You might be using an unsupported or outdated browser. To get the best possible experience please use the latest version of Chrome, Firefox, Safari, or Microsoft Edge to view this website.

Earning A Ph.D. In Cybersecurity: Everything You Need To Know

Mariah St. John

Updated: Jan 1, 2024, 3:30pm

Earning A Ph.D. In Cybersecurity: Everything You Need To Know

A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management.

Cybersecurity Ph.D. programs allow students and professionals to build on their knowledge and skills. Candidates gain experience working with emerging technologies across artificial intelligence, data science and cloud computing to optimize organizational performance. This article overviews cybersecurity doctoral degree options, including standard admission requirements, common coursework and potential career paths.

Why You Can Trust Forbes Advisor Education

Forbes Advisor’s education editors are committed to producing unbiased rankings and informative articles covering online colleges, tech bootcamps and career paths. Our ranking methodologies use data from the National Center for Education Statistics , education providers, and reputable educational and professional organizations. An advisory board of educators and other subject matter experts reviews and verifies our content to bring you trustworthy, up-to-date information. Advertisers do not influence our rankings or editorial content.

  • 6,290 accredited, nonprofit colleges and universities analyzed nationwide
  • 52 reputable tech bootcamp providers evaluated for our rankings
  • All content is fact-checked and updated on an annual basis
  • Rankings undergo five rounds of fact-checking
  • Only 7.12% of all colleges, universities and bootcamp providers we consider are awarded

What to Expect From a Ph.D. in Cybersecurity

A Ph.D. in cybersecurity provides students with a comprehensive education encompassing technology, data science, leadership, management, ethics and policy. Requirements, course loads and curriculums for these programs vary by school. In most cases, students need to complete between 50 and 70 credits, which typically takes three to seven years.

Several components make up the Ph.D. curriculum, including professional research and theory, an extensive literature review and dissertation preparation. In addition to coursework, Ph.D. students must fulfill teaching and research responsibilities.

Core concepts and topics can include:

  • Machine learning
  • Information theory
  • Applied cryptology
  • Theory of computation
  • Artificial intelligence
  • Network security

Degree Finder

Doctor of philosophy vs. doctor of science vs. doctor of information technology.

When deciding which cybersecurity doctoral program to pursue, you can choose from the following degree options:

  • Ph.D. in cybersecurity
  • Doctor of Science (D.Sc.) in cybersecurity
  • Doctor of Information Technology (DIT)

Ph.D. in Cybersecurity

In general, a Ph.D. in cybersecurity is a research-based degree program that prepares graduates for advanced roles in academia. This degree focuses on research and theory, catering to students and professionals looking to expand their teaching opportunities and become professors or researchers.

D.Sc. in Cybersecurity

A D.Sc. focuses on practical applications of theory in management and leadership roles. Students may research cybersecurity’s emerging theoretical and technical components. This degree suits students who are interested in policy development.

A D.I.T. program serves professionals who are looking to advance their knowledge and expertise in technology and computing. Learners may develop the skills needed to lead an organization. Students can choose a specialization, such as cybersecurity, computer science or data science.

What Kinds of Exams are Required During a Ph.D. Program?

In addition to coursework and a dissertation, students working toward their cybersecurity doctorate must complete exams. In most Ph.D. programs, learners must take three exams.

  • A qualifying exam, which occurs during the early stages of the program
  • A preliminary exam to demonstrate a candidate’s readiness to begin their dissertation and research
  • The final exam, through which a candidate defends their dissertation and research work

Common Courses in a Cybersecurity Ph.D.

Coursework for cybersecurity Ph.D. programs varies among schools. Each program sets a unique curriculum. Below you’ll find just a few examples and variations of common course titles for cybersecurity doctoral programs.

Advanced Security Risk Management and Assessment

Courses on advanced security risk management and assessment provide an overview of methodologies for strategic decision-making. Students analyze various management techniques to develop cyber defense procedures to reduce and address breaches.

Research and Practice in Information Technology

In courses on research and practice in information technology, students analyze research across the spectrum of IT disciplines. Learners review concepts, methodologies and techniques used in computer science, information systems, information management and software engineering research.

