Security and Assurance (ISA) Concentration)

George Mason University logo

George Mason University is a public research university with an emphasis on sustainability that was ranked the most diverse university  in Virginia by the US News & World Report 2018. Its PhD program in Information Technology offers a concentration in Information Security Assurance (ISA) covering cybersecurity subjects.

  • Courses : Secure software development, security protocol analysis, and security experimentation.
  • Credits : 72 minimum
  • Tuition : $663 per credit
  • Financial aid : Grants, work-study, and loans.
  • Acceptance rate:  89.2%
  • Location : Fairfax, Virginia

What are the Prerequisites for a PhD in Cybersecurity?

Most PhD programs in cybersecurity require a master’s in computer science or a related field. Other specific requirements vary depending on the program, but you’ll typically need to submit the following in your application:

  • Personal Statement  and/or research proposal
  • Academic resume
  • Letters of recommendation

Check individual requirements for each school you’re considering well in advance of the application cut-off date. These programs can be competitive, so give yourself plenty of time to put together the strongest application you can!

Preparing for a Cybersecurity Doctorate Program

The best cybersecurity doctorate programs can be intensive and competitive. Therefore, it’s a good idea to prepare before the program even starts – this can give you the edge you need to excel in the program!

Of course, your previous studies provide the foundation for your doctorate. An internship in the field can also help you to build useful skills and knowledge, especially when it comes to the latest trends  Likewise, participating in cybersecurity competitions or getting a cybersecurity certification can be highly advantageous.

However, the best thing you can do to prepare for a cybersecurity doctoral program is to build your network  in the sector. Join professional organizations and mingle with industry folks to gain insights into the field. You can also use social media platforms like LinkedIn and Twitter to enhance your networks.

Related Reading:  Best Master’s in Cybersecurity Programs

Why Get a Doctorate in Cybersecurity?

A doctorate in cybersecurity allows you to develop high-level skills and knowledge on preventing and analyzing security breaches, as well as formulating strategies to manage them. It is a valuable qualification that will qualify you for top jobs at some of the best organizations, with attractive remuneration.

When choosing the best cybersecurity PhD program for you, consider the school’s reputation and its accreditation. Also, look at the courses offered, as cybersecurity involves various specializations. You should also consider your budget in the context of each program’s tuition, fees, and financial aid offered.

Finally, where is the program located? Is it offered on-campus, offline, or in a hybrid program? These factors will affect your ability to balance your study with work and personal commitments.

Jobs and Salary Prospects for Doctors of Cybersecurity

Some of the common roles and median annual salaries  for graduates with a PhD in cybersecurity include:

  • Cybersecurity Engineer – $125,816
  • Information Security Manager – $96,406
  • Chief Information Security Officer (CISO) –  $124,405
  • Security Architect –  $111,433
  • Security Director  – $105,907

Key Takeaways

You may not find as many options for a PhD in cyber security as other fields. After all, it’s a specialized program. However, you’ll find a few solid top cybersecurity PhD programs that give you the opportunity to learn from top research institutions and faculty.

If you’ve found this round-up of the best PhDs in cybersecurity helpful, take a look at our guides to the best online Master’s in Computer Science  and online PhD Computer Science programs .

PhDs in Cybersecurity FAQs

What is the average cost of a phd in cybersecurity.

Costs vary depending on the school, program length, and delivery (on-campus or online). Usually, a PhD in cybersecurity can be anywhere between $30,000 to $100,000.

Is a PhD in Cybersecurity Worth it?

A PhD in cybersecurity is valuable because it will qualify you for some of the most in-demand and well-paid jobs available today. According to the BLS , jobs for information security professionals are estimated to grow by 33% over the next decade, significantly more than the national average.

Can You Get a PhD in Cybersecurity?

A PhD in cybersecurity is a specialized degree, but today, many universities offer it. Several programs are delivered on-campus, online, or in hybrid formats.

How Long is a PhD in Cybersecurity?

A PhD in cybersecurity can take from 3-7 years to complete. This will depend on the program, as well as individual factors such as whether you choose to study part-time or full-time.

What Can You Do with a PhD in Cybersecurity?

A PhD in cybersecurity will equip you to work for leading organizations as a CISO (Chief Information Security Officer), information security manager, or security architect. You’ll also be qualified to conduct research or work as a professor in cybersecurity or a related field.

How Many Credits are Required for a PhD in Cybersecurity?

You’ll typically need 60 credits to complete a cybersecurity PhD. However, this varies depending on the specific program or university.

What Kinds of Exams are Required During a PhD Program?

Unlike most undergraduate programs, a PhD degree relies heavily on coursework and, in particular, a main dissertation or thesis. However, you’ll still have to complete some exams.

Usually, there are three kinds of exams:

  • A qualifying exam  that occurs earlier in the program.
  • A preliminary exam  that proves the candidate’s readiness to start the dissertation/research.
  • The  final exam  for the candidate to defend their dissertation/research work.

How Do You Choose a PhD in Cyber Security Program?

You should consider faculty experience, networking opportunities, available funding, accreditation, and alumni statistics before choosing a PhD in cyber security program.

Lisa Marlin

Lisa Marlin

Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.

  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 30+ Best Dorm Room Essentials for Guys in 2024
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 12 Best Laptops for Computer Science Students
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ BA vs BS: What You Need to Know [2024 Guide]

Best Master’s in Cybersecurity Programs in 2024

Thegradcafe and jobbio join forces to connect top talent with great companies, related posts.

Here's how to find a job as a recent college graduate.

How New Grads Research Companies to Find Jobs

phd in cyber security duration

Experience Paradox: Entry-Level Jobs Demand Years in Field

Grad school application rates have more than doubled for artificial intelligence programs.

Grad Trends: Interest in Artificial Intelligence Surges

Here's how to earn consideration from the big tech players as a new grad.

Applying to Big Tech This Year? Here’s How to Ace It.

Fewer employers list education requirements in job postings.

73% of job seekers believe a degree is needed for a well-paying role–but is it?

There are more jobs than talent in these cities.

Tech Talent Crunch: Cities with More Jobs Than Workers

phd in cyber security duration

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • How Many Grad Schools Should I Apply To?
  • Last Mile Education Fund Paves the Way for Tech Students, Offers Lifeline Grants
  • When to Apply for Grad School: Easy Monthly Timeline [2025-2026]
  • 30+ Best Dorm Room Essentials for Guys in 2024
  • Best Laptop for Programming Students in 2024

The Gradcafe

© 2024 TheGradCafe.com All rights reserved

  • Partner With Us
  • Results Search
  • Submit Your Results
  • Write For Us

GW Online Engineering Programs site logo

GW Online Engineering Programs

  • Artificial Intelligence and Machine Learning
  • Cloud Computing Management
  • Cybersecurity Analytics
  • Cybersecurity Policy & Compliance
  • Electrical Engineering
  • Engineering Management
  • Systems Engineering
  • Policies & Procedures
  • On-Site International Programs
  • Artificial Intelligence & Machine Learning (D.Eng.)
  • Cybersecurity Analytics (D.Eng.)
  • Engineering Management (D.Eng.)
  • Systems Engineering (Ph.D.)
  • Degrees Offered
  • Tuition & Financial Aid
  • Student Resources
  • Application Process

Apply for Admission

GW Online Engineering Programs

Online Doctor of Engineering in Cybersecurity Analytics

We are now accepting applications for the cohort beginning in January 2025.

The application deadline is November 1, 2024.

Sign up for a Webinar 

Program flyer, program description .

The Doctor of Engineering in Cybersecurity Analytics grants students extensive knowledge of cutting-edge cybersecurity techniques, tools, and their real-world applications. Graduates  are well-equipped to conduct research and lead cybersecurity projects and teams in various industries, including technology, finance, healthcare, and more. Graduates will be able to effectively communicate complex cybersecurity concepts to diverse audiences, making them well-suited for leadership positions and academic teaching roles.

GW is federally designated as a National Center of Excellence for Cyber Defense Research. The GW Cyber Security and Privacy Research Institute ( CSPRI ) is the home for major information assurance and cybersecurity scholarship programs. The CSPRI is funded by the Department of Homeland Security and the National Science Foundation.

The degree requires completion of eight graduate-level courses (listed below) and a minimum of 24 credit hours of Praxis Research (SEAS 8188). During the research phase, the student writes and defends a research praxis on a topic related to Cybersecurity Analytics. The topic is selected by the student and approved by the research advising committee.

CSCI 6015 Cyber Forensics:  Acquiring, preserving and analyzing digitally stored information while ensuring that this information is admissible as evidence in a court of law. Principles and techniques for cyber forensics investigations using industry-standard forensic process.

SEAS 8400 Challenges in Cybersecurity:  Introduction to most common types of attacks, e.g., ransomware attacks, IoT attacks, cloud attacks, phishing attacks, blockchain and cryptocurrency attacks, software vulnerabilities, BYOD policies, and insider attacks, as well as analytical techniques of their mitigation.

SEAS 8405 Cybersecurity Architectures:  Introduction to traditional network-centric cybersecurity (i.e., Defense in Depth) and emerging cybersecurity architecture models including DevSecOps, Cloud-native, and risk adaptive (Zero Trust Architecture) structures. Discussion of the benefits and challenges of these models, alignment with MITRE frameworks, and how they support the business/mission outcomes of an organization.

SEAS 8410 Security Data Analysis & Visualization:  Visualization aspect of security data, including study of data analytics and scaling up information security, security metrics and security monitoring techniques focusing on industry applications. Tools for security data visualization and analytics.

SEAS 8414 Analytical Tools for Cyber Analytics:  Survey of analytical tools for analyzing cybersecurity data with particular attention to the use of data analytics procedures in supporting appropriate cybersecurity policy decisions

SEAS 8415 Applied Cryptography and Data Protection:  Introduction to cryptographic techniques, case studies for real-life applications of modern crypto-graphic solutions, classical cryptographical algorithms (AES, RSA, RC4) and techniques (symmetric, asymmetric-public key cryptography, hash functions), digital signatures, key management, and distribution. Advanced topics such as zero-knowledge proofs and zero-trust architectures.

SEAS 8416 Python Tools for Cybersecurity:  Learning Python & and its role in cybersecurity. Perform secure coding, network analysis, cryptography, malware analysis, and automation of cybersecurity tasks using Python.

SEAS 8499 Praxis Development for Cybersecurity:  Overview of research methods. Aims and purpose of the praxis. Development of praxis research strategies, formulation, and defense of a praxis proposal. Praxis proposal defense must be passed before the student is admitted to degree candidacy to undertake praxis work.

SEAS 8188 Praxis Research for Doctor of Engineering in Cyber Analytics:  Independent applied research in cybersecurity culminating in the final praxis report and final examination for the degree of Doctor of Engineering.

Classroom courses last 10 weeks each and meet on Saturday mornings from 9:00 AM—12:10 PM and afternoons from 1:00—4:10 PM (all times Eastern). All classes meet live online through synchronous distance learning technologies (Zoom). All classes are recorded and available for viewing within two hours of the lecture. This program is taught in a cohort format in which students take all courses in lockstep. Courses cannot be taken out of sequence, live attendance at all class meetings is expected, and students must remain continuously enrolled. Leaves of absence are permitted only in the case of a medical or family emergency, or deployment to active military duty.  Please see below for the dates of our upcoming cohort.

SemesterSession#Credit HoursTentative Dates
Spring 202516January 4 — March 8, 2025
Spring 202526March 22 — May 31, 2025
Summer 2025-6June 14 — August 23, 2025
Fall 202516September 6 — November 8, 2025

No classes on  Memorial Day and Fourth of July weekends 

To proceed to the research phase, students must earn a grade point average of at least 3.2 in the eight classroom courses, and no grade below B-. Students are then registered for a minimum of 24 credit hours of SEAS 8188 Praxis Research: 3 ch in Fall 2025 (Session 2), 9 ch in Spring 2026, 3 ch in Summer 2026, and 9 ch in Fall 2026. Throughout the research phase, students develop the praxis under the guidance of a designated faculty advisor. Faculty research advisors are assigned by the program office and meet individually with students every two weeks.

Sample research areas are listed below:

  • Addressing the Cybersecurity Malicious Insider Threat
  • Exploring Cybersecurity Requirements in the Defense Acquisition Process
  • Internet of Things Device Cybersecurity
  • Cybersecurity of Networked Home Medical Devices
  • Cybersecurity Challenges in Healthcare Industries 

Tuition is billed at $1650 per credit hour for the 2024-2025 year. A non-refundable tuition deposit of $995, which is applied to tuition in the first semester, is required when the student accepts admission.

Admissions Process

  • Bachelor’s and master’s degrees in engineering, applied science, business, computer science, information technology, or a related field from accredited institutions.
  • Applicants with other majors are encouraged to apply. However, they may have to take EMSE 4197 as a prerequisite course if they have not completed two college-level calculus courses.
  • A minimum graduate-level GPA of 3.2
  • Capacity for original scholarship.
  • TOEFL, IELTS, Duolingo, or PTE scores are required of all applicants who are not citizens of countries where English is the official language.  Check our  International Students Page  to learn about the SEAS English language requirements and exemption policy. Test scores may not be more than two years old.

Note: GRE and GMAT scores are not required.

Please note that our doctoral programs are highly selective; meeting minimum admissions requirements does not guarantee admission.  

  • Attach up-to-date Resume
  • Attach Statement of Purpose – In an essay of 250 words or less, state your purpose in undertaking graduate study at The George Washington University. Describe your academic objectives, research interests, and career plans. Discuss your qualifications including collegiate, professional, and community activities, and any other substantial accomplishments not mentioned.
  • Online Engineering Programs  The George Washington University 170 Newport Center Drive Suite 260 Newport Beach, CA 92660

Normally, all transcripts must be received before an admission decision is rendered for the Doctor of Engineering program. 

You will receive emails from us updating you as your application goes through the admissions process.

Register for the next Information Session

Live via Zoom Tue. September 17th, 7:00 pm Eastern

Register and Join the Webinar  

Subscribe to our Mailing List

Sign up to receive notifications about upcoming information sessions for the GW Online Doctor of Engineering in Cybersecurity Analytics program.

