Code | Title | Hours |
---|---|---|
Note: Consult faculty advisor for other acceptable courses. | ||
Tracks | ||
Select at least two courses from one track: | 8 | |
Compilers | ||
Wireless Network | ||
Digital Signal Processing | ||
Computer Architecture | ||
Mobile and Wireless Networking | ||
Computer Hardware Security | ||
Fundamentals of Computer Networking | ||
Machine Learning | ||
Deep Learning | ||
Introduction to Machine Learning and Pattern Recognition | ||
Advanced Machine Learning | ||
Wireless Network | ||
Network Security | ||
Foundations of Distributed Systems | ||
Seminar in Computer Security | ||
Computer System Security | ||
Wireless Sensor Networks and the Internet of Things | ||
Wireless Communication Systems | ||
Digital Communications | ||
Mobile and Wireless Networking | ||
Fundamentals of Computer Networks | ||
Compilers | ||
Intensive Computer Systems | ||
Foundations of Distributed Systems | ||
Computer System Security | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Computer Architecture | ||
Advanced Algorithms | ||
Complexity Theory | ||
Foundations of Cryptography | ||
Seminar in Theoretical Computer Science | ||
Information Theory | ||
Empirical Research Methods | ||
Privacy, Security, and Usability | ||
Theory and Methods in Human Computer Interaction | ||
Research Methods in the Social Sciences | ||
Qualitative Methods | ||
Statistical Analysis | ||
Quantitative Analysis | ||
Criminology | ||
Evidence-Based Crime Policy | ||
Security Risk Management and Assessment | ||
Information System Forensics | ||
Decision Making for Critical Infrastructure | ||
Security and Resilience Policy | ||
Electives | ||
Selected in consultation with advisor from graduate-level CS and ECE courses and graduate-level courses offered by the College of Social Sciences and Humanities, including CRIM, CS, CY, DS, EECE, INSH, MATH and POLS. | 28 |
Code | Title | Hours |
---|---|---|
Dissertation Term 1 | ||
Dissertation Term 2 | ||
Complete the following (repeatable) course until graduation: | ||
Dissertation Continuation |
48 total semester hours required Minimum 3.000 GPA required
Incoming PhD in Cybersecurity students who have already completed a Master of Science in an adjacent field may petition to the graduate program administration for advanced entry. Advanced entry petitions are reviewed by the program administration on a case-by-case basis. Please note that advanced entry does not waive by itself any part of the PhD coursework requirements. As a degree conferral requirement, a minimum of 16 semester hours of coursework beyond the 32 semester hours of the master’s degree is required of advanced entry PhD students (48 semester hours is required of standard entry PhD students). A grade of B or higher is required in each course. A cumulative 3.500 GPA is required for the core requirement.
Refer to the PhD Cybersecurity overview for admission to candidacy requirements.
Refer to the PhD Cybersecurity overview for residency requirements.
Refer to the PhD Cybersecurity overview for teaching requirements.
Refer to the PhD Cybersecurity overview for dissertation advising requirements.
Refer to the PhD Cybersecurity overview for dissertation committee requirements.
Refer to the PhD Cybersecurity overview for comprehensive examination requirements.
Refer to the PhD Cybersecurity overview for dissertation defense and completion requirements.
Students must maintain a minimum GPA of 3.500 as well as earn a grade of B or better in each core course.
Code | Title | Hours |
---|---|---|
Consult your faculty advisor for approved courses. | 16 |
Minimum 16 semester hours required Minimum 3.000 GPA required
Send Page to Printer
Print this page.
Download Page (PDF)
The PDF will include all information unique to this page.
2023-24 Undergraduate Day PDF
2023-24 CPS Undergraduate PDF
2023-24 Graduate/Law PDF
2023-24 Course Descriptions PDF
A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.
Students who choose the PhD in Cybersecurity program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society. The PhD program is a natural path for students in the Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers. Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:
Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .
The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.
Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.
The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.
PhD students at Khoury College gain deep knowledge and invaluable experience—preparing them for a career in academia as well as research.
Our flagship campus in Boston is just minutes away from esteemed universities, exciting start-ups, and leaders in tech, finance, health care, and more.
December 15, 2023
Khoury Graduate Admissions Team
January 1, 1066
January 1, 1492
Khoury Align Admissions Team
I'm seeking information for
Cyber Insight
Updated on: June 17, 2023
Getting a PhD in Cyber Security is a tough, yet rewarding, journey. I should know, since I’ve been through it myself, and it was quite a challenge. It takes time, dedication, and a lot of hard work to break down the timeframe and reach your ultimate goal. From the endless hours of reading and conducting research to defending your dissertation, the journey to obtaining a PhD in Cyber Security is not for the faint of heart. But once you’ve reached that endpoint, the feeling of fulfillment and accomplishment will all be worth it. In this piece, I’ll walk you through the steps of breaking down the timeframe for a PhD in Cyber Security and share some psychological and emotional hooks to keep you motivated along the way.
Here are some key points to consider when exploring the timeline for earning a PhD in Cybersecurity:
Overall, earning a PhD in Cybersecurity is a rigorous and challenging program that requires a significant time commitment. However, for those who are passionate about the field and willing to put in the work, a PhD in Cybersecurity can open up many exciting career opportunities in the fast-growing field of cybersecurity.
???? Pro Tips:
1. Research Your Options: Before you begin pursuing a PhD in cyber security, take some time to research what programs are available. You should consider factors such as program length, cost, and course requirements to find the program that best suits your needs.
2. Set Goals: Pursuing a PhD is a significant undertaking that requires a clear sense of purpose. Define your goals and keep them in mind as you work towards completing your degree.
3. Stay Disciplined: A PhD in cyber security will require a lot of work, and it’s important to stay disciplined. Develop a schedule that allows you to balance your academic work with other commitments.
4. Seek Support: Pursuing a PhD can be a lonely experience. Seek support from friends, family, and colleagues, and join groups related to your field to network and connect with others.
5. Don’t Give Up: Completing a PhD in cyber security is challenging, but it’s important to remember that it’s also incredibly rewarding. Don’t give up when you encounter setbacks or difficulties, and keep your eye on the prize: a respected degree that will set you up for success in the field of cyber security.
A PhD in Cybersecurity is a highly advanced degree that provides students with specialized knowledge in the field of cybersecurity. This degree is designed for those who wish to pursue a career in research or teaching in higher education, as well as those who want to work in industry as cybersecurity experts. The program covers a wide range of topics, including network security, cryptography, cybercrime, and digital forensics. Graduates of PhD in Cybersecurity programs are highly sought after for their knowledge and expertise in the rapidly growing field of cybersecurity.
The minimum credit requirement for a PhD in Cybersecurity is typically 48 semester hours. This includes coursework in areas such as computer science, mathematics, and cybersecurity. In addition to coursework, students must also complete a dissertation or research project, which is a significant piece of original research in the field of cybersecurity. The dissertation must be approved by a committee of faculty members and defended in front of the committee and other members of the academic community.
The timeframe for completing a PhD in Cybersecurity varies depending on several factors, including whether the student is pursuing the degree full-time or part-time, the student’s educational background, and the requirements of the specific program. Generally, students who start with an undergraduate degree will typically require four to five years to finish the degree. Students who already have a master’s degree in a related field may be able to complete the program in less time.
Several factors can affect the duration of a PhD in Cybersecurity. These include the availability of funding, the student’s ability to conduct research, and the student’s progress in the program. It is important to note that pursuing a PhD in Cybersecurity requires a significant investment of time and effort, and students should be prepared to commit several years of their lives to this endeavor.
Some common factors that can affect the duration of a PhD in Cybersecurity are:
There are several common pathways to a PhD in Cybersecurity. These include:
Each pathway has its own advantages and disadvantages, and students should carefully consider their options before deciding on a particular pathway.
For students interested in pursuing a highly specialized career, there are several dual degree options available in Cybersecurity. These include:
These dual degree options allow students to gain expertise in both cybersecurity and another field, which can open up a wider range of career opportunities. However, these programs are typically longer and more intensive than a traditional PhD in Cybersecurity program.
In conclusion, pursuing a PhD in Cybersecurity is a significant investment of time and effort, but can lead to a highly rewarding career in a rapidly growing field. Students should carefully consider their options and choose a pathway that best fits their individual goals and interests. By taking the time to carefully research and plan their education, students can set themselves up for success in the exciting field of cybersecurity.
What are the three approaches to security in cyber security: explained.
What is security solution and why it matters: ultimate guide.
Is a masters in cybersecurity worth the investment.
PH +1 000 000 0000
24 M Drive East Hampton, NY 11937
© 2024 INFO
This program engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities. It prepares students from diverse backgrounds and interests to advance the reliability and security of cyberspace as researchers, faculty members, and policy advisors.
The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.
A PhD in Cybersecurity opens doors to diverse and high-demand careers. Graduates can excel in various roles, including:
Applicants must submit the online application and all required admission materials no later than the stated deadlines to be considered for admission. Admissions decisions are made on a rolling basis.
Applicants are reviewed annually for admission to the Fall Term:
The deposit deadline is April 15th.
A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.
The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance.
The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including applied cryptography, computer and network security, computer forensics, data and information security and software security.
According to the National Security Agency, information assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. This includes providing restoration of information systems by incorporating protection, detection and reaction capabilities.
Domestic students enrolled in the cybersecurity concentration are eligible for federal fellowships, such as the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. For more information, students can visit the Cybersecurity and Trusted Foundations website
ASU is certified as a National Center of Academic Excellence in Information Assurance Education and a National Center of Academic Excellence in Information Assurance - Research by the National Security Agency and the Department of Homeland Security. Information assurance courseware at ASU has been certified by the Information Assurance Courseware Evaluation Program to satisfy the standards for Information Systems Security Professionals (NSTISSI 4011) and Senior Systems Managers (CNSSI 4012).
This program may be eligible for an Optional Practical Training extension for up to 24 months. This OPT work authorization period may help international students gain skills and experience in the U.S. Those interested in an OPT extension should review ASU degrees that qualify for the STEM-OPT extension at ASU's International Students and Scholars Center website.
The OPT extension only applies to students on an F-1 visa and does not apply to students completing a degree through ASU Online.
84 credit hours, a written comprehensive exam, a prospectus and a dissertation
Required Core Areas (9 credit hours) applications (3) foundations (3) systems (3)
Concentration (9 credit hours) CSE 543 Information Assurance and Security (3) Choose two: CSE 539 Applied Cryptography (3) CSE 545 Software Security (3) CSE 548 Advanced Computer Network Security (3)
Research (18 credit hours) CSE 792 Research (18)
Electives and Additional Research (36 credit hours)
Culminating Experience (12 credit hours) CSE 799 Dissertation (12)
Additional Curriculum Information Courses that are used to satisfy the core area requirement cannot be used to satisfy electives or other requirements. A grade of "B" or better is required for core courses.
18 credit hours of CSE 792 Research are required, and up to 54 credit hours are allowed on the plan of study. Students with research credit hours in excess of 18 add these credit hours to their electives and additional research.
Electives include:
When approved by the academic unit and the Graduate College, this program allows 30 credit hours from a previously awarded master's degree to be used for this degree.
A maximum of three credit hours of 400-level coursework may be applied on the plan of study.
Applicants must fulfill the requirements of both the Graduate College and the Ira A. Fulton Schools of Engineering.
Applicants are eligible to apply to the program if they have earned a bachelor's degree in computer science, computer engineering or a closely related area. Most applicants should have earned a master's degree, but exceptional undergraduate applicants may be admitted directly into the doctoral program.
Applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in the last 60 hours of their first bachelor's degree program, or applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in an applicable master's degree program.
All applicants must submit:
Additional Application Information An applicant whose native language is not English must provide proof of English proficiency regardless of their current residency.
GRE scores are optional.
If the student is assigned any deficiency coursework upon admission, those classes must be completed with a grade of "C" (scale is 4.00 = "A") or higher within two semesters of admission to the program. Deficiency courses include:
CSE 230 Computer Organization and Assembly Language Programming CSE 310 Data Structures and Algorithms CSE 330 Operating Systems CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science
The applicant's undergraduate GPA and depth of preparation in computer science and engineering are the primary factors affecting admission.
Session | Modality | Deadline | Type |
---|---|---|---|
Session A/C | In Person | 12/31 | Final |
Session | Modality | Deadline | Type |
---|---|---|---|
Session A/C | In Person | 08/01 | Final |
Graduates with a doctorate in computer science are able to analyze, understand and apply key theories and algorithms used in the field of computer science. They are also able to generate and evaluate new theories, algorithms and software modules that can advance the field of computer science. Graduates have a competitive advantage when it comes to securing employment.
Career examples include:
Computer Science and Engineering Program | CTRPT 105 [email protected] 480-965-3199
A PhD in Cyber Security equips students with expert knowledge in computing, cybercrime and digital technology policy. A PhD involves original research into a specific field of cybersecurity and can allow cyber security graduate students to work with emerging technologies and tools to tackle issues society faces as technology rapidly advances.