This course introduces students to key research paradigms, including the principles of research ethics, design and methods of data collection and analysis as relevant to IT research.

Law, Policy, Ethics and Compliance

Courses on law, policy, ethics and compliance provide an overview of legal, ethical and policy-related cybersecurity issues. Students analyze domestic and international security law, compliance issues and legal principles. Learners critically evaluate policy documents across business sectors to understand how to comply with varying laws and regulations while addressing cybersecurity challenges.

Dissertation

Each doctoral candidate must write a dissertation, or a formal research paper, that presents findings from original research carried out during the duration of the program under the guidance of faculty advisors. Students create the documentation for their dissertation topic, obtain approval from advisors and submit any required information to their institution’s research board.

How to Get Admitted to a Cybersecurity Doctoral Program

The admission requirements for a cybersecurity doctoral program can differ depending on the school. Typically, applicants must have at least an undergraduate degree, such as a bachelor’s degree in cybersecurity . However, some programs require a master’s in cybersecurity or a related subject.

Ph.D. students coming from undergraduate programs may earn their master’s degrees as they complete their doctoral requirements. Those coming from master’s programs may have to complete fewer credits to earn their doctorate.

In addition to submitting a completed application and paying any application fees, standard admission requirements typically include the following.

  • Submit undergraduate transcripts.
  • Meet a minimum GPA requirement.
  • Submit GRE scores.
  • Submit letters of recommendation.
  • Write an admissions essay or personal statement.
  • Submit a résumé or CV with relevant professional experience and educational accomplishments.

What Can You Do With a Ph.D. in Cybersecurity?

Is this cybersecurity degree worth it? A Ph.D. in cybersecurity can help you qualify for various management positions, teaching jobs, research roles and other career opportunities in the information security field.

Below we list some potential careers for cybersecurity doctoral graduates. Cybersecurity job requirements vary widely depending on the specific title and organization. While the main responsibilities for each role are generally consistent across the field, details may vary among industries and workplaces.

We sourced the below salary data from Payscale .

Chief Information Security Officer

Average Annual Salary : Over $174,000 per year Qualifications : At least a master’s degree in cybersecurity, computer science, IT or a closely related field Job Description : A chief information security officer (CISO) is a C-suite management role. These professionals oversee information and data security for an organization, along with IT. CISOs offer strategic oversight on the design, development, implementation and maintenance of security solutions. They ensure organizations are adhering to necessary regulations, protocols and legal obligations.

Director of Operations

Average Annual Salary : Over $100,000 per year Qualifications : A master’s degree is the minimum educational requirement. Certifications and extensive experience can give you an advantage. Job Description : A director of operations oversees an organization’s cybersecurity operations and incident responses. They are responsible for building and cultivating integrated teams to address cyberattacks and threats. These professionals are accountable for timely and strategic responses to risks and security threats.

Education Program Director

Average Annual Salary : Over $68,000 per year Qualifications : At least a master’s degree and relevant work experience Job Description : Education program directors design and implement educational programs for the public or members of an organization. These professionals oversee all aspects of organizational initiatives, budgets and hiring staff. Education program directors develop various educational materials, including the curriculum for classes and content for conferences and lectures.

Featured Online Schools

Learn about start dates, transferring credits, availability of financial credit and much more by clicking 'Visit Site'

Frequently Asked Questions About Cybersecurity Ph.D.s

Is it worth getting a ph.d. in cybersecurity.

Earning a Ph.D. in cybersecurity can expand your career opportunities, increase your earning potential and help you qualify for high-level management positions. The U.S. Bureau of Labor Statistics (BLS) projects employment opportunities for information security specialists, including cybersecurity professionals, to grow by 32% from 2022 to 2032.

What can I do with a Ph.D. in cybersecurity?

A Ph.D. in cybersecurity is the highest academic credential available in the field. Depending on your degree option, you can qualify for positions in the education sector to teach, apply for leadership positions and pursue other high-level positions in the field.