Subscribe Today

The University of Edinburgh home

  • Schools & departments

Postgraduate study

Cyber Security, Privacy and Trust PhD

Awards: PhD

Study modes: Full-time

Funding opportunities

Placements/internships

Programme website: Cyber Security, Privacy and Trust

Introduction to Postgraduate Study at the University of Edinburgh

Join us online on 25 September to learn more about Scotland, the city of Edinburgh and postgraduate study at the University.

Find out more and register

Research profile

The increasing reliance of systems and services on information technology in the public, private and third sector has significantly raised the impact of cyber attacks in the last two decades.

This PhD programme in Cyber Security, Privacy and Trust is a response to the growing need for highly specialized research and training in these topics. Cyber security and resiliency is a complex problem that requires designing and understanding underlying technologies but also how business processes, cost, usability, trust and the law play a role for effective technology deployment.

The aim of this PhD programme is to provide students with research training in specialised topics of security, privacy and trust, helping produce the next generation of world-leading experts of the field.

Programme structure

The PhD in Cyber Security, Privacy and Trust trains you as a researcher and allows you to develop advanced techniques and in-depth knowledge in a specialist area. You will develop an all-round knowledge of your discipline, and a broad range of transferable skills.

You will carry out independent research, resulting in an original contribution to knowledge in your chosen area, working under the guidance of your supervisors.

The prescribed period of study is 36 months if studying full-time, or between 48 and 72 months if studying part-time.

Year 1 of PhD studies is probationary. Your supervisor will identify your training needs, if any, and invite you to attend lectures relevant to your research topic. These lectures may be selected from those offered to MSc students or may be specialist courses and seminars organised by the School's various research groupings.

Towards the end of Year 1, you will be expected to submit a thesis proposal which identifies a specific research topic, reviews the relevant literature, outlines a plan of research to address the topic, and describes progress made so far.

Progress during your PhD is assessed by annual reviews, which formally determine whether you can progress with your PhD. You will be required to complete and pass a PhD annual review at the end of each year of study and thesis is expected to be submitted at the end of Year 3. Following thesis submission, you will be required to attend an oral examination (or viva) which will be conducted by an external and internal examiner.

Find out more about compulsory and optional courses

We link to the latest information available. Please note that this may be for a previous academic year and should be considered indicative.

AwardTitleDurationStudy mode
PhDCyber Security, Privacy and Trust3 YearsFull-time

Work placements/internships

Many postgraduate research students in the School of Informatics undertake at least one optional internship during their PhD, gaining important transferable skills whilst working with companies, public or third sector organisations.

The School of Informatics maintains a range of connections to potential employers in the cyber security and other sectors. Work placements or internships are considered a valuable aspect of research training as they expose students to an applied research culture, and can provide valuable contacts for future job searches.

Training and support

As a research student in the School of Informatics, you will have access to a highly respected academic staff community, including staff who have won prizes for their research and who are Fellows of learned societies.

The University of Edinburgh has been recognised as a UK Academic Centre of Excellence in Cyber Security Research. This is based on the amount and quality of its research output, as well as its level of PhD training.

Within the School of Informatics, the Security, Privacy and Trust Group includes academic staff who lead research in a range of technical and socio-technical areas of cyber security. Staff also supervise PhD students on this programme.

  • Security, Privacy and Trust Group

You will carry out your research under the guidance of a primary supervisor and at least one other secondary or co-supervisor. You will be expected to attend seminars and meetings of relevant research groups and may also attend lectures that are relevant to your research topic. Periodic reviews of your progress will be conducted to assist with research planning.

A programme of transferable skills courses will be offered, which facilitates broader professional development in a wide range of topics, from writing and presentation skills to entrepreneurship and career strategies.

The award-winning Informatics Forum is an international research facility for computing and related areas. It houses more than 400 research staff and students, providing office, meeting and social spaces.

The Forum also contains several robotics labs, an instrumented multimedia room, eye-tracking and motion capture systems, and a full recording studio amongst other research facilities. Its spectacular atrium plays host to many events, from industry showcases and student hackathons to major research conferences.

Nearby teaching facilities include computer and teaching labs with more than 250 machines, 24-hour access to IT facilities for students, and comprehensive support provided by dedicated computing staff.

There are further specific facilities to support aspects of cyber security research, including an Internet of Things Lab and a Network Security Lab. The Blockchain Technology Lab is a research lab supporting investigations into distributed ledger technology.

Among our wider entrepreneurial initiatives is Informatics Ventures, set up to support globally ambitious software companies in Scotland and nurture a technology cluster to rival Boston, Pittsburgh, Kyoto and Silicon Valley.

Career opportunities

There is high demand for security and privacy experts in industry, academia, and the public sector. Commercially, there is also a large variety of opportunities in both small and large companies.

Previous PhD graduates associated with the Security and Privacy Group have gone on to employment in industry with companies including:

  • ION Geophysical
  • Disney Research
  • Deutsche Bank.

Students have also gone on to be employed within academia, at institutions, to name a few, including:

  • University of Oxford
  • University of Bristol
  • University of Oldenburg
  • University of Auckland
  • University of Birmingham
  • University of Surrey
  • University of Munich
  • Cambridge University
  • Queen’s University Belfast
  • Tsinghua University
  • Lancaster University

Entry requirements

These entry requirements are for the 2024/25 academic year and requirements for future academic years may differ. Entry requirements for the 2025/26 academic year will be published on 1 Oct 2024.

A UK 2:1 honours degree, or its international equivalent, in computer science, mathematics, linguistics, or a related discipline. A Masters degree or equivalent, in information security, cyber security or a closely related discipline is recommended.

International qualifications

Check whether your international qualifications meet our general entry requirements:

  • Entry requirements by country
  • English language requirements

Regardless of your nationality or country of residence, you must demonstrate a level of English language competency at a level that will enable you to succeed in your studies.

English language tests

We accept the following English language qualifications at the grades specified:

  • IELTS Academic: total 7.0 with at least 6.0 in each component. We do not accept IELTS One Skill Retake to meet our English language requirements.
  • TOEFL-iBT (including Home Edition): total 100 with at least 20 in each component. We do not accept TOEFL MyBest Score to meet our English language requirements.
  • C1 Advanced ( CAE ) / C2 Proficiency ( CPE ): total 185 with at least 169 in each component.
  • Trinity ISE : ISE III with passes in all four components.
  • PTE Academic: total 70 with at least 59 in each component.

Your English language qualification must be no more than three and a half years old from the start date of the programme you are applying to study, unless you are using IELTS , TOEFL, Trinity ISE or PTE , in which case it must be no more than two years old.

Degrees taught and assessed in English

We also accept an undergraduate or postgraduate degree that has been taught and assessed in English in a majority English speaking country, as defined by UK Visas and Immigration:

  • UKVI list of majority English speaking countries

We also accept a degree that has been taught and assessed in English from a university on our list of approved universities in non-majority English speaking countries (non-MESC).

  • Approved universities in non-MESC

If you are not a national of a majority English speaking country, then your degree must be no more than five years old* at the beginning of your programme of study. (*Revised 05 March 2024 to extend degree validity to five years.)

Find out more about our language requirements:

  • Academic Technology Approval Scheme

If you are not an EU , EEA or Swiss national, you may need an Academic Technology Approval Scheme clearance certificate in order to study this programme.

Fees and costs

Scholarships and funding, featured funding.

  • Security, Privacy and Trust Group PhD topics (some with scholarships)
  • School of Informatics scholarships for research students
  • Research scholarships for international students

Please note that some University and School scholarships require separate applications via the Scholarships portal.

UK government postgraduate loans

If you live in the UK, you may be able to apply for a postgraduate loan from one of the UK’s governments.

The type and amount of financial support you are eligible for will depend on:

  • your programme
  • the duration of your studies
  • your tuition fee status

Programmes studied on a part-time intermittent basis are not eligible.

  • UK government and other external funding

Search for scholarships and funding opportunities:

  • Search for funding

Further information

  • IGS Admissions Administrator
  • Phone: +44 (0)131 651 5635
  • Contact: [email protected]
  • School of Informatics Graduate School
  • Office 3.42
  • Informatics Forum
  • Central Campus
  • Programme: Cyber Security, Privacy and Trust
  • School: Informatics
  • College: Science & Engineering

Select your programme and preferred start date to begin your application.

PhD Cyber Security, Privacy and Trust - 3 Years (Full-time)

Application deadlines.

Applications for 2024/25 entry are now open and can be submitted all year round.

Please submit your completed application at least three months prior to desired entry date.

If you want to be considered for School funded PhD scholarships you must apply by one of two rounds:

1 24 November 2023
2 26 February 2024 (date extended)

(Revised 25 October 2023 to update application deadlines)

(Revised 15 February 2024 to extend the round 2 application deadline)

  • How to apply

You must submit two references with your application.

You must submit an application via the EUCLID application portal and provide the required information and documentation. This will include submission of:

  • a Curriculum Vitae (CV)
  • research proposal (2-5 pages long)
  • degree certificates and official transcripts of all completed and in-progress degrees (plus certified translations if academic documents are not issued in English)
  • two academic references

Only complete applications will progress forward to the academic selection stage.

Read through detailed guidance on how to apply for a PGR programme in the School of Informatics:

  • School of Informatics PGR Application Guidance

Find out more about the general application process for postgraduate programmes:

UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications closed

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .

Fees and funding

Fees for this course.

Fee description Full-time Part-time
Tuition fees (2024/25) £6,035 £3,015
Tuition fees (2024/25) £31,100 £15,550

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Got questions? Get in touch

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE programmes
  • Primary PGCE programmes
  • Secondary PGCE programmes
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation
  • Funding your Master's
  • Current Students
  • Faculty + Staff
  • Alumni + Friends
  • Parents + Family
  • Community + Visitors
  • Bachelor's Degrees
  • Master's Degrees
  • Doctorate Degrees
  • Certificates
  • Arts or Design
  • Business & Industry
  • Communications & Media
  • Data Analytics & Information
  • Health & Wellness
  • Humanities & Social Sciences
  • Music & Performing Arts
  • Public Service
  • Multidisciplinary
  • Still Exploring & Undetermined
  • International
  • Bienvenidos
  • Featured Videos
  • College Tour
  • Tuition & Aid
  • Student Life
  • Search Type Search Search
  • Quicklinks:
  • STUDENT EMAIL
  • UNT DIRECTORY
  • INFO FOR CURRENT STUDENTS
  • INFO FOR FACULTY + STAFF
  • INFO FOR ALUMNI + FRIENDS
  • INFO FOR PARENTS + FAMILY
  • INFO FOR COMMUNITY + VISITORS
  • UNT LIBRARIES
  • UNT CALENDAR
  • JOBS AT UNT

phd in cyber security duration

Information Science Ph.D. With a Concentration in Cybersecurity

Want more info.

We're so glad you're interested in UNT! Let us know if you'd like more information and we'll get you everything you need.

Why Earn an Information Science Ph.D. With a Concentration in Cybersecurity?

The UNT Information Science Ph.D. program with a concentration in Cybersecurity responds to the varied and changing needs of an information age, increasing recognition of the central role of information and information technologies in individual, social, economic and cultural affairs.

The mission of UNT's Information Science Ph.D. program is to provide a center of excellence in graduate education and research. Its primary goals are to:

  • Nurture critical and reflective thinking on the fundamental issues and elements of problems of utilization of information
  • Foster an environment of substantive and productive mentoring and apprenticeship
  • Prepare scholars passionate about the role of information in human affairs
  • Foster cross-disciplinary thinking and research.

Students are recruited to the program from a wide range of disciplines and encouraged to expand and refocus their expertise and skills in cutting-edge areas of information science that cross disciplinary boundaries. The multifaceted nature of information science warrants the focusing of resources, courses, and faculties from a broad range of academic units.

  • Research and publication
  • Pedagogical practices
  • Critical thinking
  • Leadership ability
  • Data analysis

Cybersecurity Information Science Ph.D. Highlights

What can you do with an information science ph.d. with a concentration in cybersecurity.

Graduates of the program are prepared to contribute to the advancement and evolution of the information society in a variety of roles and settings as administrators, researchers, and educators.

Cybersecurity Information Science Ph.D. Courses You Could Take

Learn More About UNT

Explore more options.

Information Data Science Ph.D.

Consumer Behavior and Experience Management Information Science Ph.D.

It’s easy to apply online. Join us and discover why we’re the choice of nearly 47,000 students.

Cybersecurity Guide

Research with impact: Find online cybersecurity PhD programs

In this guide

  • 2024 rankings
  • Steps to get an online PhD
  • Financial assistance
  • Career paths
  • School listings

The digital landscape is changing, and so is higher education. Online PhD programs in cybersecurity are not just trending, they’re revolutionizing the way we cultivate experts in the field.

Whether you’re a student eyeing advanced studies or an institution looking to expand your curriculum, discover why an online PhD in cybersecurity degree is becoming the go-to option for next-level learning and expertise.

Programs to make the public aware of the problem and attract bright young minds to the profession are becoming more widespread and are starting to have an effect.

With the ranks of willing candidates beginning to swell, certificate, training and education programs are in great demand. The number of available degree programs offered by colleges in particular is gaining momentum .

Bachelor’s degrees have become a near necessity for new cybersecurity professionals in recent years. And higher-level positions like chief information security officers (CISOs) often require a master’s degree . 

At present, though, the need for doctorate degrees in cybersecurity is becoming evident.

High-level management positions, higher-education faculty posts, and advanced research initiatives are all growing in demand much more quickly than the numbers of candidates to fill them.

Generally speaking, most doctoral candidates will fill the rapidly expanding and critical roles of educators, consultants, and researchers.

PhD’s (doctor of philosophy degrees) and DSc’s (doctor of science degrees) are designed for these roles.

PhD’s tend to focus on theory and research, while DSc’s study research and technical expertise. With more focus on technical knowledge, DSc’s sometimes continue working directly in practical applications within the field.

On the other hand, DPS’s (doctor of professional studies degrees) are almost entirely devoted to the highest levels of training in hands-on practical knowledge and skills instead of theory and research. 

All three types of doctoral programs are now available to those wishing to advance their careers to the pinnacle of the cybersecurity field.

However, PhD is by far the most commonly offered doctoral cybersecurity degree at present, followed by DSc’s and DPS’s.

The world has a critical need for infosec practitioners, but there is also an equally essential need to expand the capacity of our educational institutions to teach new practitioners.