According to the UK National Cyber Security Strategy 2016-2021 , there will be an estimated shortage of 350,000 cybersecurity professionals by 2022. There is therefore a high demand for cyber security graduates and doctorates. A PhD in Cyber Security could lead to a career in an emerging industry.
A list of Cybersecurity topics at doctorate level is provided below:
UK Doctoral Cyber Security programmes usually require graduate students to possess, or expect to achieve, as a minimum a 2:1 upper second class bachelor’s degree in computer science, or related subject such as Mathematics. It should be noted that due to the interdisciplinary challenges in cyber security, related subjects can vary depending on the focus of research and may include areas such as Electrical Engineering , Civil Engineering, Social Sciences, Psychology and Law. A lower second class (2:2) bachelor’s degree may be accepted if the graduate student has a master’s degree or graduate cyber security work experience. Applicants with international equivalent qualifications are also considered.
Another requirement for research projects is proof of English Language ability. Universities will expect international students to provide English Level Qualifications, for example IELTS, TOEFL (iBT) or Pearson PTE scores.
Application of artificial intelligence to multiphysics problems in materials design, from text to tech: shaping the future of physics-based simulations with ai-driven generative models, study of the human-vehicle interactions by a high-end dynamic driving simulator, coventry university postgraduate research studentships, discovery of solid state electrolytes using deep learning, how long does it take to get a phd in cyber security.
In the UK, a full time cybersecurity research project lasts around 3 to 4 years. The first year is usually probationary and will be used to develop a thesis proposal that outlines your research degree. The remaining time will be used to carry out your research, produce and submit your thesis and undertake the Viva . Part-time cybersecurity projects may take 6 to 7 years to complete. A full-time cyber security MPhil usually lasts for 1 to 2 years.
In addition to developing your thesis proposal, the first year is also used to allow your supervisor to identify additional cybersecurity training that would assist in your research project. This may come in the form of online PhD cybersecurity training modules, online doctorate lectures, or placement opportunities to give you an insight into the cyber security industry and real world applications in your chosen field.
A UK doctoral student can expect to pay around £5,500 per year in tuition fees for a 2021/22 PhD programme in Cyber Security. Typical tuition fees for EU and overseas students are around £25,000 per academic year. Part-time tuition fees are normally proportioned according to the research programme length.
Most institutions have Centres for Doctoral Training in Cyber Security, which offer a number of Engineering and Physical Sciences Research Council (EPSRC) studentships to eligible applicants. These studentships and grants cover tuition fees, and can provide a maintenance stipend and research travel expenses.
You may also be eligible for a Postgraduate Doctoral Loan which helps with course fees and living costs associated with a cyber-security research project.
As companies become more reliant on technology, the risk of cyber-attacks and other compromises in security becomes more pressing. In fact, according to The Annual Crime Survey in 2017 , two thirds of UK businesses were hit by cyber-attacks. Because of this, and the recognised shortage of cybersecurity professionals and graduates/doctorates, companies, both public and private, are investing large amounts of money into developing their cyber security. These companies look to a PhD student with a cyber security degree as someone who can help develop this. A PhD in Cyber Security reflects the demand for security specialists.
Typical employers for cybersecurity doctorates include Intel, NASA, Microsoft, Google and Lloyds TSB, though the full list of employers is extensive due to the increasing reliance on technology in almost all industries, and the overlap with other disciplines such as computer science and information science. The doctoral degree also allows for international reach, as it is a highly applicable field of knowledge for any country. Many of the employers are based in the US, for example, NASA and Google. Common jobs for Cyber Security PhD students include:
Join thousands of students.
Join thousands of other students and stay up to date with the latest PhD programmes, funding opportunities and advice.
Technology is becoming more and more integrated with our daily lives — with it comes threats from hackers that make your information vulnerable. Indeed, cybersecurity threats are expected to grow even more in the next few years, making cybersecurity professionals sought-after in the hiring market. Already have an extensive computer science background? Why not take it to the next level with a PhD in cyber security?
A doctorate degree in cyber security gives you a valuable qualification and in-depth knowledge of cybersecurity challenges. Not only will you be equipped to help organizations protect their crucial information, but you’ll also be qualified to develop strategies for better data security and even teach the subject in university.
Ready to unlock unlimited career potential in the cybersecurity space? Let’s jump into our top programs for cybersecurity PhD programs, including common requirements and costs and future career potential.
Table of Contents
Arizona state university, ira a. fulton schools of engineering.
Ph.D. Computer Science (Cybersecurity)
Arizona State University is certified as a National Center of Academic Excellence for Information Assurance Research and Education (CAEIAE). Its doctorate of cyber security program helps students master key theories and algorithms to apply to a modern computer science realm.
Doctorate (DSc) in Cybersecurity
Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense. The school’s doctorate in cybersecurity program is a low-residency online program and was the first of its kind in the USA.
Doctor of Philosophy in Cybersecurity (PhD-CY)
Northcentral University is a regionally accredited university that offers many educational programs for students all over the world with one-on-one mentorship. Its PhD cybersecurity degree has a special emphasis on global security issues and covers international laws and multicultural elements.
Ph.D. in Security
University of Colorado, Colorado Springs has partnerships with several defense departments, semiconductor manufacturers, and other prominent institutions, thanks to its strategic location. Though students must conduct the majority of the coursework for this doctorate degree in cyber security on-campus, a provision permits some online courses.
Cybersecurity, Ph.D.
Northeastern University promotes a co-operative education philosophy with a blend of classroom learning and professional experience. This cybersecurity PhD program offers the opportunity to conduct research in specialized facilities and labs, including the Cybersecurity & Privacy Institute and International Secure Systems Lab.
Cybersecurity, DSc
Dakota State University is known for its specialization in computer education-related programs. Its doctorate in cyber security is delivered through a combination of various distance education methods and a handful of on-campus seminars. You can apply for the program even if you don’t have a master’s degree, but you’ll need to complete an additional 27 credits.
Interdisciplinary Ph.D. Program in Information Security
Purdue University was ranked in the top 10 most innovative universities in 2022 by the US News & World Report. This interdisciplinary cybersecurity PhD program covers ethical, political, and philosophical courses, to provide insight into technology policy issues and information ethics.
Ph.D. in Cybersecurity Management
NSU is considered one of the National Centers of Academic Excellence (NCAE) in cybersecurity. To qualify for this school’s PhD program in cybersecurity, you’ll need to have either a bachelor’s or master’s degree in the field. The school also offers a direct BS to PhD pathway.
Doctor of Business Administration in Cyber Security Management
St. Thomas University is a non-profit Catholic university that emphasizes global and cultural diversity. Its doctorate of cybersecurity program lets you choose one of three research options: traditional dissertation, action research, and article dissertation.
Information Technology Ph.D. (Information Security and Assurance (ISA) Concentration)
George Mason University is a public research university with an emphasis on sustainability that was ranked the most diverse university in Virginia by the US News & World Report 2018. Its PhD program in Information Technology offers a concentration in Information Security Assurance (ISA) covering cybersecurity subjects.
Most PhD programs in cybersecurity require a master’s in computer science or a related field. Other specific requirements vary depending on the program, but you’ll typically need to submit the following in your application:
Check individual requirements for each school you’re considering well in advance of the application cut-off date. These programs can be competitive, so give yourself plenty of time to put together the strongest application you can!
The best cybersecurity doctorate programs can be intensive and competitive. Therefore, it’s a good idea to prepare before the program even starts – this can give you the edge you need to excel in the program!
Of course, your previous studies provide the foundation for your doctorate. An internship in the field can also help you to build useful skills and knowledge, especially when it comes to the latest trends Likewise, participating in cybersecurity competitions or getting a cybersecurity certification can be highly advantageous.
However, the best thing you can do to prepare for a cybersecurity doctoral program is to build your network in the sector. Join professional organizations and mingle with industry folks to gain insights into the field. You can also use social media platforms like LinkedIn and Twitter to enhance your networks.
Related Reading: Best Master’s in Cybersecurity Programs
A doctorate in cybersecurity allows you to develop high-level skills and knowledge on preventing and analyzing security breaches, as well as formulating strategies to manage them. It is a valuable qualification that will qualify you for top jobs at some of the best organizations, with attractive remuneration.
When choosing the best cybersecurity PhD program for you, consider the school’s reputation and its accreditation. Also, look at the courses offered, as cybersecurity involves various specializations. You should also consider your budget in the context of each program’s tuition, fees, and financial aid offered.
Finally, where is the program located? Is it offered on-campus, offline, or in a hybrid program? These factors will affect your ability to balance your study with work and personal commitments.
Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include:
You may not find as many options for a PhD in cyber security as other fields. After all, it’s a specialized program. However, you’ll find a few solid top cybersecurity PhD programs that give you the opportunity to learn from top research institutions and faculty.
If you’ve found this round-up of the best PhDs in cybersecurity helpful, take a look at our guides to the best online Master’s in Computer Science and online PhD Computer Science programs .
What is the average cost of a phd in cybersecurity.
Costs vary depending on the school, program length, and delivery (on-campus or online). Usually, a PhD in cybersecurity can be anywhere between $30,000 to $100,000.
A PhD in cybersecurity is valuable because it will qualify you for some of the most in-demand and well-paid jobs available today. According to the BLS , jobs for information security professionals are estimated to grow by 33% over the next decade, significantly more than the national average.
A PhD in cybersecurity is a specialized degree, but today, many universities offer it. Several programs are delivered on-campus, online, or in hybrid formats.
A PhD in cybersecurity can take from 3-7 years to complete. This will depend on the program, as well as individual factors such as whether you choose to study part-time or full-time.
A PhD in cybersecurity will equip you to work for leading organizations as a CISO (Chief Information Security Officer), information security manager, or security architect. You’ll also be qualified to conduct research or work as a professor in cybersecurity or a related field.
You’ll typically need 60 credits to complete a cybersecurity PhD. However, this varies depending on the specific program or university.
Unlike most undergraduate programs, a PhD degree relies heavily on coursework and, in particular, a main dissertation or thesis. However, you’ll still have to complete some exams.
Usually, there are three kinds of exams:
You should consider faculty experience, networking opportunities, available funding, accreditation, and alumni statistics before choosing a PhD in cyber security program.
Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.
Thegradcafe and jobbio join forces to connect top talent with great companies, related posts.
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
© 2024 TheGradCafe.com All rights reserved
GW Online Engineering Programs
Apply for Admission
We are now accepting applications for the cohort beginning in January 2025.
The application deadline is November 1, 2024.
Program flyer, program description .
The Doctor of Engineering in Cybersecurity Analytics grants students extensive knowledge of cutting-edge cybersecurity techniques, tools, and their real-world applications. Graduates are well-equipped to conduct research and lead cybersecurity projects and teams in various industries, including technology, finance, healthcare, and more. Graduates will be able to effectively communicate complex cybersecurity concepts to diverse audiences, making them well-suited for leadership positions and academic teaching roles.
GW is federally designated as a National Center of Excellence for Cyber Defense Research. The GW Cyber Security and Privacy Research Institute ( CSPRI ) is the home for major information assurance and cybersecurity scholarship programs. The CSPRI is funded by the Department of Homeland Security and the National Science Foundation.
The degree requires completion of eight graduate-level courses (listed below) and a minimum of 24 credit hours of Praxis Research (SEAS 8188). During the research phase, the student writes and defends a research praxis on a topic related to Cybersecurity Analytics. The topic is selected by the student and approved by the research advising committee.
CSCI 6015 Cyber Forensics: Acquiring, preserving and analyzing digitally stored information while ensuring that this information is admissible as evidence in a court of law. Principles and techniques for cyber forensics investigations using industry-standard forensic process.
SEAS 8400 Challenges in Cybersecurity: Introduction to most common types of attacks, e.g., ransomware attacks, IoT attacks, cloud attacks, phishing attacks, blockchain and cryptocurrency attacks, software vulnerabilities, BYOD policies, and insider attacks, as well as analytical techniques of their mitigation.
SEAS 8405 Cybersecurity Architectures: Introduction to traditional network-centric cybersecurity (i.e., Defense in Depth) and emerging cybersecurity architecture models including DevSecOps, Cloud-native, and risk adaptive (Zero Trust Architecture) structures. Discussion of the benefits and challenges of these models, alignment with MITRE frameworks, and how they support the business/mission outcomes of an organization.
SEAS 8410 Security Data Analysis & Visualization: Visualization aspect of security data, including study of data analytics and scaling up information security, security metrics and security monitoring techniques focusing on industry applications. Tools for security data visualization and analytics.
SEAS 8414 Analytical Tools for Cyber Analytics: Survey of analytical tools for analyzing cybersecurity data with particular attention to the use of data analytics procedures in supporting appropriate cybersecurity policy decisions
SEAS 8415 Applied Cryptography and Data Protection: Introduction to cryptographic techniques, case studies for real-life applications of modern crypto-graphic solutions, classical cryptographical algorithms (AES, RSA, RC4) and techniques (symmetric, asymmetric-public key cryptography, hash functions), digital signatures, key management, and distribution. Advanced topics such as zero-knowledge proofs and zero-trust architectures.