  • Best Online Bachelor’s Degrees In Cybersecurity
  • Best Master’s In Computer Science Online
  • Best Online Data Science Master’s Degrees
  • Best Online Master’s In Computer Engineering
  • Best Online Master’s In Information Technology Programs
  • Best Software Engineering Master’s Online
  • Best Master’s In Cybersecurity Online Degrees
  • Best Online Computer Programming Degrees
  • Best Online Information Technology Degree
  • Best Online Software Engineering Degrees
  • Best Online Computer Science Degrees
  • How To Become A Cybersecurity Analyst
  • How To Become a Web Developer
  • How To Become A Sales Engineer
  • How To Become a Software Engineer
  • Careers In Cybersecurity
  • 10 Careers In Game Design To Consider
  • How To Become A Cybersecurity Engineer
  • How To Become A Game Developer
  • Earning An Associate In Computer Science
  • Earning A Bachelor’s Degree In Cybersecurity
  • How To Become A Cybersecurity Specialist
  • Cybersecurity Salary Guide
  • The 7 Best Programming Languages To Learn For Beginners
  • How Long Does It Take To Learn Coding? And Other Coding Questions
  • How To Learn Python For Free
  • Artificial Intelligence In Education
  • Cybersecurity Degree Guide
  • Software Developer Vs. Software Engineer
  • What Is CISSP Certification? Qualifications, Benefits And Salary
  • Ask A Tech Recruiter

How To Become A Data Scientist

How To Become A Data Scientist

Garrett Andrews

How To Become A Computer Systems Analyst: A Step-By-Step Guide

Nneoma Uche

How To Become A Cloud Engineer

Matt Whittle

How To Become A Computer Engineer: A Step-By-Step Guide

Liz Simmons

How To Become A Data Analyst: A Step-By-Step Guide

Sheryl Grey

How To Become A Computer And Information Systems Manager

Mariah is a Berlin-based writer with six years of experience in writing, localizing and SEO-optimizing short- and long-form content across multiple niches, including higher education, digital marketing and travel. Her writing expertise extends to brand strategies and driving small business growth through targeted content. In the last three years, she's primarily produced education-focused content, writing on topics like degree programs, trade schools and career pathways.

Cybersecurity Guide

Research with impact: Find online cybersecurity PhD programs

In this guide

  • 2024 rankings
  • Steps to get an online PhD
  • Financial assistance
  • Career paths
  • School listings

The digital landscape is changing, and so is higher education. Online PhD programs in cybersecurity are not just trending, they’re revolutionizing the way we cultivate experts in the field.

Whether you’re a student eyeing advanced studies or an institution looking to expand your curriculum, discover why an online PhD in cybersecurity degree is becoming the go-to option for next-level learning and expertise.

Programs to make the public aware of the problem and attract bright young minds to the profession are becoming more widespread and are starting to have an effect.

With the ranks of willing candidates beginning to swell, certificate, training and education programs are in great demand. The number of available degree programs offered by colleges in particular is gaining momentum .

Bachelor’s degrees have become a near necessity for new cybersecurity professionals in recent years. And higher-level positions like chief information security officers (CISOs) often require a master’s degree . 

At present, though, the need for doctorate degrees in cybersecurity is becoming evident.

High-level management positions, higher-education faculty posts, and advanced research initiatives are all growing in demand much more quickly than the numbers of candidates to fill them.

Generally speaking, most doctoral candidates will fill the rapidly expanding and critical roles of educators, consultants, and researchers.

PhD’s (doctor of philosophy degrees) and DSc’s (doctor of science degrees) are designed for these roles.

PhD’s tend to focus on theory and research, while DSc’s study research and technical expertise. With more focus on technical knowledge, DSc’s sometimes continue working directly in practical applications within the field.

On the other hand, DPS’s (doctor of professional studies degrees) are almost entirely devoted to the highest levels of training in hands-on practical knowledge and skills instead of theory and research. 

All three types of doctoral programs are now available to those wishing to advance their careers to the pinnacle of the cybersecurity field.

However, PhD is by far the most commonly offered doctoral cybersecurity degree at present, followed by DSc’s and DPS’s.