We also are in dire need of advanced, innovative, strategic thinkers to conduct research in the science of cybersecurity.

Best online cybersecurity PhD programs for 2024

Capitol technology university, nova southeastern university, the george washington university, mississippi state university, marymount university.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

Obtaining an online cybersecurity PhD 

Six steps for choosing an online phd cybersecurity program.

So with all of these options available, as well as a growing number of colleges offering these programs, how can one best decide which direction is right for you? Here is a quick six-step process to help.

1. Self-appraisal : Those looking to expand their knowledge and background in cybersecurity with a PhD have already succeeded in attaining lesser degrees and certifications, and likely have several years of work experience as well.

That education, and exposure to practical applications provide an excellent overall view of the infosec world. All that experience will be critical in deciding exactly which direction to explore in the next phase of a career. The biggest decisions are of two types. 

  • Are online PhD programs the right way to go, or would real-time college be a better choice? 
  • Is a future in research, education or consulting the right path? Or is work in a real-world application a better fit? Picking the correct answer to both questions will take a good bit of introspective research. And the decisions shouldn’t be made without a thorough self-inspection.

2. Admission requirements : As with any college degree, each individual institution offering it will have its own views of what a desirable PhD candidate should look like.

All require at least a BS degree, some require an MS. But there are often loose specifications as to what discipline the degrees must be in, like STEM or computer science. Other demands may include a minimum GPA threshold, usually 3.0 or higher, and GRE test scores. 

Waivers are for the GRE tests are often granted for candidates with strong academic or professional backgrounds. The rest is normally just paperwork, like a personal goal statement, personal and work references, a current resume, and college transcripts.

The primary point here is to pay attention to the requirements of each school under consideration, and whether it will necessitate more time, classwork, certifications, etc. to comply with these demands.

3. Tuition and scholarships : Unless an early career left a PhD candidate with an abundance of cash, money will always be a concern.

Obviously, tuition is the first number to check. But don’t stop with that. There are almost always alternatives for financial assistance available from the school, private scholarship sources, and sometimes government agencies attempting to increase the cybersecurity workforce.

And, of course, government-sponsored and private education loans exist .                                                                                                                            

4. School reputation, course quality and availability : To get the most return out of an investment of time and money in education, it’s always best to choose from schools with the best reputation among cybersecurity professionals.

Specific courses and available concentrations vary from one school to another. Students must therefore make sure a particular school’s special course offerings match their needs and desires. 

5. Centers for Academic Excellence in Cyber Defense : US government intelligence agencies are perhaps the organizations most interested in developing the science and resources needed to conduct the most extensive, advanced and complete cybersecurity operations anywhere.

The National Security Agency ( NSA ) and the Department of Homeland Security ( DHS ) jointly sponsor a program to promote cybersecurity education called National Centers for Academic Excellence in Cyber Defense ( CAE-CD ). NSA conducts extensive reviews and audits of colleges offering cybersecurity college degrees and designates a select few with CAE approval .

Choosing an institution approved by the NSA provides a high level of certainty that the program offered is of the highest quality. It will also give graduates a leg up on securing a career with federal government intelligence agencies. NSA recently published a fact sheet showing 272 CAE-CD approved institutions across the country. 

6. Dissertation research options and faculty : A critical part of any masters or doctoral degree is the dissertation. The exact topic and focus do not need to be determined at the outset of entering the program.

However, it should be possible to know that faculty members and other available resources provide the greatest knowledge, technology and other means of support for the student’s specialty. 

What to look for in an online PhD cybersecurity program

For any given doctoral candidate, enrolling in an online program offering the best and most numerous courses within the cybersecurity specialty desired may be top on the list of criteria.

One should also research the infosec faculty members at the school to determine which and how many have expertise within that students focus.

If possible, a chance to meet these faculty members may be very illuminating. Requesting the opportunity to audit one or more classes will also provide invaluable insight into how courses are structured and how close a fit the tutorial style may be.

Opting to attend a PhD program with the best possible reputation among cybersecurity professionals will help open doors when it comes time to find a post-doctoral job. 

An institution that cultivates an innovative environment and offers the latest in technological capabilities will help maximize the educational experience. It will also be of great educational benefit to attend a college that fosters consultative communications among students and faculty.

Probably the easiest variables to determine are tuition costs and the availability of school offered financial assistance, especially scholarships, grants, other offsets to student expenses.

Online PhD cybersecurity program timeline

Typically, obtaining a doctorate in cybersecurity will require between three and seven years of dedication.

The specific timeline will depend upon the individual college and the level of testing and qualification required for each student to be accepted into a program.

Coursework can take up to three years, depending in part depending upon credits earned and transferred before entering the program. Once courses have been completed, the next step is to design a research project for the dissertation. 

With a well thought out idea in hand, have a chosen faculty mentor assist with fine-tuning the scope, and then approving the research outline.

The rest is extensive research and then writing the dissertation, while all along consulting with a faculty mentor. This phase can take two or more years, sometimes in excess of five years. 

The length of time devoted to completing a dissertation will depend in part on the amount of time the candidate is able to devote to the research required.

Once the dissertation is complete, student will schedule a board review and present their research to faculty members to attain the final award of their doctoral degree.

Online PhD cybersecurity tuition and scholarships

Don’t be scared off by tuition rates at any school.

Pick the best academic environments for the degree and specialty desired first, then see what can be done to mitigate the cost.

Tuition rates

The Cybersecurity Guide team recently took a look at the 14 programs in the US that offer an online cybersecurity PhD program in order to get a better sense of what tuition looks like at these programs. All figures below are based on out-of-state tuition rates.

$32,940 is the most affordable online PhD program and its available at the University of Cumberlands.

$56,004 is the average cost of the 14 online cybersecurity PhD programs.

$85,248 is the highest tuition and is at the University of North Texas.

There are almost always several options to consider. Some schools have work-study options where students can take classes for a semester or two, then work in the industry for a time. This provides a balance of academics and practical experience, and also income to offset tuition costs.

Of course, those already working and going to school would not be able to utilize this option. 

Most frequently, scholarships, grants and fellowships will be the most accessible financial assistance vehicles.

At present, it seems most scholarships are being directed to undergraduate and graduate students, with less now available for PhD’s.

This is likely to change in coming years as demand for PhD’s is set to expand rapidly. The bulk of scholarships available for PhD candidates at present are provided through individual schools, corporate sponsors, of government agencies. 

Cybersecurity PhD career path

The very nature of doctor of philosophy degree programs means those who complete a PhD will be best suited to academic or theoretical applications of their cybersecurity expertise.

However, other times there are really interesting industry jobs available to PhD holders, especially in research-oriented companies. 

 Typically, these professionals will hold the highest of infosec management positions, such as CISO, information security director, information security manager, or the like.

But many will be destined for advanced investigative research into the cutting edge ideas and technologies being discussed and discovered in the cybersecurity world.

Others will opt for academic posts in higher education. And still others will be employed as consultants to large corporations and/or high leverage government agencies that often have not been able to hire enough cybersecurity employees to adequately satisfy their own needs, or just don’t possess the advanced capabilities that a PhD offers.

Frequently asked questions

An online PhD in cybersecurity is an advanced academic program that allows you to earn your doctorate remotely, focusing on research and expertise in cybersecurity.

Online programs offer flexibility, making it easier for working professionals to balance studies with other commitments. Plus, you can access top-tier faculty and resources from anywhere.

The duration varies but expect to spend 3-7 years, depending on the program and your pace of study.

Graduates often pursue roles in academia, research, or high-level positions in corporate cybersecurity departments.

Yes, most employers consider an online PhD in cybersecurity as valuable as an on-campus degree, provided it’s from an accredited institution.

While convenient, online programs may lack some networking opportunities and face-to-face interactions found in traditional settings.

School listings for online PhD in cybersecurity

As is any course of study, attending school through an online college affords maximum flexibility for students with demanding lives. Whether the limiting factor is work, family, health restrictions or other reasons, a flexible online doctoral program permits PhD candidates to work toward a goal on their own time. 

Below is a complete list of schools offering online PhD programs that features current and comprehensive information for an easy side-by-side comparison.

Colorado Technical University

Dakota state university, marymount university, school of technology and innovation, national university, naval postgraduate school, nova southeastern university, college of computing & engineering, the university of fairfax, the university of the cumberlands, university of north texas, university of tulsa.

  • 1-800-NAT-UNIV (628-8648)
  • Bachelor of Arts Degree in Early Childhood Education (BAECE)
  • Bachelor of Arts in Early Childhood Development with an Inspired Teaching and Learning Preliminary Multiple Subject Teaching Credential (California)
  • Bachelor of Arts in English
  • Bachelor of Arts in History
  • Master of Arts in Social Emotional Learning
  • Master of Education in Inspired Teaching and Learning with a Preliminary Multiple and Single Subject Teaching Credential and Intern Option (CA)
  • Master of Arts in Education
  • Master of Early Childhood Education
  • Education Specialist
  • Doctor of Education
  • Doctor of Philosophy in Education
  • Doctor of Education in Educational Leadership
  • Ed.D. in Organizational Innovation
  • Certificate in Online Teaching (COT) Program
  • Online Medical Coding Program
  • Building Our Team Through Community Policing
  • Inspired Teaching and Learning with a Preliminary Single Subject Teaching Credential
  • Inspired Teaching and Learning with a Preliminary Multiple Subject Teaching Credential and Internship Option (California)
  • Preliminary Administrative Services Credential (CA Option)
  • Preliminary Education Specialist Credential: Mild/Moderate with Internship Option (CA)
  • All Teaching & Education
  • Associate of Science in Business
  • Bachelor of Business Administration
  • Bachelor of Science in Healthcare Administration
  • Bachelor of Arts in Management
  • Master of Business Administration (MBA)
  • Master of Public Health (MPH)
  • Master of Science in Data Science
  • Master of Public Administration
  • Doctor of Criminal Justice
  • Doctor of Philosophy in Organizational Leadership
  • Doctor of Business Administration
  • Doctor of Philosophy in Business Administration
  • Post-Baccalaureate Certificate in Business
  • Post-Master's Certificate in Business
  • Graduate Certificate in Banking
  • Certificate in Agile Project Management
  • All Business & Marketing
  • Bachelor of Science in Nursing (BSN) (California)
  • Bachelor of Science in Nursing (BSN) Second Bachelor Degree (California)
  • Bachelor of Science in Clinical Laboratory Science
  • Bachelor of Science in Public Health
  • Master of Science in Nursing
  • Master of Science in Health Informatics
  • Master of Healthcare Administration
  • Doctor of Nurse Anesthesia Practice (DNAP)
  • Doctor of Health Administration
  • Doctor of Nursing Practice in Executive Leadership
  • LVN to RN 30 Unit Option Certificate
  • Psychiatric Mental Health Nurse Practitioner Certificate
  • Family Nurse Practitioner Certificate
  • Emergency Medical Technician Certificate
  • All Healthcare & Nursing
  • Bachelor of Arts in Psychology
  • Bachelor of Arts in Integrative Psychology
  • Bachelor of Science in Criminal Justice Administration
  • Bachelor of Arts in Sociology
  • Master of Science in Applied Behavioral Analysis Degree
  • Master of Arts Degree in Counseling Psychology
  • Master of Arts in Consciousness, Psychology, and Transformation
  • Doctor of Clinical Psychology (PsyD) Program
  • Doctor of Philosophy in Marriage and Family Therapy
  • Doctor of Philosophy in Psychology
  • Doctorate of Marriage and Family Therapy
  • Graduate Certificate in Trauma Studies
  • Post-Master's Certificate in Psychology
  • Post-Baccalaureate Certificate in Applied Behavior Analysis
  • Pupil Personnel Services Credential School Counseling (PPSC)
  • University Internship Credential Program for Pupil Personnel Services School Counseling (California Only)
  • All Social Sciences & Psychology
  • Bachelor of Science in Cybersecurity
  • Bachelor of Science in Electrical and Computer Engineering
  • Bachelor of Science in Computer Science
  • Bachelor of Science in Construction Management
  • Master of Science in Cybersecurity
  • Master of Science in Computer Science
  • Master of Science in Engineering Management
  • Doctor of Philosophy in Data Science
  • Doctor of Philosophy in Computer Science
  • Doctor of Philosophy in Technology Management
  • Doctor of Philosophy in Cybersecurity
  • All Engineering & Technology
  • Associate of Arts in General Education
  • Bachelor of Arts in Digital Media Design
  • Bachelor of Arts in General Studies
  • Master of Arts in English
  • Master of Arts in Strategic Communication
  • Foreign Credential Bridge Program
  • All Arts & Humanities
  • Graduate Certificate in Forensic and Crime Scene Investigations
  • Bachelor of Public Administration
  • Bachelor of Science in Homeland Security and Emergency Management
  • Minor in Business Law
  • Master of Criminal Justice Leadership
  • Master of Forensic Sciences
  • Master of Science in Homeland Security and Emergency Management
  • Doctor of Public Administration
  • College of Law and Public Service
  • All Criminal Justice & Public Service
  • Paralegal Specialist Certificate Corporations
  • Paralegal Specialist Certificate Criminal Law
  • Paralegal Specialist Certificate Litigation
  • Associate of Science in Paralegal Studies
  • Bachelor of Arts in Pre-Law Studies
  • Bachelor of Science in Paralegal Studies
  • Juris Doctor
  • Associate of Science in Human Biology
  • Associate of Science in General Education
  • Bachelor of Science in Biology
  • Bachelor of Science in Mathematics
  • All Science & Math
  • Program Finder
  • Undergraduate Admissions
  • Graduate Program Admissions
  • Military Admissions
  • Early College
  • Credential & Certificate Programs
  • Transfer Information
  • Speak to an Advisor
  • How to Pay for College
  • Financial Aid
  • Scholarships
  • Tuition & Fees
  • NU offers a variety of scholarships to help students reduce their financial burden while focusing on achieving their goals. Explore Scholarships
  • Colleges/Schools
  • University Leadership
  • Office of the President
  • Academies at NU
  • Course Catalog
  • Accreditation
  • Workforce and Community Education
  • President’s Circle
  • Board of Trustees
  • NU Foundation
  • Military & Veterans
  • Coast Guard
  • Space Force
  • National Guard & Reservist
  • Military Spouses & Dependents
  • Military Resources
  • NU proudly serves active duty and Veteran students from all branches of the military — at home, on base, and abroad. Military Admissions
  • Online Degrees & Programs
  • Consumer Information
  • Student Login
  • Graduation Events
  • Student Portal
  • Student Bookstore
  • Student Resources
  • Dissertation Boot Camp
  • Show your NU pride and shop our online store for the latest and greatest NU apparel and accessories! Shop Now
  • Request Info
  • Our Programs

close up of man's face side eyeing

PhD in Cybersecurity Specialization

No residency, no group work, 100% online learning, phd in cybersecurity overview.