SEAS 8416 Python Tools for Cybersecurity: Learning Python & and its role in cybersecurity. Perform secure coding, network analysis, cryptography, malware analysis, and automation of cybersecurity tasks using Python.
SEAS 8499 Praxis Development for Cybersecurity: Overview of research methods. Aims and purpose of the praxis. Development of praxis research strategies, formulation, and defense of a praxis proposal. Praxis proposal defense must be passed before the student is admitted to degree candidacy to undertake praxis work.
SEAS 8188 Praxis Research for Doctor of Engineering in Cyber Analytics: Independent applied research in cybersecurity culminating in the final praxis report and final examination for the degree of Doctor of Engineering.
Classroom courses last 10 weeks each and meet on Saturday mornings from 9:00 AM—12:10 PM and afternoons from 1:00—4:10 PM (all times Eastern). All classes meet live online through synchronous distance learning technologies (Zoom). All classes are recorded and available for viewing within two hours of the lecture. This program is taught in a cohort format in which students take all courses in lockstep. Courses cannot be taken out of sequence, live attendance at all class meetings is expected, and students must remain continuously enrolled. Leaves of absence are permitted only in the case of a medical or family emergency, or deployment to active military duty. Please see below for the dates of our upcoming cohort.
Semester | Session | #Credit Hours | Tentative Dates |
---|---|---|---|
Spring 2025 | 1 | 6 | January 4 — March 8, 2025 |
Spring 2025 | 2 | 6 | March 22 — May 31, 2025 |
Summer 2025 | - | 6 | June 14 — August 23, 2025 |
Fall 2025 | 1 | 6 | September 6 — November 8, 2025 |
No classes on Memorial Day and Fourth of July weekends
To proceed to the research phase, students must earn a grade point average of at least 3.2 in the eight classroom courses, and no grade below B-. Students are then registered for a minimum of 24 credit hours of SEAS 8188 Praxis Research: 3 ch in Fall 2025 (Session 2), 9 ch in Spring 2026, 3 ch in Summer 2026, and 9 ch in Fall 2026. Throughout the research phase, students develop the praxis under the guidance of a designated faculty advisor. Faculty research advisors are assigned by the program office and meet individually with students every two weeks.
Sample research areas are listed below:
Tuition is billed at $1650 per credit hour for the 2024-2025 year. A non-refundable tuition deposit of $995, which is applied to tuition in the first semester, is required when the student accepts admission.
Note: GRE and GMAT scores are not required.
Please note that our doctoral programs are highly selective; meeting minimum admissions requirements does not guarantee admission.
Normally, all transcripts must be received before an admission decision is rendered for the Doctor of Engineering program.
You will receive emails from us updating you as your application goes through the admissions process.
Live via Zoom Tue. September 17th, 7:00 pm Eastern
Register and Join the Webinar
Sign up to receive notifications about upcoming information sessions for the GW Online Doctor of Engineering in Cybersecurity Analytics program.
Subscribe Today
Awards: PhD
Study modes: Full-time
Funding opportunities
Placements/internships
Programme website: Cyber Security, Privacy and Trust
Join us online on 25 September to learn more about Scotland, the city of Edinburgh and postgraduate study at the University.
Find out more and register
The increasing reliance of systems and services on information technology in the public, private and third sector has significantly raised the impact of cyber attacks in the last two decades.
This PhD programme in Cyber Security, Privacy and Trust is a response to the growing need for highly specialized research and training in these topics. Cyber security and resiliency is a complex problem that requires designing and understanding underlying technologies but also how business processes, cost, usability, trust and the law play a role for effective technology deployment.
The aim of this PhD programme is to provide students with research training in specialised topics of security, privacy and trust, helping produce the next generation of world-leading experts of the field.
The PhD in Cyber Security, Privacy and Trust trains you as a researcher and allows you to develop advanced techniques and in-depth knowledge in a specialist area. You will develop an all-round knowledge of your discipline, and a broad range of transferable skills.
You will carry out independent research, resulting in an original contribution to knowledge in your chosen area, working under the guidance of your supervisors.
The prescribed period of study is 36 months if studying full-time, or between 48 and 72 months if studying part-time.
Year 1 of PhD studies is probationary. Your supervisor will identify your training needs, if any, and invite you to attend lectures relevant to your research topic. These lectures may be selected from those offered to MSc students or may be specialist courses and seminars organised by the School's various research groupings.
Towards the end of Year 1, you will be expected to submit a thesis proposal which identifies a specific research topic, reviews the relevant literature, outlines a plan of research to address the topic, and describes progress made so far.
Progress during your PhD is assessed by annual reviews, which formally determine whether you can progress with your PhD. You will be required to complete and pass a PhD annual review at the end of each year of study and thesis is expected to be submitted at the end of Year 3. Following thesis submission, you will be required to attend an oral examination (or viva) which will be conducted by an external and internal examiner.
We link to the latest information available. Please note that this may be for a previous academic year and should be considered indicative.
Award | Title | Duration | Study mode | |
---|---|---|---|---|
PhD | Cyber Security, Privacy and Trust | 3 Years | Full-time |
Many postgraduate research students in the School of Informatics undertake at least one optional internship during their PhD, gaining important transferable skills whilst working with companies, public or third sector organisations.
The School of Informatics maintains a range of connections to potential employers in the cyber security and other sectors. Work placements or internships are considered a valuable aspect of research training as they expose students to an applied research culture, and can provide valuable contacts for future job searches.
As a research student in the School of Informatics, you will have access to a highly respected academic staff community, including staff who have won prizes for their research and who are Fellows of learned societies.
The University of Edinburgh has been recognised as a UK Academic Centre of Excellence in Cyber Security Research. This is based on the amount and quality of its research output, as well as its level of PhD training.
Within the School of Informatics, the Security, Privacy and Trust Group includes academic staff who lead research in a range of technical and socio-technical areas of cyber security. Staff also supervise PhD students on this programme.
You will carry out your research under the guidance of a primary supervisor and at least one other secondary or co-supervisor. You will be expected to attend seminars and meetings of relevant research groups and may also attend lectures that are relevant to your research topic. Periodic reviews of your progress will be conducted to assist with research planning.
A programme of transferable skills courses will be offered, which facilitates broader professional development in a wide range of topics, from writing and presentation skills to entrepreneurship and career strategies.
The award-winning Informatics Forum is an international research facility for computing and related areas. It houses more than 400 research staff and students, providing office, meeting and social spaces.
The Forum also contains several robotics labs, an instrumented multimedia room, eye-tracking and motion capture systems, and a full recording studio amongst other research facilities. Its spectacular atrium plays host to many events, from industry showcases and student hackathons to major research conferences.
Nearby teaching facilities include computer and teaching labs with more than 250 machines, 24-hour access to IT facilities for students, and comprehensive support provided by dedicated computing staff.
There are further specific facilities to support aspects of cyber security research, including an Internet of Things Lab and a Network Security Lab. The Blockchain Technology Lab is a research lab supporting investigations into distributed ledger technology.
Among our wider entrepreneurial initiatives is Informatics Ventures, set up to support globally ambitious software companies in Scotland and nurture a technology cluster to rival Boston, Pittsburgh, Kyoto and Silicon Valley.
There is high demand for security and privacy experts in industry, academia, and the public sector. Commercially, there is also a large variety of opportunities in both small and large companies.
Previous PhD graduates associated with the Security and Privacy Group have gone on to employment in industry with companies including:
Students have also gone on to be employed within academia, at institutions, to name a few, including:
These entry requirements are for the 2024/25 academic year and requirements for future academic years may differ. Entry requirements for the 2025/26 academic year will be published on 1 Oct 2024.
A UK 2:1 honours degree, or its international equivalent, in computer science, mathematics, linguistics, or a related discipline. A Masters degree or equivalent, in information security, cyber security or a closely related discipline is recommended.
Check whether your international qualifications meet our general entry requirements:
Regardless of your nationality or country of residence, you must demonstrate a level of English language competency at a level that will enable you to succeed in your studies.
We accept the following English language qualifications at the grades specified:
Your English language qualification must be no more than three and a half years old from the start date of the programme you are applying to study, unless you are using IELTS , TOEFL, Trinity ISE or PTE , in which case it must be no more than two years old.
We also accept an undergraduate or postgraduate degree that has been taught and assessed in English in a majority English speaking country, as defined by UK Visas and Immigration:
We also accept a degree that has been taught and assessed in English from a university on our list of approved universities in non-majority English speaking countries (non-MESC).
If you are not a national of a majority English speaking country, then your degree must be no more than five years old* at the beginning of your programme of study. (*Revised 05 March 2024 to extend degree validity to five years.)
Find out more about our language requirements:
If you are not an EU , EEA or Swiss national, you may need an Academic Technology Approval Scheme clearance certificate in order to study this programme.
Scholarships and funding, featured funding.
Please note that some University and School scholarships require separate applications via the Scholarships portal.
If you live in the UK, you may be able to apply for a postgraduate loan from one of the UK’s governments.
The type and amount of financial support you are eligible for will depend on:
Programmes studied on a part-time intermittent basis are not eligible.
Search for scholarships and funding opportunities:
Select your programme and preferred start date to begin your application.
Application deadlines.
Applications for 2024/25 entry are now open and can be submitted all year round.
Please submit your completed application at least three months prior to desired entry date.
If you want to be considered for School funded PhD scholarships you must apply by one of two rounds:
1 | 24 November 2023 |
2 | 26 February 2024 (date extended) |
(Revised 25 October 2023 to update application deadlines)
(Revised 15 February 2024 to extend the round 2 application deadline)
You must submit two references with your application.
You must submit an application via the EUCLID application portal and provide the required information and documentation. This will include submission of:
Only complete applications will progress forward to the academic selection stage.
Read through detailed guidance on how to apply for a PGR programme in the School of Informatics:
Find out more about the general application process for postgraduate programmes:
London, Bloomsbury
It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.
Overseas tuition fees (2024/25), programme starts, applications accepted.
Applications closed
A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.
The English language level for this programme is: Level 2
UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.
Further information can be found on our English language requirements page.
If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.
Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .
International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.
This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.
We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).
You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.
This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.
UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.
UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).
Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.
Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.
Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.
Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.
The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .
You are assigned a first and second supervisor who you will meet regularly. You will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.
In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.
You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.
During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.
Supervision within this programme is available in an extensive range or research areas including:
The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.
The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.
This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.
Find out more on our CDT website.
This programme is not currently running a part-time option.
Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.
All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.
Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .
Fees for this course.
Fee description | Full-time | Part-time |
---|---|---|
Tuition fees (2024/25) | £6,035 | £3,015 |
Tuition fees (2024/25) | £31,100 | £15,550 |
The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .
Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.
For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .
The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.
For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.
For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .
Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas
All applicants are asked to identify and contact potential supervisors before making an application.
Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.
UCL is regulated by the Office for Students .
Want more info.
We're so glad you're interested in UNT! Let us know if you'd like more information and we'll get you everything you need.
The UNT Information Science Ph.D. program with a concentration in Cybersecurity responds to the varied and changing needs of an information age, increasing recognition of the central role of information and information technologies in individual, social, economic and cultural affairs.
The mission of UNT's Information Science Ph.D. program is to provide a center of excellence in graduate education and research. Its primary goals are to:
Students are recruited to the program from a wide range of disciplines and encouraged to expand and refocus their expertise and skills in cutting-edge areas of information science that cross disciplinary boundaries. The multifaceted nature of information science warrants the focusing of resources, courses, and faculties from a broad range of academic units.
What can you do with an information science ph.d. with a concentration in cybersecurity.
Graduates of the program are prepared to contribute to the advancement and evolution of the information society in a variety of roles and settings as administrators, researchers, and educators.
Explore more options.
Information Data Science Ph.D.
Consumer Behavior and Experience Management Information Science Ph.D.
It’s easy to apply online. Join us and discover why we’re the choice of nearly 47,000 students.
Cybersecurity Guide
In this guide
The digital landscape is changing, and so is higher education. Online PhD programs in cybersecurity are not just trending, they’re revolutionizing the way we cultivate experts in the field.
Whether you’re a student eyeing advanced studies or an institution looking to expand your curriculum, discover why an online PhD in cybersecurity degree is becoming the go-to option for next-level learning and expertise.
Programs to make the public aware of the problem and attract bright young minds to the profession are becoming more widespread and are starting to have an effect.
With the ranks of willing candidates beginning to swell, certificate, training and education programs are in great demand. The number of available degree programs offered by colleges in particular is gaining momentum .
Bachelor’s degrees have become a near necessity for new cybersecurity professionals in recent years. And higher-level positions like chief information security officers (CISOs) often require a master’s degree .
At present, though, the need for doctorate degrees in cybersecurity is becoming evident.
High-level management positions, higher-education faculty posts, and advanced research initiatives are all growing in demand much more quickly than the numbers of candidates to fill them.
Generally speaking, most doctoral candidates will fill the rapidly expanding and critical roles of educators, consultants, and researchers.
PhD’s (doctor of philosophy degrees) and DSc’s (doctor of science degrees) are designed for these roles.
PhD’s tend to focus on theory and research, while DSc’s study research and technical expertise. With more focus on technical knowledge, DSc’s sometimes continue working directly in practical applications within the field.