The world has a critical need for infosec practitioners, but there is also an equally essential need to expand the capacity of our educational institutions to teach new practitioners.

We also are in dire need of advanced, innovative, strategic thinkers to conduct research in the science of cybersecurity.

Best online cybersecurity PhD programs for 2024

Capitol technology university, nova southeastern university, the george washington university, mississippi state university, marymount university.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

Obtaining an online cybersecurity PhD 

Six steps for choosing an online phd cybersecurity program.

So with all of these options available, as well as a growing number of colleges offering these programs, how can one best decide which direction is right for you? Here is a quick six-step process to help.

1. Self-appraisal : Those looking to expand their knowledge and background in cybersecurity with a PhD have already succeeded in attaining lesser degrees and certifications, and likely have several years of work experience as well.

That education, and exposure to practical applications provide an excellent overall view of the infosec world. All that experience will be critical in deciding exactly which direction to explore in the next phase of a career. The biggest decisions are of two types. 

  • Are online PhD programs the right way to go, or would real-time college be a better choice? 
  • Is a future in research, education or consulting the right path? Or is work in a real-world application a better fit? Picking the correct answer to both questions will take a good bit of introspective research. And the decisions shouldn’t be made without a thorough self-inspection.

2. Admission requirements : As with any college degree, each individual institution offering it will have its own views of what a desirable PhD candidate should look like.

All require at least a BS degree, some require an MS. But there are often loose specifications as to what discipline the degrees must be in, like STEM or computer science. Other demands may include a minimum GPA threshold, usually 3.0 or higher, and GRE test scores. 

Waivers are for the GRE tests are often granted for candidates with strong academic or professional backgrounds. The rest is normally just paperwork, like a personal goal statement, personal and work references, a current resume, and college transcripts.

The primary point here is to pay attention to the requirements of each school under consideration, and whether it will necessitate more time, classwork, certifications, etc. to comply with these demands.

3. Tuition and scholarships : Unless an early career left a PhD candidate with an abundance of cash, money will always be a concern.

Obviously, tuition is the first number to check. But don’t stop with that. There are almost always alternatives for financial assistance available from the school, private scholarship sources, and sometimes government agencies attempting to increase the cybersecurity workforce.

And, of course, government-sponsored and private education loans exist .                                                                                                                            

4. School reputation, course quality and availability : To get the most return out of an investment of time and money in education, it’s always best to choose from schools with the best reputation among cybersecurity professionals.

Specific courses and available concentrations vary from one school to another. Students must therefore make sure a particular school’s special course offerings match their needs and desires. 

5. Centers for Academic Excellence in Cyber Defense : US government intelligence agencies are perhaps the organizations most interested in developing the science and resources needed to conduct the most extensive, advanced and complete cybersecurity operations anywhere.

The National Security Agency ( NSA ) and the Department of Homeland Security ( DHS ) jointly sponsor a program to promote cybersecurity education called National Centers for Academic Excellence in Cyber Defense ( CAE-CD ). NSA conducts extensive reviews and audits of colleges offering cybersecurity college degrees and designates a select few with CAE approval .

Choosing an institution approved by the NSA provides a high level of certainty that the program offered is of the highest quality. It will also give graduates a leg up on securing a career with federal government intelligence agencies. NSA recently published a fact sheet showing 272 CAE-CD approved institutions across the country. 

6. Dissertation research options and faculty : A critical part of any masters or doctoral degree is the dissertation. The exact topic and focus do not need to be determined at the outset of entering the program.

However, it should be possible to know that faculty members and other available resources provide the greatest knowledge, technology and other means of support for the student’s specialty. 

What to look for in an online PhD cybersecurity program

For any given doctoral candidate, enrolling in an online program offering the best and most numerous courses within the cybersecurity specialty desired may be top on the list of criteria.

One should also research the infosec faculty members at the school to determine which and how many have expertise within that students focus.

If possible, a chance to meet these faculty members may be very illuminating. Requesting the opportunity to audit one or more classes will also provide invaluable insight into how courses are structured and how close a fit the tutorial style may be.