As organizations produce more and more data – and stake their future on its security – the risks associated with possible data theft and other malicious interventions have become ever greater. NU’s Cybersecurity specialization in Technology Management will prepare you to take a leadership role in helping thwart hackers and other security breaches. In this program, you will be encouraged to think outside of the box as an innovation leader who stays one step ahead of those dedicated to breaching security. Our PhD Cybersecurity specialization will prepare you for a variety of technology leadership roles in both government and private organizations. Upon graduation, you will be well prepared to anticipate and mitigate risks in managing and deploying data-intensive systems.

Unmatched Flexibility

NU offers weekly course starts, no scheduled lecture hours, no group assignments, weekly assignments, and the ability to schedule courses around your personal and professional obligations.

100% Doctoral Faculty

No matter the degree level you pursue, you can rest assured that you will be mentored by doctors in your field of study.

One to One Engagement

You won’t have to fight for face time as one of many within a classroom. At NU, you’ll have the opportunity to interact one to one with your professor, receiving personalized mentoring.

Course Details

Credit Hours : 60

Courses: 20

Estimated Time to Complete: 50 months

*Credit hours and courses reflect new students meeting credit requirements and utilizing no transfer credits. Est. Time of Completion reflects new students following the preferred schedule designed by the Dean for the program.

PhD in Cybersecurity Program Outcomes

  • Formulate solutions to cybersecurity problems
  • Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale
  • Manage legal, ethical, and security risks in technology-based systems
  • Explain concepts and arguments associated with cybersecurity
  • Evaluate an organization’s maturity in protecting its information infrastructure

Finish Your Dissertation!

Dissertation Completion Pathway (DCP) is a 100% online pathway helping students “All But Dissertation” finish their doctoral degree.

  • Block transfer of credit from your previous institution
  • Flexible monthly start dates
  • Highly trained faculty providing feedback each week on your dissertation
  • Strategic support and targeted resources to help you finish

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

Search the site

Modal window with site-search and helpful links

Featured Programs

  • Business and Management
  • Computer Science
  • Teaching and Credentials

Helpful Links

  • Admissions & Application Information
  • Online College Degrees & Programs
  • Student Services
  • Request Your Transcripts

Terms & Conditions

By submitting your information to National University as my electronic signature and submitting this form by clicking the Request Info button above, I provide my express written consent to representatives of National University and National University affiliates (including City University of Seattle) to contact me about educational opportunities. This includes the use of automated technology, such as an automatic dialing system and pre-recorded or artificial voice messages, text messages, and mail, both electronic and physical, to the phone numbers (including cellular) and e-mail address(es) I have provided. I confirm that the information provided on this form is accurate and complete. I also understand that certain degree programs may not be available in all states. Message and data rates may apply. Message frequency may vary.

I understand that consent is not a condition to purchase any goods, services or property, and that I may withdraw my consent at any time by sending an email to [email protected] . I understand that if I am submitting my personal data from outside of the United States, I am consenting to the transfer of my personal data to, and its storage in, the United States, and I understand that my personal data will be subject to processing in accordance with U.S. laws, unless stated otherwise in our privacy policy . Please review our privacy policy for more details or contact us at [email protected] .

By submitting my information, I acknowledge that I have read and reviewed the Accessibility Statement . 

By submitting my information, I acknowledge that I have read and reviewed the Student Code of Conduct located in the Catalog .

National University

Chat Options

phd in cyber security duration

School of Engineering, Computing and Mathematics

PhD Cyber Security

Duration
Course type

Full-time, Part-time route available

Study location Plymouth

Cyber security is a fundamental requirement for all users of technology – helping to protect organisations and people from a significant, wide variety and constantly evolving threat. This ever-changing threat landscape requires constant innovation in the technologies that provide protection.

Course details

Programme overview.

  • This full time or part time doctoral programme is suitable for people who have a particular research question or topic in mind, and wish to explore this through independent study in order to produce an original contribution to the subject. If you aspire to a research career this is the most appropriate research degree to undertake. You will be guided by a small supervisory team of academic experts under the direction of a Director of Studies. You will be expected to fully engage with skills development and training and to present your research in a range of scholarly contexts. Your PhD will be assessed via submission of either a written thesis (up to 80,000 words), or one that combines critical writing with artistic, creative and/or professional practice, and a viva voce (an oral examination). For full details of what doing a PhD entails at the University of Plymouth, please visit our postgraduate research degrees pages . 

Entry requirements

Fees, costs and funding, how to apply.

  • ) Apply online
  • / Contact us
  • ; Info for applicants
  • 6 Studentships

The Doctoral College is able to answer any questions you may have about applying for or undertaking a postgraduate research degree at the University of Plymouth: [email protected]  or +44 1752 587640 . For initial enquires or questions, please contact Professor Nathan Clarke   who will liaise with you and the appropriate member of academic staff to discuss your background and work towards producing the prima facia case.

The PhD Cyber Security programme is an opportunity to immerse yourself in a programme of study that will lead you to making a significant novel contribution to knowledge. Supported by the Centre for Cyber Security, Communications and Network Research (CSCAN) and our internationally recognised academics, candidates will undertake a body of research focused upon a targeted area of cyber security, publish papers and contribute to the wider community and body of knowledge.

Cyber security news

  • University and International Maritime Organization hold annual cyber symposium 9 November 2023
  • University strengthens cyber security links across Australia 5 October 2023
  • University and BMT join forces to improve cyber security in the maritime sector 2 August 2022
  • First real-world study shows the potential of gait authentication to enhance smartphone security 10 December 2021
  • Maritime cyber innovation wins at UK government’s cyber security event 19 May 2021

More related news

Almost 300 leading global figures in maritime cyber security met at the IMO Main Hall to discuss some of the key cyber challenges facing the global shipping industry

Dr Abdulrahman Alruban

Assistant Professor at Majmaah University, Saudi Arabia Artificial intelligence consultant at MMG labs, Spain (part-time)

Dr Abdulrahman Alruban

My PhD research was about developing a pioneering algorithm able to link individuals with digital objects that they interact with (e.g. images/documents) leveraging biometric features. The project resulted in five scientific publications and granted a patent to protect the novelty of the developed system. 
My experience at the University of Plymouth is unforgettable, as having an excellent supervision team led by Professor Nathan Clarke has dramatically developed my knowledge and research skills in the domain of cybersecurity and biometrics. The University gave me the opportunity not only success in my research but also participating in teaching, training activities. Resulted in getting a teaching certificate and become a module leader. Not only I who loved living in Plymouth city but my family also loved it! From nice public schools to sports centres, national reserves with beautiful rivers made my family loved it.

Dr Shahlaa Mashhadani 

PhD: Image Analysis in Digital Forensics  

Shahlaa Mashhadani graduated with a PhD in Cyber Security and is now working for Baghdad University as an academic lecturer in a computer science department in Iraq. 

“My project automated the identification and extraction evidence from multimedia content to reduce the time and investigator’s cognitive load to solve a crime. Studying PhD in the University of Plymouth has helped me improve my academic skills and knowledge in my field. Without this experience, I would have not been at this stage right now. Moving to Plymouth has really improved my English language and I got to see a whole different life. The people over there were very welcoming, kind and supportive”.

Dr Shahlaa Mashhadani

"I was working as a Lecturer at School of Computing and Mathematics at University of Kufa (Iraq). I moved to Plymouth to study a PhD that concentrated on securing smartphones by using the rich sensing capabilities of the wearable devices. There is a potential invention to use these devices for designing a novel health care model that provides comprehensive and continuous medical care to patients with a goal to obtain maximal health outcome using the patient’s biometric information (e.g. skin temperature, heartrate, and acceleration).
The starting of my academic was very difficult and I decided to suspend my study and back home. Then everything was fine as my supervision team were very patient, kindness, supportive and have a great impact on my career. I had the opportunity to improve my skills (English, academic writing, presentation skills). Plymouth is a nice place to live and being able to network with others."

Dr Neamah Al-Naffakh

PhD: Activity-Based User Authentication Using Smartwatches

Dr Neamah Al-Naffakh

Centre for Cyber Security, Communication and Network Research (CSCAN)

Improving emergency service incident responses. Sharing space-data. Fighting cybercrime. The Centre for Cyber Security, Communication and Network Research (CSCAN) is driving technological advances that are changing our world for the better.

Cyber security concept. Network protection.

Dedicated laboratory facilities

As well as accessing our standard computing facilities , you’ll be able to make extensive use of a 42-seat dedicated security and digital forensics laboratory, purpose-built to represent a range of network topologies and monitoring conditions.

Dedicated lab facilities in Smeaton

Professor Nathan Clarke

Professor in cyber security and digital forensics.

Professor Kevin Jones Deputy Vice-Chancellor - Research and Innovation

Professor Kevin Jones

Deputy vice-chancellor - research and innovation.

Dr Bogdan Ghita Associate Professor

Dr Bogdan Ghita

Associate professor.

Dr Ji-Jian Chin Lecturer in Computer Science

Dr Ji-Jian Chin

Lecturer in computer science.

Dr Hai-Van Dang Lecturer in Cyber Security

Dr Hai-Van Dang

Lecturer in cyber security.

Dr Kimberly Tam Associate Professor in Cybersecurity

Dr Kimberly Tam

Associate professor in cybersecurity.

Dr Rory Hopcraft Lecturer in Cyber Security

Dr Rory Hopcraft

Meet our school technical staff  , funding for postgraduate research students.

Coastal Processes Research Group Perranporth beach

Doctoral College

Find out more about the Doctoral College and the support it offers students, supervisors and examiners of postgraduate research at the University of Plymouth.

Postgraduate research students listening to a talk

Online PhD in Cyber Security Degrees

Cybersecurity Degrees » Online Cybersecurity Degree Programs » Online PhD in Cyber Security Degrees

Consider a sponsored online program currently accepting applicants.

School Program Admissions

Click to see sponsored 100% online cybersecurity programs currently taking applicants for 2024 .

Doctorate-level degrees in cybersecurity provide advanced knowledge and valuable research opportunities to professionals that are looking at some of the highest positions in their industry. This type of education is also extremely valuable to professors and researchers that are looking to continue their studies even after the completion of this program. These further studies will lead to academic research papers and innovation in the field of cybersecurity.

Why consider a doctorate level cyber degree?

Obtaining a Doctor of Philosophy, or PhD, gives working professionals the skills needed to research and develop new security measures and the expertise to maintain the information technology sector of an organization.

Having the ability to do this online is convenient for those that are looking to gain an education while continuing their career path, but there are many programs that require on-campus residencies to prepare students or to present their final dissertations. Various degrees will emphasize either practical solutions to cybersecurity issues or finding new innovations through theory and historical development of protecting vital information.

What Can You Do With a PhD in Cyber Security?

Receiving the high-level graduate degree within cybersecurity opens up the entire information technology industry. There is a significant need for experts that can fend off data breaches and internet attacks to a company's network and retrieve sensitive information, such as personal client medical records or consumer transactions with exposed payment methods.

Ensuring that communication is secure has only become more important as people continue to rely on the transfer of information on various devices and apps constantly every day.

There are variations of the doctorate that students can study to receive specific education, and it revolves around the solution to industry problems within the cybersecurity. Those receiving the discipline directly will typically apply practical solutions directly to the company they represent. A Doctor of Philosophy, or PhD, may explore specific topics in network security or computer science, and education revolves around theory and how to find solutions to issues like cyber attacks through research and development.

After completion of a doctoral program, graduates should be able to solve complex issues within the company or organization they represent. They have gained the advanced and expertise knowledge in a particular sector and should be able to deal with any cybersecurity issues that arise. Ultimately, their goal is to improve cybersecurity systems and to help them protect organizations more efficiently on a national and/or global scale.

Online PhD in Cyber Security Degree Availability

Many online-based institutions that offer programs within computer science and cybersecurity also feature accredited doctorate degrees. Students can expect to find disciplines directly in cybersecurity or in a similar field, such as information assurance or security in information technology. Even though the curriculum may be fully available online, each institution has their own unique requirements when it comes to presenting final dissertations or holding on-campus residencies.

When reviewing online programs, it is important to consider institutions that have been designated as a National Center of Academic Excellence by the Department of Homeland Security and the National Security Agency. This shows that the program has been reviewed alongside a rigid criteria to ensure that students are fully prepared to enter into the field of cybersecurity. Programs hold accreditation in specific categories, such as cyber defense education, cyber defense research, and cyber operations.

What to look for in a Doctorate program

There are very few programs available online where students can fully complete a PhD within cybersecurity. Many programs require the student to complete on-campus residencies that will give them the opportunity to meet faculty members and students. During these times, they may also work on their dissertation, and they must complete a defense of their dissertation in front of faculty members to show their expertise on the particular topic.

Choose a research discipline

While there are a limited amount of programs that specifically have a discipline in data science, this can often be found as a specialization within disciplines such as Computer Science or Computer Engineering. Other similar concentrations include Information Assurance, Information Systems Security, and Digital Forensics. Information Assurance focuses on the validation and authenticity of data within an organization, and Digital Forensics focuses on the investigative process to solve digital-based crimes in a court of law.

Be prepared for some online courses but on-campus requirements

Students should prepare for online coursework that blends with on-campus requirements if they are considering a doctorate degree with an online format. An alternative to this process is finding an online Master's degree in a similar discipline that can be used to count toward the PhD. There is plenty of overlap in these programs, and this flexibility may allow for students to switch over from a Master's degree to a PhD with high academic merit.

Online Requirements and Expectations

Most PhD programs will require the student to meet on-campus at certain times of the program, such as once per year, but these are not lengthy requirements to satisfy. Residencies will typically last from a weekend to a full week and mostly consist of the student working on their dissertation. Any lab sessions or courses that require application of what is learned can generally be accomplished in a virtual setting or at the professional's place of work if applicable.