On the other hand, DPS’s (doctor of professional studies degrees) are almost entirely devoted to the highest levels of training in hands-on practical knowledge and skills instead of theory and research.
All three types of doctoral programs are now available to those wishing to advance their careers to the pinnacle of the cybersecurity field.
However, PhD is by far the most commonly offered doctoral cybersecurity degree at present, followed by DSc’s and DPS’s.
The world has a critical need for infosec practitioners, but there is also an equally essential need to expand the capacity of our educational institutions to teach new practitioners.
We also are in dire need of advanced, innovative, strategic thinkers to conduct research in the science of cybersecurity.
Capitol technology university, nova southeastern university, the george washington university, mississippi state university, marymount university.
These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.
Six steps for choosing an online phd cybersecurity program.
So with all of these options available, as well as a growing number of colleges offering these programs, how can one best decide which direction is right for you? Here is a quick six-step process to help.
1. Self-appraisal : Those looking to expand their knowledge and background in cybersecurity with a PhD have already succeeded in attaining lesser degrees and certifications, and likely have several years of work experience as well.
That education, and exposure to practical applications provide an excellent overall view of the infosec world. All that experience will be critical in deciding exactly which direction to explore in the next phase of a career. The biggest decisions are of two types.
2. Admission requirements : As with any college degree, each individual institution offering it will have its own views of what a desirable PhD candidate should look like.
All require at least a BS degree, some require an MS. But there are often loose specifications as to what discipline the degrees must be in, like STEM or computer science. Other demands may include a minimum GPA threshold, usually 3.0 or higher, and GRE test scores.
Waivers are for the GRE tests are often granted for candidates with strong academic or professional backgrounds. The rest is normally just paperwork, like a personal goal statement, personal and work references, a current resume, and college transcripts.
The primary point here is to pay attention to the requirements of each school under consideration, and whether it will necessitate more time, classwork, certifications, etc. to comply with these demands.
3. Tuition and scholarships : Unless an early career left a PhD candidate with an abundance of cash, money will always be a concern.
Obviously, tuition is the first number to check. But don’t stop with that. There are almost always alternatives for financial assistance available from the school, private scholarship sources, and sometimes government agencies attempting to increase the cybersecurity workforce.
And, of course, government-sponsored and private education loans exist .
4. School reputation, course quality and availability : To get the most return out of an investment of time and money in education, it’s always best to choose from schools with the best reputation among cybersecurity professionals.
Specific courses and available concentrations vary from one school to another. Students must therefore make sure a particular school’s special course offerings match their needs and desires.
5. Centers for Academic Excellence in Cyber Defense : US government intelligence agencies are perhaps the organizations most interested in developing the science and resources needed to conduct the most extensive, advanced and complete cybersecurity operations anywhere.
The National Security Agency ( NSA ) and the Department of Homeland Security ( DHS ) jointly sponsor a program to promote cybersecurity education called National Centers for Academic Excellence in Cyber Defense ( CAE-CD ). NSA conducts extensive reviews and audits of colleges offering cybersecurity college degrees and designates a select few with CAE approval .
Choosing an institution approved by the NSA provides a high level of certainty that the program offered is of the highest quality. It will also give graduates a leg up on securing a career with federal government intelligence agencies. NSA recently published a fact sheet showing 272 CAE-CD approved institutions across the country.
6. Dissertation research options and faculty : A critical part of any masters or doctoral degree is the dissertation. The exact topic and focus do not need to be determined at the outset of entering the program.
However, it should be possible to know that faculty members and other available resources provide the greatest knowledge, technology and other means of support for the student’s specialty.
For any given doctoral candidate, enrolling in an online program offering the best and most numerous courses within the cybersecurity specialty desired may be top on the list of criteria.
One should also research the infosec faculty members at the school to determine which and how many have expertise within that students focus.
If possible, a chance to meet these faculty members may be very illuminating. Requesting the opportunity to audit one or more classes will also provide invaluable insight into how courses are structured and how close a fit the tutorial style may be.
Opting to attend a PhD program with the best possible reputation among cybersecurity professionals will help open doors when it comes time to find a post-doctoral job.
An institution that cultivates an innovative environment and offers the latest in technological capabilities will help maximize the educational experience. It will also be of great educational benefit to attend a college that fosters consultative communications among students and faculty.
Probably the easiest variables to determine are tuition costs and the availability of school offered financial assistance, especially scholarships, grants, other offsets to student expenses.
Typically, obtaining a doctorate in cybersecurity will require between three and seven years of dedication.
The specific timeline will depend upon the individual college and the level of testing and qualification required for each student to be accepted into a program.
Coursework can take up to three years, depending in part depending upon credits earned and transferred before entering the program. Once courses have been completed, the next step is to design a research project for the dissertation.
With a well thought out idea in hand, have a chosen faculty mentor assist with fine-tuning the scope, and then approving the research outline.
The rest is extensive research and then writing the dissertation, while all along consulting with a faculty mentor. This phase can take two or more years, sometimes in excess of five years.
The length of time devoted to completing a dissertation will depend in part on the amount of time the candidate is able to devote to the research required.
Once the dissertation is complete, student will schedule a board review and present their research to faculty members to attain the final award of their doctoral degree.
Don’t be scared off by tuition rates at any school.
Pick the best academic environments for the degree and specialty desired first, then see what can be done to mitigate the cost.
The Cybersecurity Guide team recently took a look at the 14 programs in the US that offer an online cybersecurity PhD program in order to get a better sense of what tuition looks like at these programs. All figures below are based on out-of-state tuition rates.
$32,940 is the most affordable online PhD program and its available at the University of Cumberlands.
$56,004 is the average cost of the 14 online cybersecurity PhD programs.
$85,248 is the highest tuition and is at the University of North Texas.
There are almost always several options to consider. Some schools have work-study options where students can take classes for a semester or two, then work in the industry for a time. This provides a balance of academics and practical experience, and also income to offset tuition costs.
Of course, those already working and going to school would not be able to utilize this option.
Most frequently, scholarships, grants and fellowships will be the most accessible financial assistance vehicles.
At present, it seems most scholarships are being directed to undergraduate and graduate students, with less now available for PhD’s.
This is likely to change in coming years as demand for PhD’s is set to expand rapidly. The bulk of scholarships available for PhD candidates at present are provided through individual schools, corporate sponsors, of government agencies.
The very nature of doctor of philosophy degree programs means those who complete a PhD will be best suited to academic or theoretical applications of their cybersecurity expertise.
However, other times there are really interesting industry jobs available to PhD holders, especially in research-oriented companies.
Typically, these professionals will hold the highest of infosec management positions, such as CISO, information security director, information security manager, or the like.
But many will be destined for advanced investigative research into the cutting edge ideas and technologies being discussed and discovered in the cybersecurity world.
Others will opt for academic posts in higher education. And still others will be employed as consultants to large corporations and/or high leverage government agencies that often have not been able to hire enough cybersecurity employees to adequately satisfy their own needs, or just don’t possess the advanced capabilities that a PhD offers.
An online PhD in cybersecurity is an advanced academic program that allows you to earn your doctorate remotely, focusing on research and expertise in cybersecurity.
Online programs offer flexibility, making it easier for working professionals to balance studies with other commitments. Plus, you can access top-tier faculty and resources from anywhere.
The duration varies but expect to spend 3-7 years, depending on the program and your pace of study.
Graduates often pursue roles in academia, research, or high-level positions in corporate cybersecurity departments.
Yes, most employers consider an online PhD in cybersecurity as valuable as an on-campus degree, provided it’s from an accredited institution.
While convenient, online programs may lack some networking opportunities and face-to-face interactions found in traditional settings.
As is any course of study, attending school through an online college affords maximum flexibility for students with demanding lives. Whether the limiting factor is work, family, health restrictions or other reasons, a flexible online doctoral program permits PhD candidates to work toward a goal on their own time.
Below is a complete list of schools offering online PhD programs that features current and comprehensive information for an easy side-by-side comparison.
Dakota state university, marymount university, school of technology and innovation, national university, naval postgraduate school, nova southeastern university, college of computing & engineering, the university of fairfax, the university of the cumberlands, university of north texas, university of tulsa.
No residency, no group work, 100% online learning, phd in cybersecurity overview.
As organizations produce more and more data – and stake their future on its security – the risks associated with possible data theft and other malicious interventions have become ever greater. NU’s Cybersecurity specialization in Technology Management will prepare you to take a leadership role in helping thwart hackers and other security breaches. In this program, you will be encouraged to think outside of the box as an innovation leader who stays one step ahead of those dedicated to breaching security. Our PhD Cybersecurity specialization will prepare you for a variety of technology leadership roles in both government and private organizations. Upon graduation, you will be well prepared to anticipate and mitigate risks in managing and deploying data-intensive systems.
Unmatched Flexibility
NU offers weekly course starts, no scheduled lecture hours, no group assignments, weekly assignments, and the ability to schedule courses around your personal and professional obligations.
100% Doctoral Faculty
No matter the degree level you pursue, you can rest assured that you will be mentored by doctors in your field of study.
One to One Engagement
You won’t have to fight for face time as one of many within a classroom. At NU, you’ll have the opportunity to interact one to one with your professor, receiving personalized mentoring.
Credit Hours : 60
Courses: 20
Estimated Time to Complete: 50 months
*Credit hours and courses reflect new students meeting credit requirements and utilizing no transfer credits. Est. Time of Completion reflects new students following the preferred schedule designed by the Dean for the program.
Dissertation Completion Pathway (DCP) is a 100% online pathway helping students “All But Dissertation” finish their doctoral degree.
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.
Search the site
Modal window with site-search and helpful links
Featured Programs
Helpful Links
Terms & Conditions
By submitting your information to National University as my electronic signature and submitting this form by clicking the Request Info button above, I provide my express written consent to representatives of National University and National University affiliates (including City University of Seattle) to contact me about educational opportunities. This includes the use of automated technology, such as an automatic dialing system and pre-recorded or artificial voice messages, text messages, and mail, both electronic and physical, to the phone numbers (including cellular) and e-mail address(es) I have provided. I confirm that the information provided on this form is accurate and complete. I also understand that certain degree programs may not be available in all states. Message and data rates may apply. Message frequency may vary.
I understand that consent is not a condition to purchase any goods, services or property, and that I may withdraw my consent at any time by sending an email to [email protected] . I understand that if I am submitting my personal data from outside of the United States, I am consenting to the transfer of my personal data to, and its storage in, the United States, and I understand that my personal data will be subject to processing in accordance with U.S. laws, unless stated otherwise in our privacy policy . Please review our privacy policy for more details or contact us at [email protected] .
By submitting my information, I acknowledge that I have read and reviewed the Accessibility Statement .
By submitting my information, I acknowledge that I have read and reviewed the Student Code of Conduct located in the Catalog .
National University
Chat Options
School of Engineering, Computing and Mathematics
Duration | |
Course type | Full-time, Part-time route available |
Study location | Plymouth |
Cyber security is a fundamental requirement for all users of technology – helping to protect organisations and people from a significant, wide variety and constantly evolving threat. This ever-changing threat landscape requires constant innovation in the technologies that provide protection.
Programme overview.
Fees, costs and funding, how to apply.
The Doctoral College is able to answer any questions you may have about applying for or undertaking a postgraduate research degree at the University of Plymouth: [email protected] or +44 1752 587640 . For initial enquires or questions, please contact Professor Nathan Clarke who will liaise with you and the appropriate member of academic staff to discuss your background and work towards producing the prima facia case.
The PhD Cyber Security programme is an opportunity to immerse yourself in a programme of study that will lead you to making a significant novel contribution to knowledge. Supported by the Centre for Cyber Security, Communications and Network Research (CSCAN) and our internationally recognised academics, candidates will undertake a body of research focused upon a targeted area of cyber security, publish papers and contribute to the wider community and body of knowledge.
More related news
Assistant Professor at Majmaah University, Saudi Arabia Artificial intelligence consultant at MMG labs, Spain (part-time)
My PhD research was about developing a pioneering algorithm able to link individuals with digital objects that they interact with (e.g. images/documents) leveraging biometric features. The project resulted in five scientific publications and granted a patent to protect the novelty of the developed system.
My experience at the University of Plymouth is unforgettable, as having an excellent supervision team led by Professor Nathan Clarke has dramatically developed my knowledge and research skills in the domain of cybersecurity and biometrics. The University gave me the opportunity not only success in my research but also participating in teaching, training activities. Resulted in getting a teaching certificate and become a module leader. Not only I who loved living in Plymouth city but my family also loved it! From nice public schools to sports centres, national reserves with beautiful rivers made my family loved it.
PhD: Image Analysis in Digital Forensics
Shahlaa Mashhadani graduated with a PhD in Cyber Security and is now working for Baghdad University as an academic lecturer in a computer science department in Iraq.
“My project automated the identification and extraction evidence from multimedia content to reduce the time and investigator’s cognitive load to solve a crime. Studying PhD in the University of Plymouth has helped me improve my academic skills and knowledge in my field. Without this experience, I would have not been at this stage right now. Moving to Plymouth has really improved my English language and I got to see a whole different life. The people over there were very welcoming, kind and supportive”.