Opting to attend a PhD program with the best possible reputation among cybersecurity professionals will help open doors when it comes time to find a post-doctoral job. 

An institution that cultivates an innovative environment and offers the latest in technological capabilities will help maximize the educational experience. It will also be of great educational benefit to attend a college that fosters consultative communications among students and faculty.

Probably the easiest variables to determine are tuition costs and the availability of school offered financial assistance, especially scholarships, grants, other offsets to student expenses.

Online PhD cybersecurity program timeline

Typically, obtaining a doctorate in cybersecurity will require between three and seven years of dedication.

The specific timeline will depend upon the individual college and the level of testing and qualification required for each student to be accepted into a program.

Coursework can take up to three years, depending in part depending upon credits earned and transferred before entering the program. Once courses have been completed, the next step is to design a research project for the dissertation. 

With a well thought out idea in hand, have a chosen faculty mentor assist with fine-tuning the scope, and then approving the research outline.

The rest is extensive research and then writing the dissertation, while all along consulting with a faculty mentor. This phase can take two or more years, sometimes in excess of five years. 

The length of time devoted to completing a dissertation will depend in part on the amount of time the candidate is able to devote to the research required.

Once the dissertation is complete, student will schedule a board review and present their research to faculty members to attain the final award of their doctoral degree.

Online PhD cybersecurity tuition and scholarships

Don’t be scared off by tuition rates at any school.

Pick the best academic environments for the degree and specialty desired first, then see what can be done to mitigate the cost.

Tuition rates

The Cybersecurity Guide team recently took a look at the 14 programs in the US that offer an online cybersecurity PhD program in order to get a better sense of what tuition looks like at these programs. All figures below are based on out-of-state tuition rates.

$32,940 is the most affordable online PhD program and its available at the University of Cumberlands.

$56,004 is the average cost of the 14 online cybersecurity PhD programs.

$85,248 is the highest tuition and is at the University of North Texas.

There are almost always several options to consider. Some schools have work-study options where students can take classes for a semester or two, then work in the industry for a time. This provides a balance of academics and practical experience, and also income to offset tuition costs.

Of course, those already working and going to school would not be able to utilize this option. 

Most frequently, scholarships, grants and fellowships will be the most accessible financial assistance vehicles.

At present, it seems most scholarships are being directed to undergraduate and graduate students, with less now available for PhD’s.

This is likely to change in coming years as demand for PhD’s is set to expand rapidly. The bulk of scholarships available for PhD candidates at present are provided through individual schools, corporate sponsors, of government agencies. 

Cybersecurity PhD career path

The very nature of doctor of philosophy degree programs means those who complete a PhD will be best suited to academic or theoretical applications of their cybersecurity expertise.

However, other times there are really interesting industry jobs available to PhD holders, especially in research-oriented companies. 

 Typically, these professionals will hold the highest of infosec management positions, such as CISO, information security director, information security manager, or the like.

But many will be destined for advanced investigative research into the cutting edge ideas and technologies being discussed and discovered in the cybersecurity world.

Others will opt for academic posts in higher education. And still others will be employed as consultants to large corporations and/or high leverage government agencies that often have not been able to hire enough cybersecurity employees to adequately satisfy their own needs, or just don’t possess the advanced capabilities that a PhD offers.

Frequently asked questions

An online PhD in cybersecurity is an advanced academic program that allows you to earn your doctorate remotely, focusing on research and expertise in cybersecurity.

Online programs offer flexibility, making it easier for working professionals to balance studies with other commitments. Plus, you can access top-tier faculty and resources from anywhere.

The duration varies but expect to spend 3-7 years, depending on the program and your pace of study.

Graduates often pursue roles in academia, research, or high-level positions in corporate cybersecurity departments.

Yes, most employers consider an online PhD in cybersecurity as valuable as an on-campus degree, provided it’s from an accredited institution.

While convenient, online programs may lack some networking opportunities and face-to-face interactions found in traditional settings.