In order to complete online courses, students will need to verify that they have the proper setup to run the learning management system used by the university. This typically requires a Windows or Mac operating system that runs on a desktop or laptop computer. For some course materials, this can be accessed by a mobile device, such as a smartphone or tablet, but not all work can be completed in this format.

Additional technical requirements include having access to high-speed internet in order to download or stream on-demand lectures. A webcam and microphone may be required for courses that require students to attend lectures on a live basis. Other applications, such as Microsoft Office, web browsers such as Google Chrome or Mozilla Firefox, anti-virus software, and Adobe Acrobat Reader may be needed depending on the university.

What Are the Steps to Getting This Degree?

Doctorate degrees for cybersecurity generally require anywhere from 60 to 80 credit hours to complete, which can span from three to five years. Most of the program is dedicated to core courses and a concentration in cybersecurity if available. There may be some credit hours needed for electives that may either be part of the discipline being pursued or free electives to customize the program to fit an industry or particular career needs.

Around a third of most PhD programs will feature dissertation requirements. A dissertation is a research project with a specific focus on a topic in cybersecurity, such as a problem that is plaguing a certain industry. Once a topic is suggested and approved by a program faculty member, students are able to pursue the writing project and they will have to defend their dissertation at the end of the program.

In addition to the dissertation, multiple exams may also be needed to further expand on all the skills and concepts learned in the program. A qualifying exam will ensure that students are able to continue on with the PhD and begin their process with the dissertation. The comprehensive exam tests all the skills and concepts that the student has learned, which is usually completed at a separate time than the dissertation defense.

It is not a requirement to have a Master's degree for many computer science-based doctorate programs. Students can typically transfer over their credit from a Master's program if they choose to pursue a doctorate degree at a later date. This can cut the doctorate program nearly in half for students, decreasing the time commitment required and academic costs.

To gain the PhD degree at the end of the program, students will need to pass all examinations and successfully defend their dissertation. Many programs require that the student also maintains at least a 3.0 GPA during their studies. With many courses providing advanced topics, students must maintain a high level of academic achievement in order to successfully complete the program.

Admission Requirements

Getting into a doctorate program requires the completion of a Bachelor's degree from an accredited institution with high academic marks. Typical requirements for a Master's degree are holding a 3.0 cumulative GPA in their undergraduate studies, or this was achieved in the final 60 credit hours of their studies. For a PhD, this can jump to a GPA requirement of 3.3 or 3.5 overall.

Prospective students are not limited to this GPA requirement, but they may only receive conditional admittance into the program. This means they will need to achieve high marks in the first portion of the program in order to continue pursuing the degree. A slightly lower GPA than the requirement can be offset by higher Graduate Record Exam (GRE) scores or additional professional experience in cybersecurity.

Typical Document Requirements for Submission

Depending on the university, applicants will need to send their unofficial or official transcripts that showcase their accomplishments in higher education. If unofficial transcripts are only needed with the application, sending official transcripts are usually required once the student has been admitted into the program. This includes all academic work at various levels, including any certifications that have been earned.

Applicants should send their most updated resume to the university that showcases all of their prior work history and internship experience gained in other programs. Some programs may require a certain amount of work hours to get into the program, or students may need to complete this prior to graduating from the doctorate program. Resumes should include any accomplishments or

Multiple letters of recommendation are typically needed to verify that the student has high levels of accomplishment in this field. They may require some of the letters to be from an academic professor, but another source can be prior supervisors or managers in a professional work place. Applicants should review what specific requirements are needed with the letters of recommendation as they vary based on institution.

Personal essays are a common requirement in the application process, with potential candidates listing out why they have chosen a particular institution for their studies and what career goals they have in the cybersecurity field. These essays may also go into detail about any accomplishments within an industry that the individual has achieved.

Full-Time Versus Part-Time Enrollment for a PhD Degree

Doctorate degrees are often at least twice the length of a Master's degree program, meaning that students typically need between three to five years to complete their studies on a full-time basis. It is recommended by many schools that students pursue these graduate studies on a full-time basis due to the complexity of course content and the amount of time it takes to complete the dissertation and various assignments.

Many PhD degrees are geared for full-time study and may have some complications for those that are looking to pursue the program on a part-time basis. It may be difficult to focus on research projects without full concentration and may impact the quality of the research accomplished. Even on a part-time basis, there may be too much to balance when accomplishing high-level studies and continuing as a working professional.

Instead of completing the PhD along with a part-time job, students may consider looking at graduate assistantships or other positions within the university. This allows individuals to pursue their degree while completing various tasks for professors for a certain amount of hours per week. By accomplishing this, students will receive part or all of their tuition expenses cut and a stipend to pay for other needs.

Part-time study may be accepted at the institution, but students will have to consider the length of time it will take to complete their studies. This will increase the overall costs of the program with additional fees given out for extra years pursuing their degree. There is also a time limit at most universities, requiring students to complete the doctorate program in seven or eight years on average.

Other problems can emerge with completing the program on a part-time basis. In addition to the difficult coursework that requires plenty of focus, it may be a problem to balance struggles that exist in current employment and trying to complete advanced coursework at the same time. There are also limitations in communicating with other faculty members and students for additional help or working on group projects.

Examples of Doctorate Degrees

It is also important to determine that the program has been verified as an accredited institution and the university has been designated as a National Center of Academic Excellence (CAE) from the National Security Agency (NSA) and Department of Homeland Security (DHS). This means that the curriculum has met rigorous requirements under different security topics, such as cyber defense and cyber operations.

Regional accreditation is based on where the university is located and remains a standard when institutions are looking at students for their graduate programs. The six states based in the New England region are accredited by the New England Association of Schools and Colleges. The Southern Association of Colleges and Schools reviews a number of places in the Southeast and along the East Coast, including the states of Florida , North Carolina , Texas , and Virginia .

Online PhD Degrees for Cyber Security

Northcentral university.

This online college based in San Diego, California, has a number of doctorate programs available in technology, including the Doctor of Philosophy in Technology and Innovation Management. Within the doctorate program, there are six specializations to consider, including Cybersecurity. Students should expect to complete the program in the span of 50 months.

A total of 60 credit hours are needed to fulfill degree requirements, and with most courses being worth three credit hours, 20 courses will be taken in the program. 48 credit hours must be completed at the university, which allows for 12 total credit hours to be transferred into the program. Students must complete all courses while maintaining a 3.0 cumulative GPA.

Courses that students can explore in the main program include Computer Networks and Mobile Computing, Statistics with Technology Applications, and Technology Policy and Strategy. The latter course focuses on legal analysis in network security and gives students case study to review and policies that organizations must follow based on federal guidelines. 18 total credit hours are needed for the Cybersecurity specialization, with courses such as Cyber Forensics and Advanced Risk Management.

One of the unique student services the university offers is the Dissertation Completion Pathway, which gives those that were not able to complete their dissertation elsewhere to do so at their institution. This is a shorter program that requires at least 23 credit hours.

Capitol Technology University

Gaining a Doctorate degree in Cybersecurity through the technology institution prepares students for executive roles within the private sector and any government level. There are various electives that can customize the program and give specialty skills and knowledge within the security of health care, information assurance, cybersecurity software development, and strategic management for intrusion detection and eliminating vulnerabilities.

Up to 66 credit hours are needed to complete the curriculum at Capitol Tech, which is based in the Greater Washington DC area and is also available online. Along with dissertation preparation, some courses include Information Assurance Consulting, Advanced Mixed Methods Research, and Special Topics in Human Resource Management. There is a 16-week course that prepares students for the doctoral degree with specialized research for the career path they are pursuing.

Prospective students can apply for the doctorate degree in cybersecurity for the fall and spring semesters. An essay of at least 1,000 words that covers what the student plans to do within the cybersecurity field. Applicants must submit the essay with the application form and a fee, official transcripts, updated resume, and multiple letters of recommendation. More information may be necessary based on the college’s review.

Nova Southeastern University

The College of Computing and Engineering provide a PhD in Cybersecurity Management, which requires 67 credits to complete and is offered in a hybrid format. This means students will be mostly completing coursework and generally interacting with students and faculty members online, but they will have physical meetings once per term at the Fort Lauderdale campus. These are required meetings for students.

Examples of core courses that students will complete include Information Security Risk Management, Secure Systems Analysis and Design, and Human-Computer Interaction. 24 credits are reserved for dissertation studies, and students will also need to complete two doctoral research studies within information assurance. Some of the goals the university has for their graduates are to gain advanced knowledge within cybersecurity and to be prepared to lead and manage cybersecurity teams with strong communication skills and being fully competent of the ethics required.

Students looking for a fellowship opportunity to satisfy financial needs and gain additional experience may be eligible for one of six positions offered by the school. Applicants must submit a reference letter, hold at least a 3.0 cumulative GPA, and are going into a career that involves teaching or research. Recipients are not able to hold a job so they can commit their time to education and research, but the award provides tuition assistance for the duration of the program.

Dakota State University

The Beacom College of Computer and Cyber Sciences offers the Doctor of Philosophy in Cyber Operations, which focuses on advanced topics in cybersecurity. Graduates from the program have gone on to work at organizations such as the Central Intelligence Agency, US Army Intelligence and Security Command (INSCOM), and Carnegie Mellon’s Software Engineering Institute.

Along with the core curriculum and research-driven courses that account for 24 total credit hours, students will need to complete three credit hours of on-campus research seminars. Meeting faculty members, determining a dissertation topic, and finishing dissertation defense is accomplished in this requirement. 25 credit hours are geared toward the dissertation itself, and the remaining nine credit hours are for customizable electives.

Some courses are only available at certain times of the year. For example, dissertation work is available all year long, but Dissertation Preparation is only available in the spring on an annual basis. All students must maintain a 3.0 cumulative GPA, and no more than two C grades are allowed in the entire curriculum or the student will be put on academic probation and eventual dismissal if the grades do not improve.

In order to get into the program, students must hold a Master’s degree from an accredited institution with a 3.0 cumulative GPA or higher. GRE scores are required in the admission process, but these are waived if the student has accomplished a 3.25 cumulative GPA in their Bachelor’s degree. Entry is only available for the fall semester into this program, so applications must be received by May 1st each year.

Colorado Technical University

Students can pursue the Doctorate of Computer Science with an emphasis in Big Data Analytics or Cybersecurity and Information Assurance. This is a program with an expected time of at least three years to complete. There are multiple start times throughout the year providing flexibility for students to enter into the program.

While the curriculum is fully available, there are in-person residencies that are required – two residencies are needed for this program and they are held quarterly in the Denver area. This gives students an ability to meet with other peers in their classes and faculty members one-on-one and there are various events that will aid in dissertations required for the student to complete. Students can maintain their schedule and join discussions with the CTU Symposium mobile app.

The 100-credit hour curriculum consists of the residencies, many levels of Doctoral and Dissertation Research, and various advanced topics within cybersecurity, such as Foundations of Digital Systems Security, Enterprise Security Architecture, and Principles of Research Methods and Design. At the conclusion of the program, students will be presenting their final dissertation and must be approved by a faculty supervisor.

Capella University

An online Doctor of Information Technology (DIT) with emphasis in Information Assurance and Cybersecurity can be obtained through the Minnesota-based institution. Students can also elect to take courses at the Minneapolis campus or pursue a combination of both. The curriculum is divided up into eight core courses and four specialization courses, along with various dissertations and three residency requirements, all requiring four days of attendance.

Two different IT degrees

Capella offers two versions of information technology degrees at this education level – the DIT and the Doctor of Philosophy in Information Technology. The DIT prepares students to solve business problems and to apply what they have learned directly into their career. Having a philosophical approach in the other program explores new theories that can be used to solve these issues instead. While both programs have a difference in solution, there is overlap in the specialization of assurance and cybersecurity.

DIT specialized on cybersecurity

The Doctor of Philosophy in Information Technology features a specialization in Information Assurance and Cybersecurity, giving students the capability to learn advanced knowledge in the field. In addition to five specialization courses, students complete a comprehensive exam that reviews all of the material they have learned, a dissertation spanning a large portion of their studies, and three on-campus residencies.

Typical courses you may take

Courses in the specialization include Enterprise Security Risk Management, Network Security Advances, and System and Application Security Advances. These topics cover the advancement of security and how this has impacted their implementation into company networks. Students do not have the availability to transfer in these courses for the specialization and must be taken through the school. Some specialization courses must be completed through this campus, including System and Application Security Advances and Enterprise Security Risk Management. The latter course has students review academic research and professional reports on risk modeling that impacts managerial decisions. Security advancement courses focuses on improvements in the field and the advantages of improving these processes with new available technology.

What each program is like at Capella

All three on-campus residencies focus on dissertation research, which first begins through an overview in an online course and the student builds upon their research when they meet faculty members and other students. The goal of the dissertation is to build critical thinking skills and the ability to communicate with others to help improve the dissertation, which requires significant research after determining a topic.

GuidedPath is a unique resource available to students that helps them get through the doctorate degree in a more focused process online. They will take between one to three courses during each of the four quarter terms available, which requires 10 weeks to complete. Based on availability and schedule, students will take the courses they have time for and only pay for what they are pursuing.

University of Rhode Island

The College of Arts and Sciences offers a Doctor of Philosophy in Computer Science, which can utilize the graduate certifications available in Cyber Security and Digital Forensics. All courses are available online, with lectures streamed on demand for students to learn at any time of the day, and all lab sessions are completed through the cloud-based infrastructure.

Examples of courses that can be completed and applied to the doctorate degree include Advanced Topics in Network and Systems Security, Advanced Incident Response, and Penetration Testing. Many courses will only be available at certain times of the year, and courses must be followed along a certain path in order to meet prerequisites for the more advanced courses.

Coursework is typically distributed each Friday, meaning students will have a week to complete their assignments and submit them by each Friday, and new coursework will be available on that day. Students have the capability of studying on their own time as long as they continue to meet deadlines.

Applications are accepted for these programs throughout the first half of the year to get admission for the fall, which is required for graduate certification in Cyber Security. Students must have a Bachelor’s degree with an undergraduate cumulative GPA of 3.0 or higher. There is no requirement to submit GRE scores, but other additional needs include two letters of recommendation and a statement of purpose.