"I was working as a Lecturer at School of Computing and Mathematics at University of Kufa (Iraq). I moved to Plymouth to study a PhD that concentrated on securing smartphones by using the rich sensing capabilities of the wearable devices. There is a potential invention to use these devices for designing a novel health care model that provides comprehensive and continuous medical care to patients with a goal to obtain maximal health outcome using the patient’s biometric information (e.g. skin temperature, heartrate, and acceleration).
The starting of my academic was very difficult and I decided to suspend my study and back home. Then everything was fine as my supervision team were very patient, kindness, supportive and have a great impact on my career. I had the opportunity to improve my skills (English, academic writing, presentation skills). Plymouth is a nice place to live and being able to network with others."
PhD: Activity-Based User Authentication Using Smartwatches
Improving emergency service incident responses. Sharing space-data. Fighting cybercrime. The Centre for Cyber Security, Communication and Network Research (CSCAN) is driving technological advances that are changing our world for the better.
As well as accessing our standard computing facilities , you’ll be able to make extensive use of a 42-seat dedicated security and digital forensics laboratory, purpose-built to represent a range of network topologies and monitoring conditions.
Professor in cyber security and digital forensics.
Deputy vice-chancellor - research and innovation.
Associate professor.
Lecturer in computer science.
Lecturer in cyber security.
Associate professor in cybersecurity.
Meet our school technical staff , funding for postgraduate research students.
Find out more about the Doctoral College and the support it offers students, supervisors and examiners of postgraduate research at the University of Plymouth.
Cybersecurity Degrees » Online Cybersecurity Degree Programs » Online PhD in Cyber Security Degrees
Consider a sponsored online program currently accepting applicants.
School | Program | Admissions |
---|
Click to see sponsored 100% online cybersecurity programs currently taking applicants for 2024 .
Doctorate-level degrees in cybersecurity provide advanced knowledge and valuable research opportunities to professionals that are looking at some of the highest positions in their industry. This type of education is also extremely valuable to professors and researchers that are looking to continue their studies even after the completion of this program. These further studies will lead to academic research papers and innovation in the field of cybersecurity.
Obtaining a Doctor of Philosophy, or PhD, gives working professionals the skills needed to research and develop new security measures and the expertise to maintain the information technology sector of an organization.
Having the ability to do this online is convenient for those that are looking to gain an education while continuing their career path, but there are many programs that require on-campus residencies to prepare students or to present their final dissertations. Various degrees will emphasize either practical solutions to cybersecurity issues or finding new innovations through theory and historical development of protecting vital information.
Receiving the high-level graduate degree within cybersecurity opens up the entire information technology industry. There is a significant need for experts that can fend off data breaches and internet attacks to a company's network and retrieve sensitive information, such as personal client medical records or consumer transactions with exposed payment methods.
Ensuring that communication is secure has only become more important as people continue to rely on the transfer of information on various devices and apps constantly every day.
There are variations of the doctorate that students can study to receive specific education, and it revolves around the solution to industry problems within the cybersecurity. Those receiving the discipline directly will typically apply practical solutions directly to the company they represent. A Doctor of Philosophy, or PhD, may explore specific topics in network security or computer science, and education revolves around theory and how to find solutions to issues like cyber attacks through research and development.
After completion of a doctoral program, graduates should be able to solve complex issues within the company or organization they represent. They have gained the advanced and expertise knowledge in a particular sector and should be able to deal with any cybersecurity issues that arise. Ultimately, their goal is to improve cybersecurity systems and to help them protect organizations more efficiently on a national and/or global scale.
Many online-based institutions that offer programs within computer science and cybersecurity also feature accredited doctorate degrees. Students can expect to find disciplines directly in cybersecurity or in a similar field, such as information assurance or security in information technology. Even though the curriculum may be fully available online, each institution has their own unique requirements when it comes to presenting final dissertations or holding on-campus residencies.
When reviewing online programs, it is important to consider institutions that have been designated as a National Center of Academic Excellence by the Department of Homeland Security and the National Security Agency. This shows that the program has been reviewed alongside a rigid criteria to ensure that students are fully prepared to enter into the field of cybersecurity. Programs hold accreditation in specific categories, such as cyber defense education, cyber defense research, and cyber operations.
There are very few programs available online where students can fully complete a PhD within cybersecurity. Many programs require the student to complete on-campus residencies that will give them the opportunity to meet faculty members and students. During these times, they may also work on their dissertation, and they must complete a defense of their dissertation in front of faculty members to show their expertise on the particular topic.
While there are a limited amount of programs that specifically have a discipline in data science, this can often be found as a specialization within disciplines such as Computer Science or Computer Engineering. Other similar concentrations include Information Assurance, Information Systems Security, and Digital Forensics. Information Assurance focuses on the validation and authenticity of data within an organization, and Digital Forensics focuses on the investigative process to solve digital-based crimes in a court of law.
Students should prepare for online coursework that blends with on-campus requirements if they are considering a doctorate degree with an online format. An alternative to this process is finding an online Master's degree in a similar discipline that can be used to count toward the PhD. There is plenty of overlap in these programs, and this flexibility may allow for students to switch over from a Master's degree to a PhD with high academic merit.
Most PhD programs will require the student to meet on-campus at certain times of the program, such as once per year, but these are not lengthy requirements to satisfy. Residencies will typically last from a weekend to a full week and mostly consist of the student working on their dissertation. Any lab sessions or courses that require application of what is learned can generally be accomplished in a virtual setting or at the professional's place of work if applicable.
In order to complete online courses, students will need to verify that they have the proper setup to run the learning management system used by the university. This typically requires a Windows or Mac operating system that runs on a desktop or laptop computer. For some course materials, this can be accessed by a mobile device, such as a smartphone or tablet, but not all work can be completed in this format.
Additional technical requirements include having access to high-speed internet in order to download or stream on-demand lectures. A webcam and microphone may be required for courses that require students to attend lectures on a live basis. Other applications, such as Microsoft Office, web browsers such as Google Chrome or Mozilla Firefox, anti-virus software, and Adobe Acrobat Reader may be needed depending on the university.
Doctorate degrees for cybersecurity generally require anywhere from 60 to 80 credit hours to complete, which can span from three to five years. Most of the program is dedicated to core courses and a concentration in cybersecurity if available. There may be some credit hours needed for electives that may either be part of the discipline being pursued or free electives to customize the program to fit an industry or particular career needs.
Around a third of most PhD programs will feature dissertation requirements. A dissertation is a research project with a specific focus on a topic in cybersecurity, such as a problem that is plaguing a certain industry. Once a topic is suggested and approved by a program faculty member, students are able to pursue the writing project and they will have to defend their dissertation at the end of the program.
In addition to the dissertation, multiple exams may also be needed to further expand on all the skills and concepts learned in the program. A qualifying exam will ensure that students are able to continue on with the PhD and begin their process with the dissertation. The comprehensive exam tests all the skills and concepts that the student has learned, which is usually completed at a separate time than the dissertation defense.
It is not a requirement to have a Master's degree for many computer science-based doctorate programs. Students can typically transfer over their credit from a Master's program if they choose to pursue a doctorate degree at a later date. This can cut the doctorate program nearly in half for students, decreasing the time commitment required and academic costs.
To gain the PhD degree at the end of the program, students will need to pass all examinations and successfully defend their dissertation. Many programs require that the student also maintains at least a 3.0 GPA during their studies. With many courses providing advanced topics, students must maintain a high level of academic achievement in order to successfully complete the program.
Getting into a doctorate program requires the completion of a Bachelor's degree from an accredited institution with high academic marks. Typical requirements for a Master's degree are holding a 3.0 cumulative GPA in their undergraduate studies, or this was achieved in the final 60 credit hours of their studies. For a PhD, this can jump to a GPA requirement of 3.3 or 3.5 overall.
Prospective students are not limited to this GPA requirement, but they may only receive conditional admittance into the program. This means they will need to achieve high marks in the first portion of the program in order to continue pursuing the degree. A slightly lower GPA than the requirement can be offset by higher Graduate Record Exam (GRE) scores or additional professional experience in cybersecurity.
Depending on the university, applicants will need to send their unofficial or official transcripts that showcase their accomplishments in higher education. If unofficial transcripts are only needed with the application, sending official transcripts are usually required once the student has been admitted into the program. This includes all academic work at various levels, including any certifications that have been earned.
Applicants should send their most updated resume to the university that showcases all of their prior work history and internship experience gained in other programs. Some programs may require a certain amount of work hours to get into the program, or students may need to complete this prior to graduating from the doctorate program. Resumes should include any accomplishments or
Multiple letters of recommendation are typically needed to verify that the student has high levels of accomplishment in this field. They may require some of the letters to be from an academic professor, but another source can be prior supervisors or managers in a professional work place. Applicants should review what specific requirements are needed with the letters of recommendation as they vary based on institution.
Personal essays are a common requirement in the application process, with potential candidates listing out why they have chosen a particular institution for their studies and what career goals they have in the cybersecurity field. These essays may also go into detail about any accomplishments within an industry that the individual has achieved.
Doctorate degrees are often at least twice the length of a Master's degree program, meaning that students typically need between three to five years to complete their studies on a full-time basis. It is recommended by many schools that students pursue these graduate studies on a full-time basis due to the complexity of course content and the amount of time it takes to complete the dissertation and various assignments.
Many PhD degrees are geared for full-time study and may have some complications for those that are looking to pursue the program on a part-time basis. It may be difficult to focus on research projects without full concentration and may impact the quality of the research accomplished. Even on a part-time basis, there may be too much to balance when accomplishing high-level studies and continuing as a working professional.
Instead of completing the PhD along with a part-time job, students may consider looking at graduate assistantships or other positions within the university. This allows individuals to pursue their degree while completing various tasks for professors for a certain amount of hours per week. By accomplishing this, students will receive part or all of their tuition expenses cut and a stipend to pay for other needs.
Part-time study may be accepted at the institution, but students will have to consider the length of time it will take to complete their studies. This will increase the overall costs of the program with additional fees given out for extra years pursuing their degree. There is also a time limit at most universities, requiring students to complete the doctorate program in seven or eight years on average.
Other problems can emerge with completing the program on a part-time basis. In addition to the difficult coursework that requires plenty of focus, it may be a problem to balance struggles that exist in current employment and trying to complete advanced coursework at the same time. There are also limitations in communicating with other faculty members and students for additional help or working on group projects.
It is also important to determine that the program has been verified as an accredited institution and the university has been designated as a National Center of Academic Excellence (CAE) from the National Security Agency (NSA) and Department of Homeland Security (DHS). This means that the curriculum has met rigorous requirements under different security topics, such as cyber defense and cyber operations.
Regional accreditation is based on where the university is located and remains a standard when institutions are looking at students for their graduate programs. The six states based in the New England region are accredited by the New England Association of Schools and Colleges. The Southern Association of Colleges and Schools reviews a number of places in the Southeast and along the East Coast, including the states of Florida , North Carolina , Texas , and Virginia .
Northcentral university.
This online college based in San Diego, California, has a number of doctorate programs available in technology, including the Doctor of Philosophy in Technology and Innovation Management. Within the doctorate program, there are six specializations to consider, including Cybersecurity. Students should expect to complete the program in the span of 50 months.
A total of 60 credit hours are needed to fulfill degree requirements, and with most courses being worth three credit hours, 20 courses will be taken in the program. 48 credit hours must be completed at the university, which allows for 12 total credit hours to be transferred into the program. Students must complete all courses while maintaining a 3.0 cumulative GPA.
Courses that students can explore in the main program include Computer Networks and Mobile Computing, Statistics with Technology Applications, and Technology Policy and Strategy. The latter course focuses on legal analysis in network security and gives students case study to review and policies that organizations must follow based on federal guidelines. 18 total credit hours are needed for the Cybersecurity specialization, with courses such as Cyber Forensics and Advanced Risk Management.
One of the unique student services the university offers is the Dissertation Completion Pathway, which gives those that were not able to complete their dissertation elsewhere to do so at their institution. This is a shorter program that requires at least 23 credit hours.
Gaining a Doctorate degree in Cybersecurity through the technology institution prepares students for executive roles within the private sector and any government level. There are various electives that can customize the program and give specialty skills and knowledge within the security of health care, information assurance, cybersecurity software development, and strategic management for intrusion detection and eliminating vulnerabilities.
Up to 66 credit hours are needed to complete the curriculum at Capitol Tech, which is based in the Greater Washington DC area and is also available online. Along with dissertation preparation, some courses include Information Assurance Consulting, Advanced Mixed Methods Research, and Special Topics in Human Resource Management. There is a 16-week course that prepares students for the doctoral degree with specialized research for the career path they are pursuing.
Prospective students can apply for the doctorate degree in cybersecurity for the fall and spring semesters. An essay of at least 1,000 words that covers what the student plans to do within the cybersecurity field. Applicants must submit the essay with the application form and a fee, official transcripts, updated resume, and multiple letters of recommendation. More information may be necessary based on the college’s review.