School listings for online PhD in cybersecurity

As is any course of study, attending school through an online college affords maximum flexibility for students with demanding lives. Whether the limiting factor is work, family, health restrictions or other reasons, a flexible online doctoral program permits PhD candidates to work toward a goal on their own time. 

Below is a complete list of schools offering online PhD programs that features current and comprehensive information for an easy side-by-side comparison.

Colorado Technical University

Dakota state university, marymount university, school of technology and innovation, national university, naval postgraduate school, nova southeastern university, college of computing & engineering, the university of fairfax, the university of the cumberlands, university of north texas, university of tulsa.

Find Your School

Best Online Doctoral Programs in Cybersecurity

The Best Online Doctoral Degree Programs in Cyber Security

The best online doctoral degrees in cyber security.

2018 csd badges 05

Methodology

Best Online Doctorates in Cyber Security Ranking Methodology

Our metrics have been honed from years of experience in higher education journalism and research, and seek to provide a balance between the traditional academic prestige of an institution with a cyber security program, and other concerns that particularly non-traditional or working students may express. Namely, that affordability and support in online learning environments is crucial for successful outcomes for non-traditional, working, and adult students.

We start the process of any academic ranking by surveying every available cyber security degree program within the purview of the ranking. All information used in our ranking process is double checked, and comes from the Integrated Postsecondary Education Data Systems (provided by the US Department of Education) or the schools themselves.

In line with our categories of excellence covered on our rankings page, our ranking methodology for our doctoral cyber security degree programs is as follow:

  • Is the program an NSA / Department of Homeland Security designated program? (50%)
  • The percentage of instructors who are research faculty (50%)
  • Tuition per credit hour for the program (50%)
  • The availability of doctoral grants, research assistant roles, and the ability to teach classes for doctoral candidates(50%)
  • The percentage of graduate students taking some online courses (100%)

1.) Dakota State University

dakota state

Dakota State University is a public state university with a main campus located in Madison, South Dakota. Home to some 3,000 students, the university goes by the motto “technically, we’re better” to highlight their focus on business and technology courses of study. The university offers a vigorous and wide ranging set of offerings online as well, with 54% of undergraduates and 88% of graduate students at least taking some courses online. The university has been heralded as one of the top comprehensive cyber security schools and one of only a handful of schools we know of that offer cyber security programming at the associates through doctoral levels (all available online as well). Dakota State University is also the only university to be featured in all of cyber security rankings. Of hundreds of universities, Dakota State University ranks for their top associates , bachelors , Masters, and doctoral degrees.

Dakota State University’s fully online D.Sc. in Cyber Security places first in our ranking due to excelling in all categories surveyed: affordability, academic quality, and student satisfaction. The degree is meant for students with a strong background in computer science, whether that is a bachelors with a masters in another discipline or a masters in computer science. Students without all of the prerequisite computer science knowledge may still be accepted, however, contingent upon taking up to 12 graduate credit hours of foundational computer science work to catch them up. Dakota State University’s cyber security programs are some of the most well connected in the United States, with ties to the NSA, the CIA, Navy SPAWAR, Department of Homeland Security, Johns Hopkins University’s Applied Physics Lab, Army INSCOM, Carnegie Mellon’s Software Engineering Institute and MIT’s Lincoln Labs. Unsurprisingly, the program holds the coveted NSA/CAE designation, the highest accreditation for cyber security and information assurance programs. DSU is also known for their talented cyber defense team, who often come in close to the top at national competitions.

  • Tuition per credit hour: $388
  • NSA/CAE Designated Program: Yes

2.) Capitol Technology University

Capitol Technology University is a private, not-for-profit, non-sectarian university located northeast of Washington, D.C. between Baltimore and Washington. The university has a long lineage of technical training, originating as a radio engineering institute for servicemembers in the early 20th century. In line with its lineage, Capitol Technology University is regularly lauded as a particularly “military friendly school.” The university is also known for its innovative online offerings. 71% of undergraduates at the university are enrolled in at least some distance education, while 95% of graduate students take only online offerings. The university has been noted by US News as a top online engineering school at the undergraduate and graduate levels.