On-Campus PhD Degrees for Cyber Security

University of tennessee.

The Tickle College of Engineering offers a few options for cybersecurity studies at the Knoxville campus location. One of the advanced programs is a Doctor of Philosophy in Computer Engineering, with a concentration in Cybersecurity. The amount of credit hours needed depends on if the student has taken a Master’s degree or hold prior academic work in the same discipline or related, such as computer science.

At least 72 credit hours are needed for students that only have a Bachelor’s degree or simultaneously completing a Master’s degree in a similar field through the university. This truncates to 48 total credit hours if they already have a Master’s degree. At least 24 credit hours are earned through taking dissertation courses and completing the research and writing requirements.

The comprehensive exam features both a written and oral segment, which connects with the dissertation, but may have additional writing requirements. Students must have a strong understanding of the topic they have studied and can thoroughly explain many aspects of it while demonstrating competency in communication and critical thinking. At least six months need to separate the comprehensive exam and defense of the dissertation.

Admission requires outstanding work in a Bachelor’s degree for students to be able to jump from the undergraduate program to the PhD program. GRE scores are needed for the admission process and should have been obtained in the last three years. For students that have a Master’s degree, up to six credit hours from courses that match the 400-level and above can be transferred into the program.

Arizona State University

Through the School of Computing, Informatics, and Decision Systems Engineering, students can complete the Doctor of Philosophy in Computer Science with a concentration in Cybersecurity. Students will complete five core courses that explore different aspects of computer science, and there is no ability to transfer credit for those courses unless they have already taken the courses at Arizona State University. Students do not have the capability to duplicate credit between the concentration focus and the core curriculum.

Nine total credit hours will count toward the Cybersecurity specialization. There is an overview of Information Assurance, then students will pick two of the following three courses: Advanced Computer Network Security, Applied Cryptography, or Software Security. 24 total credit hours will go toward both the research and dissertation portion of the curriculum.

Admission requirements include submitting a personal statement that details professional goals and why they are choosing this particular program. It should also feature any research experience that the individual has accomplished personally. In addition, there should be three letters of recommendation validating these accomplishments, from prior professors or professionals in the industry the individual has worked in.

Other needs to get into the program include holding a minimum cumulative 3.5 GPA or higher in the last 60 credit hours of work from the Bachelor’s degree, and this should be similar to the Master’s degree overall if they hold one. Up to 30 credit hours within a different graduate program, such as a Master’s degree, can be used to account for some credit if approved by the program.

Sam Houston State University

A Doctor of Philosophy in Digital and Cyber Forensic Science is available exclusively on campus for students that are looking at cybersecurity careers at the executive level or academic research at an institution. Topics include understanding network and mobile device forensics, ethical and legal issues in cybersecurity, and the basic principles of this field. 85 total credit hours are needed to complete the program for students that only hold a Bachelor’s degree.

Breaking the curriculum down, 52 credit hours are part of the core academic curriculum, 15 credit hours are gained through the dissertation, and the remaining 18 credit hours are for the internship and customizable electives. Examples of elective opportunities include Cloud Computing Forensics, Cryptography and Steganography, and Social Network Forensics.

Counting for six total credit hours, the internship will require 10 weeks of full-time commitment. This is another process to apply what the student has learned to real-time situations, giving them an additional opportunity and potential to network with an organization for improving job potential.

In order to gain admittance into the program, applicants must hold at least a Bachelor’s degree in a similar field from an accredited university, and they must have obtained a 3.5 cumulative GPA or higher. Three letters of recommendation are needed for verification, with at least two of them from faculty members. Other needs include a personal statement with a maximum of 1,000 words, updated resume, GRE scores, and a potential interview may be conducted.

University of Colorado-Colorado Springs

The College of Engineering and Applied Science offers the Doctor of Philosophy in Security, which has been verified by the NSA and DHS as a CAE in Information Assurance Education. In graduating the program, individuals will become an expert in the topic they decide to develop a dissertation on, and they have been able to improve upon their communication skills when presenting findings or working with others collaboratively.

60 total credit hours are needed to complete this program, and half of that credit must be completed with courses that are at the 5000 level or higher. There is an opportunity to transfer in 24 credit hours if the student has completed the Master’s degree previously. Half of the curriculum is dedicated to dissertation development and presentation.

Applicants should have at least a Bachelor’s degree from an accredited institution with at least a 3.3 GPA, and those entering the program with the completion of the Homeland Defense graduate certificate must also have the same GPA requirement. Additional admission materials include having three letters of recommendation, latest resume, and will need GRE scores if they did not complete their education at an accredited university.

Courses that students can choose in this program include Applied Cryptography, Advanced System Security Design, and System Administration and Security. At least three months of cyber operations must be completed in the form of training, internship, or already established professional work. This can be substituted with the completion of a Certified Information Systems Security Professional (CISSP) certification.

Typical Coursework for a PhD Degree

Principles of cyber security.

Explores the basics of cybersecurity features at the executive and management level of an organization, including the latest innovations in the field and various security measures that can be added into information systems. In some cases, students that have already completed a Master’s degree in the cybersecurity field may be able to skip this course as it is also frequent at that education level.

Advanced Risk Management

Analysis of theory when defending information systems in a more complex environment, and what practices are used when implementing these solutions in an organization. Students may learn how to audit these security measures to determine their accuracy and what needs to be improved upon to avoid certain attacks. This can help in preparing recommendations and consider different strategies in established cybersecurity practices.

Security Software Development

Having security measures in place on network servers and database management systems are key to preventing intrusions, but software can also be manipulated and compromised without security. This course looks into the different ways of implementing this type of protection in the software development process. Students may also learn how to identify rogue activities within software to identify potential threats.

Critical Infrastructure

A national government-focused course that emphasizes security measures that are taken to protect the United States’ critical infrastructure. This includes the important industries of public health, transportation, telecommunication, agriculture, electricity, and more. Topics may include the strengths and weaknesses of prior security implementation and how future innovations will change these procedures.

Quantitative and Qualitative Research

Common research methods when analyzing reports and writing the dissertation includes using quantitative and qualitative information. Students will understand the differences between these analysis methods and where to best apply them in their reports. Quantitative data focuses on specific numbers and measurements, while qualitative data focuses on more subjective information that explains these figures.

Intrusion Detection

Professionals must be able to react quickly when an attack occurs on an organization’s network, mitigating disaster and sensitive information that could be compromised. Popular topics in these courses include the various tools that are used in scoping out problems and eliminating them, how to detect vulnerabilities earlier to prevent these situations, and disaster recovery processes once the damage occurs.

Penetration Testing

One of the most popular and impactful ways to determine if a strong security system has been implemented is to mimic similar attacks in a controlled environment. Penetration testing, which can be a position on its own within a cybersecurity team, oversees this event and determines the effectiveness of security that is protecting valuable information.

Cyber Operations

Institutions designated as a CAE and holding an emphasis in cyber operations will often have courses that provide a general overview of the measures taken by security-driven organizations. Topics in these courses can range from the evolution of these processes, such as how to eliminate security threats on mobile devices and cloud-based computing, and the legal and ethical policies that can be implemented.

Dissertation Research

Many doctorate degrees will have courses that prepare students for dissertations, focusing on various studying methods, sources to consider, and helping them pick topics for a proposal that they will be able to defend when presented. These courses may go into creating an outline or framework for the dissertation and look at other example proposals to gain different perspectives or to criticize. Frequently, preparation courses will serve as the platform for students to submit their proposal.

Dissertation Preparation

Many PhD programs will emphasize the dissertation, allocating around one-third or a quarter of the curriculum to the dedication of preparing students for their dissertation writing. These courses may include how to find a topic that works for the researching project and an official process to send this idea in to faculty members, They may also be able to work with professionals in the industry that can help them further their analysis in the topic selected.

Dissertation Presentation

Immediately prior to graduation, students may have the requirement to meet in front of select faculty members to present or defend their dissertation. This process tests the vulnerabilities of the writing where the student should successfully defend what they have gathered. Any preparation classes for the presentation may focus on improving presentation material and studying further information to prepare for questions.

Information Assurance

This is the specific term used when managing and securing sensitive data within the organization’s network and system. Assurance of the information means that it remains confidential and can only be accessed by authorized parties. Many degrees will have this term within the discipline, and these courses can serve as an overview of information security and to become exposed to real-world situations.

Software Assurance

Doctorate studies will focus on the development and stability of cybersecurity software, with uses of identifying potential threat and analyzing risk. Students typically assess the performance of security software, measuring their stability and how well they protect systems from attacks, and various ways that it can be implemented into networks.

Applied Research Methods

Explores various research methods and how to perform them to help students with research for their dissertation and other studies. Topics may consist of how to read complicated information, creating visualizations from raw data or cleaning it for easier organization, surveying and interviewing subjects to gain perspective, and how to use software tools for researching. Coursework typically consists of researching and report writing to demonstrate proficiency in these skills.

Network Security

Courses covering network security at the doctorate level will have an in-depth look into history and various theories involving the revolutionary technology. Topics include the advancement of network security in the industry and how this impacts various organizational networks, the benefits and disadvantages of sending sensitive information online, and encryption methods to ensure that data is kept secure when being transferred from one place to the other.

Careers and Associations

Having a doctorate in cybersecurity means that a professional has explored theories and case studies within cybersecurity, giving them expert knowledge in the field that they customized their degree toward. This makes them beneficial as information security consultants in the organization they work for. They help review the network for any vulnerabilities and they will provide information on the latest technological innovations and how to implement them for a seamless transition.

In general, IT consultants help the organization gain perspective on the strengths and limitations of the department and aids in the improvement of management and supervising team members. They may recommend technological needs based on employee and client feedback, or creating reports based off performance data and expected outcomes should the organization improve these areas.

Higher education can also give graduates with professional experience an edge in becoming a director of information technology. One of the frequent requirements when managing the entire technology infrastructure of a company is to ensure that the network security is free from vulnerabilities and that there is a protocol in place in case intrusions take place. Directors will often make the final decisions in hardware and software additions and the coordination of teams and managers.

IT directors fall under the position of computer and information systems management through the US Bureau of Labor Statistics. Average salary for this position is is approximately $142,530 , with those working within finance and computer systems design receiving above the average. The top 10 percent receives over the $200,000 mark while the lowest 10 percent sees $85,380 when salaries are reviewed across the nation.

Tuition Costs for a PhD Degree in Cyber Security

Tuition rates will range widely based on the institution that a student selects to study their cybersecurity education, and if they are a resident in the state of the university. Smaller institutions or online-based colleges will generally be cheaper than more established institutions. When adding up full tuition for a full academic year, along with various student fees, full costs can be between $20,000 up to $50,000 per year.

For example, at Capella University, tuition for the PhD in Information Technology is $965 per credit, or $5,000 total in each quarter. The comprehensive exam and dissertation sessions are $2,895 per quarter. Unlike some programs, there is no capability to transfer credits into this program, so students will have to pay for the full tuition, which is 90 quarter credit hours.

Adding up the number of years it can take to complete a PhD program, it can be very costly to pursue this type of education. Luckily, there are many ways to bring these costs down in what essentially is an investment into a job opportunity that pays more than typical positions while just holding a Bachelor’s degree.

Ways to Lower PhD Costs for Students

If pursuing the program on a full-time basis, students can consider federal student loan options if they qualify and have any remaining funds from their prior education. Part-time education is generally not acceptable for federal student loans as this requires full-time enrollment and pursuing a certain number of credit hours in a given term. Personal loans provide another option to receive funding for school, but this may have considerably higher interest rates.

In some cases, an employer may pay for the employee to receive their PhD degree in cybersecurity. This requires a commitment from the individual to stick with the company for an extended period of time, and they will likely see an upgraded role in the organization if they successfully complete the program. If the individual leaves shortly after receiving the degree, they may be responsible for paying some of this tuition.

Assistantships are frequently the best opportunity for students to receive tuition aid for their education. These are competitive positions that can pay for some or all of a student’s tuition expenses, and provide additional stipends on a monthly basis, or in each term. Assistantships will require a certain amount of hours for students to complete tasks for faculty members in addition to their studies.

Scholarship Options for a PhD Degree

For students that have excelled in their prior academics, there may be an option to apply for a scholarship to cut down on costs. While there are few scholarships that pay for full tuition, this can provide some relief for students in multiple years of their education. In addition to rewarding those with solid academics, scholarships are also available for those in difficult financial situations or are part of an underrepresented demographic.

Some graduate college-based scholarships provide automatic entry for students that are administered into the program. Select students will receive an award simply based on being admitted into a high-level program. These are typically smaller awards that lower tuition rates and there are no restrictions for these opportunities.

For the majority of scholarships that are distributed by the school or an association that is promoting cybersecurity, students will need to submit a writeup that details why they are the best candidate for the scholarship and/or list the achievements that they have accomplished so far in their career. They must also submit proof of the criteria needed to receive the scholarship award.

Examples of Cyber Security Scholarships

The National Science Foundation has a Graduate Research Fellowship Program that is geared toward students that are going after graduate-level programs within the sectors of science, technology, engineering, and management – also known as the STEM field. A total of $46,000 is awarded to an individual, which provides a $34,000 three-year stipend and $12,000 deduction in tuition that is given to the institution.

The National Defense Science and Engineering Graduate Fellowship Program also provides aid for students that are pursuing a STEM field. Students can receive up to three years of educational aid, and it covers the tuition and provides a stipend. One requirement that students must uphold is working at a laboratory session with the Department of Defense, and they need to be able to accept the full awards.

Both of these scholarships not only require students to be in the STEM field, but they must be United States citizens or nationals to be eligible. They must show proof of citizenship when applying for these awards, and they must hold strong academic standing. Eligibility for the latter program opens up in the final year of undergraduate studies.

What Can You Do With a PhD Degree in Cyber Security?

When considering the pursuit of a doctorate degree, students must determine if it is worth the time and money for their cybersecurity career opportunity. Entry-level positions only require the completion of an undergraduate degree in this discipline, or a similar discipline such as computer science or information assurance. Advanced and senior positions can be obtained with a PhD, along with more research-focused positions in academia.

PhD degrees are geared for individuals that are looking at managerial and executive positions at industries that are looking to implement or improve their cybersecurity practices. They must understand advanced processes and be able to determine what they should do for their existing systems, or what is compatible with their information systems if they are moving to cloud-based solutions in the future.