The College of Computing and Engineering provide a PhD in Cybersecurity Management, which requires 67 credits to complete and is offered in a hybrid format. This means students will be mostly completing coursework and generally interacting with students and faculty members online, but they will have physical meetings once per term at the Fort Lauderdale campus. These are required meetings for students.
Examples of core courses that students will complete include Information Security Risk Management, Secure Systems Analysis and Design, and Human-Computer Interaction. 24 credits are reserved for dissertation studies, and students will also need to complete two doctoral research studies within information assurance. Some of the goals the university has for their graduates are to gain advanced knowledge within cybersecurity and to be prepared to lead and manage cybersecurity teams with strong communication skills and being fully competent of the ethics required.
Students looking for a fellowship opportunity to satisfy financial needs and gain additional experience may be eligible for one of six positions offered by the school. Applicants must submit a reference letter, hold at least a 3.0 cumulative GPA, and are going into a career that involves teaching or research. Recipients are not able to hold a job so they can commit their time to education and research, but the award provides tuition assistance for the duration of the program.
The Beacom College of Computer and Cyber Sciences offers the Doctor of Philosophy in Cyber Operations, which focuses on advanced topics in cybersecurity. Graduates from the program have gone on to work at organizations such as the Central Intelligence Agency, US Army Intelligence and Security Command (INSCOM), and Carnegie Mellon’s Software Engineering Institute.
Along with the core curriculum and research-driven courses that account for 24 total credit hours, students will need to complete three credit hours of on-campus research seminars. Meeting faculty members, determining a dissertation topic, and finishing dissertation defense is accomplished in this requirement. 25 credit hours are geared toward the dissertation itself, and the remaining nine credit hours are for customizable electives.
Some courses are only available at certain times of the year. For example, dissertation work is available all year long, but Dissertation Preparation is only available in the spring on an annual basis. All students must maintain a 3.0 cumulative GPA, and no more than two C grades are allowed in the entire curriculum or the student will be put on academic probation and eventual dismissal if the grades do not improve.
In order to get into the program, students must hold a Master’s degree from an accredited institution with a 3.0 cumulative GPA or higher. GRE scores are required in the admission process, but these are waived if the student has accomplished a 3.25 cumulative GPA in their Bachelor’s degree. Entry is only available for the fall semester into this program, so applications must be received by May 1st each year.
Students can pursue the Doctorate of Computer Science with an emphasis in Big Data Analytics or Cybersecurity and Information Assurance. This is a program with an expected time of at least three years to complete. There are multiple start times throughout the year providing flexibility for students to enter into the program.
While the curriculum is fully available, there are in-person residencies that are required – two residencies are needed for this program and they are held quarterly in the Denver area. This gives students an ability to meet with other peers in their classes and faculty members one-on-one and there are various events that will aid in dissertations required for the student to complete. Students can maintain their schedule and join discussions with the CTU Symposium mobile app.
The 100-credit hour curriculum consists of the residencies, many levels of Doctoral and Dissertation Research, and various advanced topics within cybersecurity, such as Foundations of Digital Systems Security, Enterprise Security Architecture, and Principles of Research Methods and Design. At the conclusion of the program, students will be presenting their final dissertation and must be approved by a faculty supervisor.
An online Doctor of Information Technology (DIT) with emphasis in Information Assurance and Cybersecurity can be obtained through the Minnesota-based institution. Students can also elect to take courses at the Minneapolis campus or pursue a combination of both. The curriculum is divided up into eight core courses and four specialization courses, along with various dissertations and three residency requirements, all requiring four days of attendance.
Capella offers two versions of information technology degrees at this education level – the DIT and the Doctor of Philosophy in Information Technology. The DIT prepares students to solve business problems and to apply what they have learned directly into their career. Having a philosophical approach in the other program explores new theories that can be used to solve these issues instead. While both programs have a difference in solution, there is overlap in the specialization of assurance and cybersecurity.
The Doctor of Philosophy in Information Technology features a specialization in Information Assurance and Cybersecurity, giving students the capability to learn advanced knowledge in the field. In addition to five specialization courses, students complete a comprehensive exam that reviews all of the material they have learned, a dissertation spanning a large portion of their studies, and three on-campus residencies.
Courses in the specialization include Enterprise Security Risk Management, Network Security Advances, and System and Application Security Advances. These topics cover the advancement of security and how this has impacted their implementation into company networks. Students do not have the availability to transfer in these courses for the specialization and must be taken through the school. Some specialization courses must be completed through this campus, including System and Application Security Advances and Enterprise Security Risk Management. The latter course has students review academic research and professional reports on risk modeling that impacts managerial decisions. Security advancement courses focuses on improvements in the field and the advantages of improving these processes with new available technology.
All three on-campus residencies focus on dissertation research, which first begins through an overview in an online course and the student builds upon their research when they meet faculty members and other students. The goal of the dissertation is to build critical thinking skills and the ability to communicate with others to help improve the dissertation, which requires significant research after determining a topic.
GuidedPath is a unique resource available to students that helps them get through the doctorate degree in a more focused process online. They will take between one to three courses during each of the four quarter terms available, which requires 10 weeks to complete. Based on availability and schedule, students will take the courses they have time for and only pay for what they are pursuing.
The College of Arts and Sciences offers a Doctor of Philosophy in Computer Science, which can utilize the graduate certifications available in Cyber Security and Digital Forensics. All courses are available online, with lectures streamed on demand for students to learn at any time of the day, and all lab sessions are completed through the cloud-based infrastructure.
Examples of courses that can be completed and applied to the doctorate degree include Advanced Topics in Network and Systems Security, Advanced Incident Response, and Penetration Testing. Many courses will only be available at certain times of the year, and courses must be followed along a certain path in order to meet prerequisites for the more advanced courses.
Coursework is typically distributed each Friday, meaning students will have a week to complete their assignments and submit them by each Friday, and new coursework will be available on that day. Students have the capability of studying on their own time as long as they continue to meet deadlines.
Applications are accepted for these programs throughout the first half of the year to get admission for the fall, which is required for graduate certification in Cyber Security. Students must have a Bachelor’s degree with an undergraduate cumulative GPA of 3.0 or higher. There is no requirement to submit GRE scores, but other additional needs include two letters of recommendation and a statement of purpose.
University of tennessee.
The Tickle College of Engineering offers a few options for cybersecurity studies at the Knoxville campus location. One of the advanced programs is a Doctor of Philosophy in Computer Engineering, with a concentration in Cybersecurity. The amount of credit hours needed depends on if the student has taken a Master’s degree or hold prior academic work in the same discipline or related, such as computer science.
At least 72 credit hours are needed for students that only have a Bachelor’s degree or simultaneously completing a Master’s degree in a similar field through the university. This truncates to 48 total credit hours if they already have a Master’s degree. At least 24 credit hours are earned through taking dissertation courses and completing the research and writing requirements.
The comprehensive exam features both a written and oral segment, which connects with the dissertation, but may have additional writing requirements. Students must have a strong understanding of the topic they have studied and can thoroughly explain many aspects of it while demonstrating competency in communication and critical thinking. At least six months need to separate the comprehensive exam and defense of the dissertation.
Admission requires outstanding work in a Bachelor’s degree for students to be able to jump from the undergraduate program to the PhD program. GRE scores are needed for the admission process and should have been obtained in the last three years. For students that have a Master’s degree, up to six credit hours from courses that match the 400-level and above can be transferred into the program.
Through the School of Computing, Informatics, and Decision Systems Engineering, students can complete the Doctor of Philosophy in Computer Science with a concentration in Cybersecurity. Students will complete five core courses that explore different aspects of computer science, and there is no ability to transfer credit for those courses unless they have already taken the courses at Arizona State University. Students do not have the capability to duplicate credit between the concentration focus and the core curriculum.
Nine total credit hours will count toward the Cybersecurity specialization. There is an overview of Information Assurance, then students will pick two of the following three courses: Advanced Computer Network Security, Applied Cryptography, or Software Security. 24 total credit hours will go toward both the research and dissertation portion of the curriculum.
Admission requirements include submitting a personal statement that details professional goals and why they are choosing this particular program. It should also feature any research experience that the individual has accomplished personally. In addition, there should be three letters of recommendation validating these accomplishments, from prior professors or professionals in the industry the individual has worked in.
Other needs to get into the program include holding a minimum cumulative 3.5 GPA or higher in the last 60 credit hours of work from the Bachelor’s degree, and this should be similar to the Master’s degree overall if they hold one. Up to 30 credit hours within a different graduate program, such as a Master’s degree, can be used to account for some credit if approved by the program.
A Doctor of Philosophy in Digital and Cyber Forensic Science is available exclusively on campus for students that are looking at cybersecurity careers at the executive level or academic research at an institution. Topics include understanding network and mobile device forensics, ethical and legal issues in cybersecurity, and the basic principles of this field. 85 total credit hours are needed to complete the program for students that only hold a Bachelor’s degree.
Breaking the curriculum down, 52 credit hours are part of the core academic curriculum, 15 credit hours are gained through the dissertation, and the remaining 18 credit hours are for the internship and customizable electives. Examples of elective opportunities include Cloud Computing Forensics, Cryptography and Steganography, and Social Network Forensics.
Counting for six total credit hours, the internship will require 10 weeks of full-time commitment. This is another process to apply what the student has learned to real-time situations, giving them an additional opportunity and potential to network with an organization for improving job potential.
In order to gain admittance into the program, applicants must hold at least a Bachelor’s degree in a similar field from an accredited university, and they must have obtained a 3.5 cumulative GPA or higher. Three letters of recommendation are needed for verification, with at least two of them from faculty members. Other needs include a personal statement with a maximum of 1,000 words, updated resume, GRE scores, and a potential interview may be conducted.
The College of Engineering and Applied Science offers the Doctor of Philosophy in Security, which has been verified by the NSA and DHS as a CAE in Information Assurance Education. In graduating the program, individuals will become an expert in the topic they decide to develop a dissertation on, and they have been able to improve upon their communication skills when presenting findings or working with others collaboratively.
60 total credit hours are needed to complete this program, and half of that credit must be completed with courses that are at the 5000 level or higher. There is an opportunity to transfer in 24 credit hours if the student has completed the Master’s degree previously. Half of the curriculum is dedicated to dissertation development and presentation.
Applicants should have at least a Bachelor’s degree from an accredited institution with at least a 3.3 GPA, and those entering the program with the completion of the Homeland Defense graduate certificate must also have the same GPA requirement. Additional admission materials include having three letters of recommendation, latest resume, and will need GRE scores if they did not complete their education at an accredited university.
Courses that students can choose in this program include Applied Cryptography, Advanced System Security Design, and System Administration and Security. At least three months of cyber operations must be completed in the form of training, internship, or already established professional work. This can be substituted with the completion of a Certified Information Systems Security Professional (CISSP) certification.
Principles of cyber security.
Explores the basics of cybersecurity features at the executive and management level of an organization, including the latest innovations in the field and various security measures that can be added into information systems. In some cases, students that have already completed a Master’s degree in the cybersecurity field may be able to skip this course as it is also frequent at that education level.
Analysis of theory when defending information systems in a more complex environment, and what practices are used when implementing these solutions in an organization. Students may learn how to audit these security measures to determine their accuracy and what needs to be improved upon to avoid certain attacks. This can help in preparing recommendations and consider different strategies in established cybersecurity practices.
Having security measures in place on network servers and database management systems are key to preventing intrusions, but software can also be manipulated and compromised without security. This course looks into the different ways of implementing this type of protection in the software development process. Students may also learn how to identify rogue activities within software to identify potential threats.
A national government-focused course that emphasizes security measures that are taken to protect the United States’ critical infrastructure. This includes the important industries of public health, transportation, telecommunication, agriculture, electricity, and more. Topics may include the strengths and weaknesses of prior security implementation and how future innovations will change these procedures.
Common research methods when analyzing reports and writing the dissertation includes using quantitative and qualitative information. Students will understand the differences between these analysis methods and where to best apply them in their reports. Quantitative data focuses on specific numbers and measurements, while qualitative data focuses on more subjective information that explains these figures.
Professionals must be able to react quickly when an attack occurs on an organization’s network, mitigating disaster and sensitive information that could be compromised. Popular topics in these courses include the various tools that are used in scoping out problems and eliminating them, how to detect vulnerabilities earlier to prevent these situations, and disaster recovery processes once the damage occurs.
One of the most popular and impactful ways to determine if a strong security system has been implemented is to mimic similar attacks in a controlled environment. Penetration testing, which can be a position on its own within a cybersecurity team, oversees this event and determines the effectiveness of security that is protecting valuable information.
Institutions designated as a CAE and holding an emphasis in cyber operations will often have courses that provide a general overview of the measures taken by security-driven organizations. Topics in these courses can range from the evolution of these processes, such as how to eliminate security threats on mobile devices and cloud-based computing, and the legal and ethical policies that can be implemented.
Many doctorate degrees will have courses that prepare students for dissertations, focusing on various studying methods, sources to consider, and helping them pick topics for a proposal that they will be able to defend when presented. These courses may go into creating an outline or framework for the dissertation and look at other example proposals to gain different perspectives or to criticize. Frequently, preparation courses will serve as the platform for students to submit their proposal.
Many PhD programs will emphasize the dissertation, allocating around one-third or a quarter of the curriculum to the dedication of preparing students for their dissertation writing. These courses may include how to find a topic that works for the researching project and an official process to send this idea in to faculty members, They may also be able to work with professionals in the industry that can help them further their analysis in the topic selected.
Immediately prior to graduation, students may have the requirement to meet in front of select faculty members to present or defend their dissertation. This process tests the vulnerabilities of the writing where the student should successfully defend what they have gathered. Any preparation classes for the presentation may focus on improving presentation material and studying further information to prepare for questions.
This is the specific term used when managing and securing sensitive data within the organization’s network and system. Assurance of the information means that it remains confidential and can only be accessed by authorized parties. Many degrees will have this term within the discipline, and these courses can serve as an overview of information security and to become exposed to real-world situations.
Doctorate studies will focus on the development and stability of cybersecurity software, with uses of identifying potential threat and analyzing risk. Students typically assess the performance of security software, measuring their stability and how well they protect systems from attacks, and various ways that it can be implemented into networks.
Explores various research methods and how to perform them to help students with research for their dissertation and other studies. Topics may consist of how to read complicated information, creating visualizations from raw data or cleaning it for easier organization, surveying and interviewing subjects to gain perspective, and how to use software tools for researching. Coursework typically consists of researching and report writing to demonstrate proficiency in these skills.
Courses covering network security at the doctorate level will have an in-depth look into history and various theories involving the revolutionary technology. Topics include the advancement of network security in the industry and how this impacts various organizational networks, the benefits and disadvantages of sending sensitive information online, and encryption methods to ensure that data is kept secure when being transferred from one place to the other.
Having a doctorate in cybersecurity means that a professional has explored theories and case studies within cybersecurity, giving them expert knowledge in the field that they customized their degree toward. This makes them beneficial as information security consultants in the organization they work for. They help review the network for any vulnerabilities and they will provide information on the latest technological innovations and how to implement them for a seamless transition.
In general, IT consultants help the organization gain perspective on the strengths and limitations of the department and aids in the improvement of management and supervising team members. They may recommend technological needs based on employee and client feedback, or creating reports based off performance data and expected outcomes should the organization improve these areas.
Higher education can also give graduates with professional experience an edge in becoming a director of information technology. One of the frequent requirements when managing the entire technology infrastructure of a company is to ensure that the network security is free from vulnerabilities and that there is a protocol in place in case intrusions take place. Directors will often make the final decisions in hardware and software additions and the coordination of teams and managers.
IT directors fall under the position of computer and information systems management through the US Bureau of Labor Statistics. Average salary for this position is is approximately $142,530 , with those working within finance and computer systems design receiving above the average. The top 10 percent receives over the $200,000 mark while the lowest 10 percent sees $85,380 when salaries are reviewed across the nation.
Tuition rates will range widely based on the institution that a student selects to study their cybersecurity education, and if they are a resident in the state of the university. Smaller institutions or online-based colleges will generally be cheaper than more established institutions. When adding up full tuition for a full academic year, along with various student fees, full costs can be between $20,000 up to $50,000 per year.
For example, at Capella University, tuition for the PhD in Information Technology is $965 per credit, or $5,000 total in each quarter. The comprehensive exam and dissertation sessions are $2,895 per quarter. Unlike some programs, there is no capability to transfer credits into this program, so students will have to pay for the full tuition, which is 90 quarter credit hours.
Adding up the number of years it can take to complete a PhD program, it can be very costly to pursue this type of education. Luckily, there are many ways to bring these costs down in what essentially is an investment into a job opportunity that pays more than typical positions while just holding a Bachelor’s degree.
If pursuing the program on a full-time basis, students can consider federal student loan options if they qualify and have any remaining funds from their prior education. Part-time education is generally not acceptable for federal student loans as this requires full-time enrollment and pursuing a certain number of credit hours in a given term. Personal loans provide another option to receive funding for school, but this may have considerably higher interest rates.
In some cases, an employer may pay for the employee to receive their PhD degree in cybersecurity. This requires a commitment from the individual to stick with the company for an extended period of time, and they will likely see an upgraded role in the organization if they successfully complete the program. If the individual leaves shortly after receiving the degree, they may be responsible for paying some of this tuition.
Assistantships are frequently the best opportunity for students to receive tuition aid for their education. These are competitive positions that can pay for some or all of a student’s tuition expenses, and provide additional stipends on a monthly basis, or in each term. Assistantships will require a certain amount of hours for students to complete tasks for faculty members in addition to their studies.
For students that have excelled in their prior academics, there may be an option to apply for a scholarship to cut down on costs. While there are few scholarships that pay for full tuition, this can provide some relief for students in multiple years of their education. In addition to rewarding those with solid academics, scholarships are also available for those in difficult financial situations or are part of an underrepresented demographic.
Some graduate college-based scholarships provide automatic entry for students that are administered into the program. Select students will receive an award simply based on being admitted into a high-level program. These are typically smaller awards that lower tuition rates and there are no restrictions for these opportunities.
For the majority of scholarships that are distributed by the school or an association that is promoting cybersecurity, students will need to submit a writeup that details why they are the best candidate for the scholarship and/or list the achievements that they have accomplished so far in their career. They must also submit proof of the criteria needed to receive the scholarship award.
The National Science Foundation has a Graduate Research Fellowship Program that is geared toward students that are going after graduate-level programs within the sectors of science, technology, engineering, and management – also known as the STEM field. A total of $46,000 is awarded to an individual, which provides a $34,000 three-year stipend and $12,000 deduction in tuition that is given to the institution.
The National Defense Science and Engineering Graduate Fellowship Program also provides aid for students that are pursuing a STEM field. Students can receive up to three years of educational aid, and it covers the tuition and provides a stipend. One requirement that students must uphold is working at a laboratory session with the Department of Defense, and they need to be able to accept the full awards.
Both of these scholarships not only require students to be in the STEM field, but they must be United States citizens or nationals to be eligible. They must show proof of citizenship when applying for these awards, and they must hold strong academic standing. Eligibility for the latter program opens up in the final year of undergraduate studies.
When considering the pursuit of a doctorate degree, students must determine if it is worth the time and money for their cybersecurity career opportunity. Entry-level positions only require the completion of an undergraduate degree in this discipline, or a similar discipline such as computer science or information assurance. Advanced and senior positions can be obtained with a PhD, along with more research-focused positions in academia.
PhD degrees are geared for individuals that are looking at managerial and executive positions at industries that are looking to implement or improve their cybersecurity practices. They must understand advanced processes and be able to determine what they should do for their existing systems, or what is compatible with their information systems if they are moving to cloud-based solutions in the future.
Director positions review the analysis of network and computer security practices and make significant decisions on how the company should continue forward. They must follow the latest innovations in security measures that are being improved upon in order to keep their systems secure. It is important to keep the information technology sector updated with the latest security measures and to stay ahead of the latest hacking attacks.
Academic positions will offer more researching opportunities beyond completing the dissertation at the end of the PhD degree program. Further reports can help improve the entire field of cybersecurity when published in academic journals, or these can provide a specific focus within an industry, such as health care or the finance sector. They can also use this knowledge as a professor in a technology or engineering course within cybersecurity.
Looking at specific jobs in cybersecurity while holding a PhD degree, being a security engineer is a popular position to consider with the advanced knowledge needed in developing the architecture of an information system and making sure it is secure. These are more for advanced or senior positions that require numerous years of professional experience or hold advanced certification, like the CISSP, which is geared more toward individuals looking at management positions.
Another popular position is chief information security officer , which the job title can be slightly alternative based on the organization they are working at. Bigger enterprises will have specific designations for a CISO, but some smaller companies may only have a chief technology officer that deals with the security measures that are implemented into the organization.
When disaster strikes at an organization, the CISO is usually responsible for working with federal government or legal workers in order to determine what the next steps are needed after a data breach occurs. They are also responsible for moving forward with disaster recovery measures and working with any clients or employees that are affected. In addition, they are usually responsible for making final decisions on new implementations in the information system security processes.
According to the US Bureau of Labor Statistics , information security analyst make a mean annual wage of $104,210 across the United States. This is slightly higher for those working directly in computer systems design, which is geared for those with more experience in computer engineering and architecture.
At the higher spectrum of estimated wages in this position, workers are making an average of $158,860 among the top 10 percent. Some of the top states to consider when looking at the highest wages are New York, Virginia, and California. The highest state overall is New York with over 7,000 workers represented and over $121,750 being made on an annual basis.
In addition to the state of Virginia having the most employment opportunity in any state with over 15,000 employed, the annual estimated wage across the state is at $114,760. For the District of Columbia alone, there are 2,000 workers represented and estimated $119,160 made annually. This also makes the largest metropolitan area in terms of employment when adding in the cities of Arlington and Alexandria with Washington DC.
It’s the enemies we can’t see that are the most dangerous.
Specialized degree to protect our digital world..
Drawing on faculty from both the information technology and the computer science programs at UW-Whitewater, the Master of Science in Cybersecurity is an interdisciplinary degree that will allow students to develop deep expertise in current cybersecurity issues. All courses in the program are focused on cybersecurity, and the curriculum has been designed to align with the National Centers of Academic Excellence (CAE) program, which is jointly sponsored by the Department of Homeland Security and the National Security Agency. The goal of the CAE program is to reduce vulnerability in our national information infrastructure by promoting higher education and expertise in cyber defense.
No requirements to come to campus.
Aligns with the National Centers of Academic Excellence program.
In current issues.
The MS in Cybersecurity is a 30-credit program. This program can be started in the spring, summer or fall terms, and at a pace that works best for you. Full-time students can finish in as little as three semesters.
For a comprehensive overview of the program structure and required courses, please refer to the Graduate Catalog .
To qualify for admission to the online master’s program, you must meet graduate admission criteria.
Deadlines vary by term and are subject to change without notice. Accurate and up-to-date admission deadlines can be found on the graduate admission deadlines website .
If you do not meet the graduate admission criteria, please email us to determine if you could be admitted on a contingent basis.
International students must meet additional criteria and will be evaluated on a case-by-case basis. Contact us for information and assistance.
From the theft of personal data to threats against critical infrastructure systems, cybersecurity is a national concern impacting businesses as well as government agencies. Because of these rapidly growing threats, there is a shortage of qualified cybersecurity professionals.
Recent data from CyberSeek —a project supported by the National Institute of Standards and Technology, U.S. Department of Commerce, and National Initiative for Cybersecurity Education—showed that there were nearly 1.2 million persons employed in cybersecurity and that there were over 440,000 additional job openings, while in Wisconsin there were over 11,000 persons employed in cybersecurity and nearly 4,500 additional job openings. 1
In addition, CyberSeek's national data showed the average salary for a Cybersecurity Engineer was $136,000 and the average salary for a Cybersecurity Manager/Administrator was $160,000. 2
1 CyberSeek.org Cybersecurity Supply/Demand Heat Map 2 CyberSeek.org Cybersecurity Career Pathway
This graduate program at UW-Whitewater are a superior value at $695 USD per credit for the 2024-25 academic year — whether you are a Wisconsin resident, an out-of-state student, or international student within the major. Additional fees and non-resident tuition may apply to other courses. Visit the Tuition and Fees webpage for complete information.
Course materials Graduate students can purchase textbooks and other instructional materials through the University Bookstore or elsewhere online. Students should verify what materials are needed with their instructor.
Financial aid
Students completing a degree program may be eligible for financial aid in the form of grants, loans, scholarships, or employment. All of these make up a “Financial Aid Package” and may be offered singly or in various combinations. Since funds are limited, priority for aid is based on financial need and how promptly applications are filed. To find out, or if you have other financial aid questions, contact the financial aid staff person assigned to you or try [email protected] or 262-472-1130.
Like to learn more about degree options through UW-Whitewater School of Graduate Studies? There are a few ways you can get the information you need.
Visit our information sessions website to select a virtual information session related to the program you are interested in.
You can also fill out a request for information to connect with an advisor who can discuss your goals and help guide you to the right program to pursue your dreams.
Interested in taking a tour of UW-Whitewater campus? You can visit in person or virtually.
The Master of Science in Cybersecurity program offers studies in core areas of cybersecurity that include offensive and defensive security operations, security awareness training, security tools design and implementation, cybersecurity management, security policy and law, and emerging areas in security and privacy. The proposed program offers both hands-on experiential learning and in-depth theoretical studies.
More information on the program structure and courses can be viewed in the Graduate Catalog .
The M.S. in Cybersecurity is designed for both professionals and recent college graduates who aspire to advance their careers in cybersecurity. The degree program consists of 30 credits, including 15 credits of core courses and 15 credits of courses in security engineering emphasis. The program will prepare students to obtain positions such as cybersecurity analyst, cybersecurity manager, cybersecurity engineer, or cybersecurity architect.
Designed for those who have some programming experience, the online Cybersecurity graduate certificate will give you fundamental knowledge and hands-on practice in designing, maintaining, and protecting secure computing systems.