Director positions review the analysis of network and computer security practices and make significant decisions on how the company should continue forward. They must follow the latest innovations in security measures that are being improved upon in order to keep their systems secure. It is important to keep the information technology sector updated with the latest security measures and to stay ahead of the latest hacking attacks.

Academic positions will offer more researching opportunities beyond completing the dissertation at the end of the PhD degree program. Further reports can help improve the entire field of cybersecurity when published in academic journals, or these can provide a specific focus within an industry, such as health care or the finance sector. They can also use this knowledge as a professor in a technology or engineering course within cybersecurity.

Career Opportunities

Looking at specific jobs in cybersecurity while holding a PhD degree, being a security engineer is a popular position to consider with the advanced knowledge needed in developing the architecture of an information system and making sure it is secure. These are more for advanced or senior positions that require numerous years of professional experience or hold advanced certification, like the CISSP, which is geared more toward individuals looking at management positions.

Another popular position is chief information security officer , which the job title can be slightly alternative based on the organization they are working at. Bigger enterprises will have specific designations for a CISO, but some smaller companies may only have a chief technology officer that deals with the security measures that are implemented into the organization.

When disaster strikes at an organization, the CISO is usually responsible for working with federal government or legal workers in order to determine what the next steps are needed after a data breach occurs. They are also responsible for moving forward with disaster recovery measures and working with any clients or employees that are affected. In addition, they are usually responsible for making final decisions on new implementations in the information system security processes.

According to the US Bureau of Labor Statistics , information security analyst make a mean annual wage of $104,210 across the United States. This is slightly higher for those working directly in computer systems design, which is geared for those with more experience in computer engineering and architecture.

At the higher spectrum of estimated wages in this position, workers are making an average of $158,860 among the top 10 percent. Some of the top states to consider when looking at the highest wages are New York, Virginia, and California. The highest state overall is New York with over 7,000 workers represented and over $121,750 being made on an annual basis.

In addition to the state of Virginia having the most employment opportunity in any state with over 15,000 employed, the annual estimated wage across the state is at $114,760. For the District of Columbia alone, there are 2,000 workers represented and estimated $119,160 made annually. This also makes the largest metropolitan area in terms of employment when adding in the cities of Arlington and Alexandria with Washington DC.

University of Wisconsin Whitewater - Online

  • Request Info
  • Grad School? Apply Now
  • Bachelor's? Apply Here

It’s the enemies we can’t see that are the most dangerous.

It’s the enemies we can’t see that are the most dangerous.

  • Online Degrees
  • Master's Programs

Online Master of Science in Cybersecurity

Specialized degree to protect our digital world..

Drawing on faculty from both the information technology and the computer science programs at UW-Whitewater, the Master of Science in Cybersecurity is an interdisciplinary degree that will allow students to develop deep expertise in current cybersecurity issues. All courses in the program are focused on cybersecurity, and the curriculum has been designed to align with the National Centers of Academic Excellence (CAE) program, which is jointly sponsored by the Department of Homeland Security and the National Security Agency. The goal of the CAE program is to reduce vulnerability in our national information infrastructure by promoting higher education and expertise in cyber defense.

Why UW-Whitewater Online?

  • Asynchronous program lets you learn day or night
  • Build connections through online assignments and discussion boards
  • Strong alumni network
  • AACSB Accredited - 50 years of continuous accreditation

Fully Online

No requirements to come to campus.

CAE Aligned Curriculum

Aligns with the  National Centers of Academic Excellence  program.

Advanced Skill Development

In current issues.

Kurt Rose, types away on his laptop for online class

The MS in Cybersecurity is a 30-credit program. This program can be started in the spring, summer or fall terms, and at a pace that works best for you. Full-time students can finish in as little as three semesters.

For a comprehensive overview of the program structure and required courses, please refer to the Graduate Catalog . 

Claire Olsen, intently reading tablet, reviewing notes for online class

To qualify for admission to the online master’s program, you must meet graduate admission criteria.

Deadlines vary by term and are subject to change without notice. Accurate and up-to-date admission deadlines can be found on the graduate admission deadlines website .

If you do not meet the graduate admission criteria, please  email us to determine if you could be admitted on a contingent basis.

International students must meet additional criteria and will be evaluated on a case-by-case basis.  Contact us  for information and assistance.

Online Master of Science in Cybersecurity Career

From the theft of personal data to threats against critical infrastructure systems, cybersecurity is a national concern impacting businesses as well as government agencies. Because of these rapidly growing threats, there is a shortage of qualified cybersecurity professionals.

Recent data from CyberSeek —a project supported by the National Institute of Standards and Technology, U.S. Department of Commerce, and National Initiative for Cybersecurity Education—showed that there were nearly 1.2 million persons employed in cybersecurity and that there were over 440,000 additional job openings, while in Wisconsin there were over 11,000 persons employed in cybersecurity and nearly 4,500 additional job openings. 1

In addition, CyberSeek's national data showed the average salary for a Cybersecurity Engineer was $136,000 and the average salary for a Cybersecurity Manager/Administrator was $160,000. 2

1 CyberSeek.org Cybersecurity Supply/Demand Heat Map 2 CyberSeek.org Cybersecurity Career Pathway

online student, Ellen Larson, studies course materials

This graduate program at UW-Whitewater are a superior value at $695 USD per credit for the 2024-25 academic year — whether  you are a Wisconsin resident, an out-of-state student, or international student within the major. Additional fees and non-resident tuition may apply to other courses. Visit the  Tuition and Fees webpage for complete information.

Course materials Graduate students can purchase textbooks and other instructional materials through the University Bookstore or elsewhere online. Students should verify what materials are needed with their instructor.

Financial aid

Students completing a degree program may be eligible for financial aid in the form of grants, loans, scholarships, or employment. All of these make up a “Financial Aid Package” and may be offered singly or in various combinations. Since funds are limited, priority for aid is based on financial need and how promptly applications are filed. To find out, or if you have other financial aid questions, contact the  financial aid staff person assigned to you  or try  [email protected]  or 262-472-1130.

phd in cyber security duration

Like to learn more about degree options through UW-Whitewater School of Graduate Studies? There are a few ways you can get the information you need.

Visit our information sessions website to select a virtual information session related to the program you are interested in.

You can also fill out a request for information to connect with an advisor who can discuss your goals and help guide you to the right program to pursue your dreams.

UW-Whitewater business student poses for a photo shoot.

Interested in taking a tour of UW-Whitewater campus? You can visit in person or virtually.

Online MS in Cybersecurity - Emphases

Laptop on webpage for UW-Whitewater Online Canvas course

The Master of Science in Cybersecurity program offers studies in core areas of cybersecurity that include offensive and defensive security operations, security awareness training, security tools design and implementation, cybersecurity management, security policy and law, and emerging areas in security and privacy. The proposed program offers both hands-on experiential learning and in-depth theoretical studies. 

More information on the program structure and courses can be viewed in the Graduate Catalog .

Laptop on webpage for UW-Whitewater Online Canvas course

The M.S. in Cybersecurity is designed for both professionals and recent college graduates who aspire to advance their careers in cybersecurity. The degree program consists of 30 credits, including 15 credits of core courses and 15 credits of courses in security engineering emphasis. The program will prepare students to obtain positions such as cybersecurity analyst, cybersecurity manager, cybersecurity engineer, or cybersecurity architect.

Online Graduate Certificate Program in Cybersecurity

Graduate Student Studying

Designed for those who have some programming experience, the online Cybersecurity graduate certificate will give you fundamental knowledge and hands-on practice in designing, maintaining, and protecting secure computing systems.

Graduate Student smiling at photo shoot

The online Cybersecurity Management graduate certificate is designed for working professionals interested in pursuing careers in cybersecurity, such as security analysts and security managers. 

Kurt Rose, working on UW-Whitewater Online course at home on laptop

Find Out More

Are you ready to redefine your future? Get started by requesting information or take a test drive to experience easier and more engaging learning.

Carlos Barraza, taking notes with tablet and laptop for online class

Are You Ready?

Get started by clicking below.  Apply now to further your education.

University of Wisconsin-Whitewater Online logo

Flinders University Logo

You have no saved courses.

Continue to explore your course options.

Your saved courses

  • Current students
  • Flinders dashboard (Okta)
  • Ask Flinders
  • Flinders Learning Online (FLO)
  • Campus map: Bedford Park
  • Staff directory
  • Jobs at Flinders
  • Shop Flinders merchandise

Flinders and Swan Foresight PhD Enterprise Scholarship: On Safety and Security Compliance in Future Renewable Energy Systems

College of Science and Engineering

Opening date

Closing date

Scholarship value

$50,995 p.a. tax free (indexed annually)

Scholarship duration

Up to 3.5 years

Payment term

Paid Fortnightly

Level of Study

Higher Degrees Research

Description 

Benefits 

Eligibility 

Apply now 

Description

Change the world and shape the future with impactful PhD research, co-funded by Flinders and Swan Foresight.

  • $33,990 p.a. (2024 full-time rate indexed annually) + top-up scholarship $17,005 p.a. tax free
  • Apply your research skills during an internship with Swan Foresight

Flinders University and Swan Foresight offer a PhD Enterprise Scholarship to undertake innovative research into  Safety and Security Compliance in Future Renewable Energy Systems .

The College of Science and Engineering at Flinders University and Swan Foresight are collaborating on this research project to identify and analyse plausible security operational scenarios within the renewable energy sector and electrical grid infrastructure. This project aims to develop comprehensive frameworks, methodologies, and templates designed to enhance security measures while reducing operational costs for the industry.

Bringing extensive expertise to the project, Swan Foresight is a leading innovator in creating secured ecosystems for sustainable futures. Since 2018, Swan Foresight has been dedicated to developing holistic, secure, and sustainable solutions for communities and industries. As a trusted partner, they assist organisations in navigating the journey of creating resilient, secure ecosystems, ensuring long-term sustainability for generations to come.

The College of Science and Engineering is also committed to creating a safer digital environment through cybersecurity research and has complementary research strengths in cybersecurity, securing critical infrastructure and research methodologies, and ensuring timely PhD completions. Together, we are seeking innovative solutions to this challenging area of research through this PhD project. 

This inspiring project will focus on identifying and analysing security operational scenarios in the renewable energy sector and electrical grid, aiming to develop comprehensive frameworks, methodologies, and templates to strengthen security measures while cutting operational costs. The first objective is to identify and categorise current and emerging security threats across the renewable energy sector and grid infrastructure, assessing them based on their potential impact and likelihood. From there, the project will develop solid security frameworks that can be adapted to different types of renewable energy systems and grid setups. In addition, practical methodologies will be crafted for applying these frameworks, including risk assessment tools and incident response strategies tailored to the specific needs of the renewable energy sector. Finally, the project will design templates that blend security measures with cost-effective operational practices, providing clear guidelines for industry stakeholders to implement these solutions effectively.

The Flinders Industry PhD Scholarship also includes an internship of at least 60 full-time equivalent days, agreed to in written form within 18 months of candidature, undertaken and completed prior to completion of the PhD, during which you will be embedded with the Industry Partner team, developing your network, and gaining insight into the everyday research practices of an industry-leading/service driven organisation.

This Scholarship offers:

  • $50,995 p.a. tax free (indexed annually) for up to 3.5 years
  • A 3-month industry internship allowing you to apply your research into practice during candidature
  • Access to academic and industry expertise through joint supervision
  • A supportive environment to learn leading-edge research methods and become an expert in your area
  • The opportunity to manage a complex research project and respond innovatively to challenges
  • A collaborative research community where you can enhance your skills and build your network to progress your research career

Eligibility

To be eligible for the Scholarship you will need:

  • Meet Flinders University's PhD admission requirements, which include an Australian Honours degree Class 1 or 2A, or an equivalent qualification (at least AQF Level 8 ). Alternatively, evidence of equivalent research experience, such as refereed publications or substantial experience as a lead researcher, will be considered.
  • Commence your studies as soon as practicable within a timeframe specified by the Office of Graduate Research in consultation with the Industry Partner, up to a maximum of 3 months from the acceptance of the scholarship. In exceptional circumstances, and with approval from both the Industry Partner and the University, this period may be extended to 6 months.

It is desirable for applicants to also have:

  • A degree in cybersecurity, computer science, information security, software engineering, information technology, or a related field.
  • Knowledge and experience in the power and electrical engineering field.
  • Published papers in JCR Q1 journals or CORE A/A* conferences.
  • A desire to engage with the broader security community through publishing and presenting research outcomes.
  • Participation in capture-the-flag hacking challenges.
  • Knowledge of web applications and network security.
  • Familiarity with various operating systems and networks.
  • Understanding of electricity substation standards, frameworks, and communication protocols.
  • Experience with programming languages such as Python, C++, MATLAB.
  • Strong analytical and problem-solving skills.
  • Effective communication skills.

Application Information

How to apply:

Complete the attached Higher Degree by Research Scholarship Application Form, send your application with supporting documentation to Associate Professor Alireza Jolfaei via email at  [email protected]  

Applications close:  30 September 2024

To find out more about this exciting scholarship opportunity, contact Associate Professor Alireza Jolfaei via email at  [email protected]  

Please note that successful scholarship applicants  must also  be eligible and apply for, and be admitted to, HDR candidature at Flinders University in order to receive the scholarship.  For further information, refer to:  Apply for a Higher Degree by Research

The scholarship applications may close earlier than advertised if a successful awardee is selected.  The start date of the project will be decided in consultation with the project lead, with the expectation that the successful awardee will commence as soon as practicable. 

Sturt Rd, Bedford Park South Australia 5042

South Australia | Northern Territory Global | Online

Information for

  • Future students
  • Business and community
  • External contractors

Directories

  • Campus and locations
  • Research Institutes and Centres

Follow Flinders

Facebook - Flinders University

Website feedback

Accessibility

CRICOS Provider: 00114A      TEQSA Provider ID: PRV12097      TEQSA category: Australian University

Inspiring achievemnt logo

FOREVER FEARLESS

  • Corporate Relations
  • Future Students
  • Current Students
  • Faculty and Staff
  • Parents and Families
  • High School Counselors
  • Academics at Stevens
  • Find Your Program
  • Our Schools

Undergraduate Study

  • Majors and Minors
  • SUCCESS - The Stevens Core Curriculum
  • The Foundations Program
  • Special Programs
  • Undergraduate Research
  • Study Abroad
  • Academic Resources
  • Graduate Study
  • Stevens Online
  • Corporate Education
  • Samuel C. Williams Library

Discover Stevens

The innovation university.

  • Our History
  • Leadership & Vision
  • Strategic Plan
  • Stevens By the Numbers
  • Diversity, Equity and Inclusion
  • Sustainability

Student Life

New students.

  • Undergraduate New Students
  • Graduate New Students

The Stevens Experience

  • Living at Stevens
  • Student Groups and Activities
  • Arts and Culture

Supporting Your Journey

  • Counseling and Psychological Services
  • Office of Student Support
  • Student Health Services
  • Office of Disability Services
  • Other Support Resources
  • Undergraduate Student Life
  • Graduate Student Life
  • Building Your Career
  • Student Affairs
  • Commencement
  • Technology With Purpose
  • Research Pillars
  • Faculty Research
  • Student Research
  • Research Centers & Labs
  • Partner with Us

Admission & Aid

  • Why Stevens

Undergraduate Admissions

  • How to Apply
  • Dates and Deadlines
  • Visit Campus
  • Accepted Students
  • Meet Your Counselor

Graduate Admissions

  • Apply to a Graduate Program
  • Costs and Funding
  • Visits and Events
  • Chat with a Student

Tuition and Financial Aid

  • How to Apply for Aid
  • FAFSA Simplification
  • Undergraduate Costs and Aid
  • Graduate Costs and Funding
  • Consumer Info
  • Contact Financial Aid
  • International Students

Veterans and Military

  • Military Education and Leadership Programs
  • Stevens ROTC Programs
  • Using Your GI Bill
  • Pre-College Programs

Stevens Graduate Marques Brownlee ’15 Makes TIME100 / AI Cover

Marques Brownlee hero

Top tech reviewer, ultimate-frisbee star recently delivered Stevens’ 2024 Commencement address, received honorary doctorate

One of the world’s most-watched technology reviewers, Stevens graduate Marques Brownlee (known professionally as MKBHD), has landed on the cover of TIME magazine’s new TIME100 / AI list as one of the 100 most influential people in AI.

The list, published September 5, includes tech luminaries OpenAI CEO Sam Altman and NVIDIA CEO Jensen Huang as well as public figures such as U.S. Secretary of Commerce Gina Raimondo and actor/anti-AI activist Scarlett Johansson.

“If you want to sell a new product, just say it’s AI-powered. But YouTube gadget reviewer Marques Brownlee has been careful not to get swept up in the hype,” noted TIME , describing Brownlee’s long-running make-or-break reviews of AI-loaded cars, tablets, phones and other devices.

Speaking about AI systems that train freely on publicly available data such as photographs, text and videos, he told the magazine he would like to see creators eventually “compensated by AI developers for using their videos, similar to how YouTuber’s receive a cut of the platform’s revenue from ads.”

Frisbee whiz, featured by Oprah

Brownlee, whose influential YouTube channel currently boasts more than 19 million subscribers (in addition to 5 million Instagram followers and 2 million-plus TikTok followers), graduated from the university with a degree in Business & Technology in 2015.

He received its Young Alumni Achievement Award just three years later in a ceremony in New York City’s Plaza Hotel, and returned to campus in fall 2022 for a moderated conversation with enrolled undergraduates .

“Finding something that you’re really passionate about often requires trying a lot of different stuff, but once you find that thing, it kind of becomes a no-brainer,” he said at the time. “Being able to turn it into a job when I graduated was perfect.”

Stevens graduate Marques Brownlee with Oprah Winfrey

In parallel with his remarkable career in technology social media, Brownlee has enjoyed considerable success in the world of professional ultimate frisbee. NBC News detailed his accomplishments , including making the U.S. mixed national team (currently a finalist in the World Ultimate Championships in Australia), in a recent profile.

Brownlee will also be featured September 12 in the upcoming ABC program “ AI and the Future of Us: An Oprah Winfrey Special ,” along with Microsoft founder Bill Gates, OpenAI’s Altman and FBI Director Christopher Wray.

Watch Brownlee’s 2024 Commencement speech here:

  • Share this —

Health & Wellness

  • Watch Full Episodes
  • Read With Jenna
  • Inspirational
  • Relationships
  • TODAY Table
  • Newsletters
  • Start TODAY
  • Shop TODAY Awards
  • Citi Concert Series
  • Listen All Day

Follow today

More Brands

  • On The Show
  • TODAY Plaza

Rupert Murdoch gets married for the 5th time in ceremony at his California vineyard

Media magnate Rupert Murdoch, 93, has married for the fifth time, his corporation, News Corp, confirmed Sunday.

Murdoch and Elena Zhukova, a 67-year-old Russian-born retired molecular biologist, wed Saturday in a ceremony at his vineyard estate in Bel Air, California. Photographs of the newly married couple were released by News Corp.

The couple  announced their engagement  in March.

Rupert Murdoch and Elena Zhukova

Murdoch was most recently married to model and actor  Jerry Hall . They were wed in 2016 and divorced in 2022.

Zhukova is the ex-wife of Alexander Zhukov, a billionaire energy investor and Russian politician. Their daughter, Dasha, was previously married to Russian  billionaire Roman Abramovich , who used to own the Premier League soccer club Chelsea.

Last fall, Murdoch  stepped down  as leader of both Fox News’ parent company and his News Corp media holdings. His son, Lachlan, took his place in a media empire that spans continents and  helped to shape modern American politics .

In 1952, Murdoch inherited a newspaper in his native Australia from his father. Over decades, he built a news and entertainment enterprise that became prominent in the United States and Britain, including ownership of such notable newspapers as The Times of London and The Wall Street Journal.

Fox News Channel, the 24-hour network founded in 1996, has profoundly influenced television, becoming a popular news source among many conservative U.S. audiences and politicians.

phd in cyber security duration

Michigan newlyweds arrested after groom allegedly runs over and kills groomsman hours after wedding

phd in cyber security duration

How Tara Davis-Woodhall and Hunter Woodhall kept each other ‘grounded’ after they each won gold

Paris olympics.

phd in cyber security duration

Tom Cruise surprises Paralympian Ali Truwit with a ‘good luck’ phone call

phd in cyber security duration

Tara Davis-Woodhall and Hunter Woodhall share what’s next after winning golds in Paris — including 2028 plans

phd in cyber security duration

Taylor Fritz beats Frances Tiafoe to become the first American man in a US Open final since 2006

phd in cyber security duration

Owner of hospitalized US Olympic gymnastics therapy dog gives update

Pets & animals.

phd in cyber security duration

Hunter Woodhall and wife Tara embrace after he wins his first gold medal at the Paralympics

phd in cyber security duration

Hunter Woodhall wins gold! Paralympian reveals moving message for late uncle on his bib

phd in cyber security duration

Who is Nicole Virzi, PhD student accused of killing her friend's baby?

phd in cyber security duration

How to ask parents about guns in the house

COMMENTS

  1. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    A Ph.D. in cybersecurity provides students with a comprehensive education encompassing technology, data science, leadership, management, ethics and policy. Requirements, course loads and ...

  2. List of Cybersecurity PhD Programs

    Here's a breakdown of tuition rates (all figures are based on out-of-state tuition). $17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology. $86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

  3. Ph.D. In Cybersecurity In The United States: A Comprehensive Guide For

    Part-time cybersecurity programs could last 6 to 7 years. A full-time MPhil in cybersecurity usually lasts 1 to 2 years. ... Online Ph.D. in Cyber Security. Although most doctoral degree programs last two or three years, we discovered one university that offers a 12-month online doctoral program in Cybersecurity:

  4. Cybersecurity, PhD

    The benefits of the Boston area: The PhD in Cybersecurity degree requires completion of at least 48 semester semester hours beyond a bachelor's degree. Students who enter with an undergraduate degree will typically need four to five years to complete the program, and they will be awarded a master's degree en route to the PhD.

  5. Cybersecurity, PhD Degree

    Overview. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.

  6. PhD in Cybersecurity

    Using technology for a more secure world. The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy ...

  7. Breaking Down the Timeframe: Getting a PhD in Cyber Security

    A PhD in Cybersecurity is a highly specialized and advanced program that requires extensive coursework and research. The time it takes to complete a PhD in Cybersecurity can vary depending on the level of education a student enters the program with. However, on average, it takes approximately 4-5 years of full-time study to earn a PhD in ...

  8. Doctoral Degrees in Cybersecurity

    A cybersecurity doctorate or Ph.D. is the highest degree you can earn in the field. You can earn a Ph.D. to prepare for university-level teaching and research, or other doctorates, which emphasize applied skills and help qualify you for leadership roles in cybersecurity. ... Now is an excellent time to get a cybersecurity degree — the field ...

  9. Cybersecurity

    The smart home tech inside your home is less secure than you think, new Northeastern research finds. The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address ...

  10. Computer Science (Cybersecurity), PhD

    480-965-3199. All ASU graduate and undergraduate academic programs are fully accredited by the Higher Learning Commission. Many programs also have additional accreditation through specialized accrediting agencies. A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.

  11. Doing a PhD in Cyber Security

    A UK doctoral student can expect to pay around £5,500 per year in tuition fees for a 2021/22 PhD programme in Cyber Security. Typical tuition fees for EU and overseas students are around £25,000 per academic year. Part-time tuition fees are normally proportioned according to the research programme length. Most institutions have Centres for ...

  12. Ph.D. in Cybersecurity Management

    A graduate with a Ph.D. in Cybersecurity Management will have the ability to: acquire advanced knowledge and deeper understanding of the field of information assurance; communicate professionally and ethically about information assurance research issues; identify, analyze, and synthesize scholarly literature related to the field of information ...

  13. Top 10 Best Programs for a PhD in Cyber Security

    Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.

  14. Doctor of Philosophy in Cybersecurity (PhD-CY)

    As a graduate of National University's Doctor of Philosophy in Cybersecurity (PhD-CY), you'll be able to: Advance theory and practical applications of cybersecurity. Formulate cybersecurity governance, policy, risk, and compliance. Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.

  15. Online Doctor of Engineering in Cybersecurity Analytics

    The D.Eng. in Cybersecurity Analytics offers knowledge of cutting-edge cybersecurity techniques and tools and their application to real-world challenges. ... The degree requires completion of eight graduate-level courses (listed below) and a minimum of 24 credit hours of Praxis Research (SEAS 8188). During the research phase, the student writes ...

  16. Cyber Security, Privacy and Trust PhD

    The prescribed period of study is 36 months if studying full-time, or between 48 and 72 months if studying part-time. Year 1 of PhD studies is probationary. Your supervisor will identify your training needs, if any, and invite you to attend lectures relevant to your research topic.

  17. Cybersecurity MPhil/PhD

    This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today's societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

  18. Information Science Ph.D. With a Concentration in Cybersecurity

    The UNT Information Science Ph.D. program responds to the varied and changing needs of the information age by offering the Cybersecurity concentration, offered jointly with UNT Department of Computer Science and Engineering, and UNT Department of Information Technology and Decision Sciences with the ultimate goal of providing interdisciplinary training, research and professional services in ...

  19. List of Online Cybersecurity PhD Degree Program Options

    All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.

  20. Online PhD in Cybersecurity

    PhD in Cybersecurity Program Outcomes. Formulate solutions to cybersecurity problems. Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale. Manage legal, ethical, and security risks in technology-based systems. Explain concepts and arguments associated with cybersecurity.

  21. PhD Cyber Security

    Duration: Full time: 2-4 years Part time: 4-8 years. Course type: Full-time, Part-time route available. Study location: ... The PhD Cyber Security programme is an opportunity to immerse yourself in a programme of study that will lead you to making a significant novel contribution to knowledge.

  22. Ph. D. in Cyber Security Systems and Networks

    About Program. The Ph. D. in Cyber Security Systems and Networks is a Doctoral program provided by Amritha vishwa vidyapeetham.The call for applications will generally be posted twice a year on the website. However, Amrita Vishwa Vidyapeetham will accept applications throughout the year.

  23. Online PhD in Cyber Security Degrees

    Online PhD in Cyber Security Degree Availability. Many online-based institutions that offer programs within computer science and cybersecurity also feature accredited doctorate degrees. Students can expect to find disciplines directly in cybersecurity or in a similar field, such as information assurance or security in information technology.

  24. Flinders and CyberCX Industry Enterprise PhD Scholarship in

    The Flinders Industry PhD Scholarship also includes an internship of at least 60 full-time equivalent days, agreed to in written form within 18 months of candidature, undertaken and completed prior to completion of the PhD, during which you will be embedded with the Industry Partner team, developing your network, and gaining insight into the ...

  25. Master's in Cybersecurity

    Recent data from CyberSeek—a project supported by the National Institute of Standards and Technology, U.S. Department of Commerce, and National Initiative for Cybersecurity Education—showed that there were nearly 1.2 million persons employed in cybersecurity and that there were over 440,000 additional job openings, while in Wisconsin there were over 11,000 persons employed in cybersecurity ...

  26. Flinders and Swan Foresight PhD Enterprise Scholarship: On Safety and

    $33,990 p.a. (2024 full-time rate indexed annually) + top-up scholarship $17,005 p.a. tax free; Apply your research skills during an internship with Swan Foresight; Flinders University and Swan Foresight offer a PhD Enterprise Scholarship to undertake innovative research into Safety and Security Compliance in Future Renewable Energy Systems.

  27. Stevens Graduate Marques Brownlee '15 Makes TIME100 / AI Cover

    One of the world's most-watched technology reviewers, Stevens graduate Marques Brownlee (known professionally as MKBHD), has landed on the cover of TIME magazine's new TIME100 / AI list as one of the 100 most influential people in AI.. The list, published September 5, includes tech luminaries OpenAI CEO Sam Altman and NVIDIA CEO Jensen Huang as well as public figures such as U.S. Secretary ...

  28. Rupert Murdoch Marries His Fifth Wife Elena Zhukova

    Media magnate Rupert Murdoch, 93, has married for the fifth time, his corporation, News Corp, confirmed Sunday. Murdoch, 93, married Elena Zhukova, 67, on June 1. IE 11 is not supported.