The online Cybersecurity Management graduate certificate is designed for working professionals interested in pursuing careers in cybersecurity, such as security analysts and security managers.
Are you ready to redefine your future? Get started by requesting information or take a test drive to experience easier and more engaging learning.
Get started by clicking below. Apply now to further your education.
You have no saved courses.
Continue to explore your course options.
Your saved courses
Flinders and Swan Foresight PhD Enterprise Scholarship: On Safety and Security Compliance in Future Renewable Energy Systems
College of Science and Engineering
Opening date
Closing date
Scholarship value
$50,995 p.a. tax free (indexed annually)
Scholarship duration
Up to 3.5 years
Payment term
Paid Fortnightly
Level of Study
Higher Degrees Research
Description
Benefits
Eligibility
Apply now
Change the world and shape the future with impactful PhD research, co-funded by Flinders and Swan Foresight.
Flinders University and Swan Foresight offer a PhD Enterprise Scholarship to undertake innovative research into Safety and Security Compliance in Future Renewable Energy Systems .
The College of Science and Engineering at Flinders University and Swan Foresight are collaborating on this research project to identify and analyse plausible security operational scenarios within the renewable energy sector and electrical grid infrastructure. This project aims to develop comprehensive frameworks, methodologies, and templates designed to enhance security measures while reducing operational costs for the industry.
Bringing extensive expertise to the project, Swan Foresight is a leading innovator in creating secured ecosystems for sustainable futures. Since 2018, Swan Foresight has been dedicated to developing holistic, secure, and sustainable solutions for communities and industries. As a trusted partner, they assist organisations in navigating the journey of creating resilient, secure ecosystems, ensuring long-term sustainability for generations to come.
The College of Science and Engineering is also committed to creating a safer digital environment through cybersecurity research and has complementary research strengths in cybersecurity, securing critical infrastructure and research methodologies, and ensuring timely PhD completions. Together, we are seeking innovative solutions to this challenging area of research through this PhD project.
This inspiring project will focus on identifying and analysing security operational scenarios in the renewable energy sector and electrical grid, aiming to develop comprehensive frameworks, methodologies, and templates to strengthen security measures while cutting operational costs. The first objective is to identify and categorise current and emerging security threats across the renewable energy sector and grid infrastructure, assessing them based on their potential impact and likelihood. From there, the project will develop solid security frameworks that can be adapted to different types of renewable energy systems and grid setups. In addition, practical methodologies will be crafted for applying these frameworks, including risk assessment tools and incident response strategies tailored to the specific needs of the renewable energy sector. Finally, the project will design templates that blend security measures with cost-effective operational practices, providing clear guidelines for industry stakeholders to implement these solutions effectively.
The Flinders Industry PhD Scholarship also includes an internship of at least 60 full-time equivalent days, agreed to in written form within 18 months of candidature, undertaken and completed prior to completion of the PhD, during which you will be embedded with the Industry Partner team, developing your network, and gaining insight into the everyday research practices of an industry-leading/service driven organisation.
This Scholarship offers:
To be eligible for the Scholarship you will need:
It is desirable for applicants to also have:
How to apply:
Complete the attached Higher Degree by Research Scholarship Application Form, send your application with supporting documentation to Associate Professor Alireza Jolfaei via email at [email protected]
Applications close: 30 September 2024
To find out more about this exciting scholarship opportunity, contact Associate Professor Alireza Jolfaei via email at [email protected]
Please note that successful scholarship applicants must also be eligible and apply for, and be admitted to, HDR candidature at Flinders University in order to receive the scholarship. For further information, refer to: Apply for a Higher Degree by Research
The scholarship applications may close earlier than advertised if a successful awardee is selected. The start date of the project will be decided in consultation with the project lead, with the expectation that the successful awardee will commence as soon as practicable.
Sturt Rd, Bedford Park South Australia 5042
South Australia | Northern Territory Global | Online
Website feedback
Accessibility
CRICOS Provider: 00114A TEQSA Provider ID: PRV12097 TEQSA category: Australian University
The innovation university.
New students.
Top tech reviewer, ultimate-frisbee star recently delivered Stevens’ 2024 Commencement address, received honorary doctorate
One of the world’s most-watched technology reviewers, Stevens graduate Marques Brownlee (known professionally as MKBHD), has landed on the cover of TIME magazine’s new TIME100 / AI list as one of the 100 most influential people in AI.
The list, published September 5, includes tech luminaries OpenAI CEO Sam Altman and NVIDIA CEO Jensen Huang as well as public figures such as U.S. Secretary of Commerce Gina Raimondo and actor/anti-AI activist Scarlett Johansson.
“If you want to sell a new product, just say it’s AI-powered. But YouTube gadget reviewer Marques Brownlee has been careful not to get swept up in the hype,” noted TIME , describing Brownlee’s long-running make-or-break reviews of AI-loaded cars, tablets, phones and other devices.
Speaking about AI systems that train freely on publicly available data such as photographs, text and videos, he told the magazine he would like to see creators eventually “compensated by AI developers for using their videos, similar to how YouTuber’s receive a cut of the platform’s revenue from ads.”
Brownlee, whose influential YouTube channel currently boasts more than 19 million subscribers (in addition to 5 million Instagram followers and 2 million-plus TikTok followers), graduated from the university with a degree in Business & Technology in 2015.
He received its Young Alumni Achievement Award just three years later in a ceremony in New York City’s Plaza Hotel, and returned to campus in fall 2022 for a moderated conversation with enrolled undergraduates .
“Finding something that you’re really passionate about often requires trying a lot of different stuff, but once you find that thing, it kind of becomes a no-brainer,” he said at the time. “Being able to turn it into a job when I graduated was perfect.”
In parallel with his remarkable career in technology social media, Brownlee has enjoyed considerable success in the world of professional ultimate frisbee. NBC News detailed his accomplishments , including making the U.S. mixed national team (currently a finalist in the World Ultimate Championships in Australia), in a recent profile.
Brownlee will also be featured September 12 in the upcoming ABC program “ AI and the Future of Us: An Oprah Winfrey Special ,” along with Microsoft founder Bill Gates, OpenAI’s Altman and FBI Director Christopher Wray.
Watch Brownlee’s 2024 Commencement speech here:
Follow today
More Brands
Media magnate Rupert Murdoch, 93, has married for the fifth time, his corporation, News Corp, confirmed Sunday.
Murdoch and Elena Zhukova, a 67-year-old Russian-born retired molecular biologist, wed Saturday in a ceremony at his vineyard estate in Bel Air, California. Photographs of the newly married couple were released by News Corp.
The couple announced their engagement in March.
Murdoch was most recently married to model and actor Jerry Hall . They were wed in 2016 and divorced in 2022.
Zhukova is the ex-wife of Alexander Zhukov, a billionaire energy investor and Russian politician. Their daughter, Dasha, was previously married to Russian billionaire Roman Abramovich , who used to own the Premier League soccer club Chelsea.
Last fall, Murdoch stepped down as leader of both Fox News’ parent company and his News Corp media holdings. His son, Lachlan, took his place in a media empire that spans continents and helped to shape modern American politics .
In 1952, Murdoch inherited a newspaper in his native Australia from his father. Over decades, he built a news and entertainment enterprise that became prominent in the United States and Britain, including ownership of such notable newspapers as The Times of London and The Wall Street Journal.
Fox News Channel, the 24-hour network founded in 1996, has profoundly influenced television, becoming a popular news source among many conservative U.S. audiences and politicians.
Paris olympics.
Pets & animals.
COMMENTS
A Ph.D. in cybersecurity provides students with a comprehensive education encompassing technology, data science, leadership, management, ethics and policy. Requirements, course loads and ...
Here's a breakdown of tuition rates (all figures are based on out-of-state tuition). $17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology. $86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.
Part-time cybersecurity programs could last 6 to 7 years. A full-time MPhil in cybersecurity usually lasts 1 to 2 years. ... Online Ph.D. in Cyber Security. Although most doctoral degree programs last two or three years, we discovered one university that offers a 12-month online doctoral program in Cybersecurity:
The benefits of the Boston area: The PhD in Cybersecurity degree requires completion of at least 48 semester semester hours beyond a bachelor's degree. Students who enter with an undergraduate degree will typically need four to five years to complete the program, and they will be awarded a master's degree en route to the PhD.
Overview. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.
Using technology for a more secure world. The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy ...
A PhD in Cybersecurity is a highly specialized and advanced program that requires extensive coursework and research. The time it takes to complete a PhD in Cybersecurity can vary depending on the level of education a student enters the program with. However, on average, it takes approximately 4-5 years of full-time study to earn a PhD in ...
A cybersecurity doctorate or Ph.D. is the highest degree you can earn in the field. You can earn a Ph.D. to prepare for university-level teaching and research, or other doctorates, which emphasize applied skills and help qualify you for leadership roles in cybersecurity. ... Now is an excellent time to get a cybersecurity degree — the field ...
The smart home tech inside your home is less secure than you think, new Northeastern research finds. The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address ...
480-965-3199. All ASU graduate and undergraduate academic programs are fully accredited by the Higher Learning Commission. Many programs also have additional accreditation through specialized accrediting agencies. A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.
A UK doctoral student can expect to pay around £5,500 per year in tuition fees for a 2021/22 PhD programme in Cyber Security. Typical tuition fees for EU and overseas students are around £25,000 per academic year. Part-time tuition fees are normally proportioned according to the research programme length. Most institutions have Centres for ...
A graduate with a Ph.D. in Cybersecurity Management will have the ability to: acquire advanced knowledge and deeper understanding of the field of information assurance; communicate professionally and ethically about information assurance research issues; identify, analyze, and synthesize scholarly literature related to the field of information ...
Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.
As a graduate of National University's Doctor of Philosophy in Cybersecurity (PhD-CY), you'll be able to: Advance theory and practical applications of cybersecurity. Formulate cybersecurity governance, policy, risk, and compliance. Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.
The D.Eng. in Cybersecurity Analytics offers knowledge of cutting-edge cybersecurity techniques and tools and their application to real-world challenges. ... The degree requires completion of eight graduate-level courses (listed below) and a minimum of 24 credit hours of Praxis Research (SEAS 8188). During the research phase, the student writes ...
The prescribed period of study is 36 months if studying full-time, or between 48 and 72 months if studying part-time. Year 1 of PhD studies is probationary. Your supervisor will identify your training needs, if any, and invite you to attend lectures relevant to your research topic.
This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today's societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.
The UNT Information Science Ph.D. program responds to the varied and changing needs of the information age by offering the Cybersecurity concentration, offered jointly with UNT Department of Computer Science and Engineering, and UNT Department of Information Technology and Decision Sciences with the ultimate goal of providing interdisciplinary training, research and professional services in ...
All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.
PhD in Cybersecurity Program Outcomes. Formulate solutions to cybersecurity problems. Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale. Manage legal, ethical, and security risks in technology-based systems. Explain concepts and arguments associated with cybersecurity.
Duration: Full time: 2-4 years Part time: 4-8 years. Course type: Full-time, Part-time route available. Study location: ... The PhD Cyber Security programme is an opportunity to immerse yourself in a programme of study that will lead you to making a significant novel contribution to knowledge.
About Program. The Ph. D. in Cyber Security Systems and Networks is a Doctoral program provided by Amritha vishwa vidyapeetham.The call for applications will generally be posted twice a year on the website. However, Amrita Vishwa Vidyapeetham will accept applications throughout the year.
Online PhD in Cyber Security Degree Availability. Many online-based institutions that offer programs within computer science and cybersecurity also feature accredited doctorate degrees. Students can expect to find disciplines directly in cybersecurity or in a similar field, such as information assurance or security in information technology.
The Flinders Industry PhD Scholarship also includes an internship of at least 60 full-time equivalent days, agreed to in written form within 18 months of candidature, undertaken and completed prior to completion of the PhD, during which you will be embedded with the Industry Partner team, developing your network, and gaining insight into the ...
Recent data from CyberSeek—a project supported by the National Institute of Standards and Technology, U.S. Department of Commerce, and National Initiative for Cybersecurity Education—showed that there were nearly 1.2 million persons employed in cybersecurity and that there were over 440,000 additional job openings, while in Wisconsin there were over 11,000 persons employed in cybersecurity ...
$33,990 p.a. (2024 full-time rate indexed annually) + top-up scholarship $17,005 p.a. tax free; Apply your research skills during an internship with Swan Foresight; Flinders University and Swan Foresight offer a PhD Enterprise Scholarship to undertake innovative research into Safety and Security Compliance in Future Renewable Energy Systems.
One of the world's most-watched technology reviewers, Stevens graduate Marques Brownlee (known professionally as MKBHD), has landed on the cover of TIME magazine's new TIME100 / AI list as one of the 100 most influential people in AI.. The list, published September 5, includes tech luminaries OpenAI CEO Sam Altman and NVIDIA CEO Jensen Huang as well as public figures such as U.S. Secretary ...
Media magnate Rupert Murdoch, 93, has married for the fifth time, his corporation, News Corp, confirmed Sunday. Murdoch, 93, married Elena Zhukova, 67, on June 1. IE 11 is not supported.