The fully online doctor of science in Cybersecurity (DSc) offered by Capitol Technology University is geared towards fully employed students working in cyber security fields. The program, as with many doctoral programs in cyber security, aims to create future information assurance and cyber security leaders. The university’s physical location is a perfect fit for those wishing to get into policy work as well. Capitol Technology University partners with a wide range of local, state-level, regional, and national organizations, and is located within an hour of the largest concentration of cyber security jobs in the United States (Washington, D.C.). As is probably expected from one of the oldest online doctoral programs in cyber security, Capitol Technology University’s cyber security programming has been designated a Center of Academic Excellence-Cyber Defense (CAE-CD) since 2003.

  • Tuition per credit hour: $867

3.) Capella University

capella

Capella University is a private, for-profit university with a main office located in Minneapolis, Minnesota. Home to some 36,000 students, the university is known for its vast online offerings. Accordingly, 100% of learners attending Capella (at the associates through doctoral levels) are online learners. The university has been heralded as an innovative solution for non-traditional students looking to both work full time and obtain graduate degrees. The widespread use of prior learning assessment crediting allows qualified students to focus on what they already don’t know, and recieve credit for subjects they have already mastered on the job or in previous school environments.

The fully online PhD in Information Assurance Security program offered by Capella excels at flexibility and offering support to students holding down fully time jobs while seeking their doctorate. The program focuses on both advanced technical skills as well as research and has been designated a National Center of Academic Excellence in Information Assurance/Cyber Defense through the year 2021. Flexibility-enhancing components of the program include a wide range of start dates yearly (which is uncommon at the doctoral level), as well as the ability to start on your dissertation from the start of the program. This offering builds credit-bearing research seminars around the topics you would like to research for your dissertation. Tuition is capped at $5,000 per semester, with students able to pay less if they take less than a full load. Furthermore, servicemembers receieve a 10% discount on all program costs.

  • Tuition per credit hour: $925

4.) Colorado Technical University

ctu

Colorado Technical University is a private, for-profit technical university with a main campus located in Colorado Springs, Colorado. The university is home to some 28,000 students at the associates through doctoral level of study. Online education is central to Colorado Technical University’s offerings, with 65% of undergraduates and 52% of graduate level students taking at least some distance courses. As one might expect, the university primarily offers programming in business and technical disciplines, for which it often ranks highly in rankings of online schools. Furthermore, Colorado Technical University is regularly ranked as one of the top schools for servicemembers and veterans due to a number of support services, flexibility, and a special tuition rate.

The fully online Doctor of Computer Science – Cybersecurity and Information Assurance degree offered by Colorado Technical University aims to prepare the next generation of senior level leadership, consulting, and teachers within cyber security disciplines. Unsurprisingly, the university’s cyber security programs hold the lauded status of being a National Center of Academic Excellence in Information Assurance/Cybersecurity through the year 2021. Unlike many doctoral programs, students may elect to choose multiple start dates a year, and may take advantage of work and life experience credits to accelerate their time until degree. The progression of CTU’s program begins with a year of foundations, followed by a year of advancing research methods and understanding in a focus area, followed by a year or more to complete 6 research based classes (for your dissertation) as well as courses on leadership.

  • Tuition per credit hour: $598

5.) University of Fairfax

fairfax e1500416053421

The University of Fairfax is a private,non-profit, fully online university with main offices located in Vienna, Virginia. The university is quite young, being founded in 2002 with the aim of providing quality instruction in information assurance and systems. Pursuant to US regulations, the school was enabled to operate for up to 10 years while in the process of seeking an initial accreditation. The University of Fairfax was granted accreditation by the Distance Education Accrediting Commission (a national accreditor) in 2012. The university’s location close to the hub of most cyber security jobs in the United State is a great boon to its students, who may also participate in bootcamps aimed at helping students to prepare for lucrative professional certifications in cyber security .

The fully online Doctorate in Information Assurance offered by the University of Fairfax pushes students to develop novel solutions to a cyber security problem of interest and to present solutions through empirical research into the topic. The objective of the program is to help provide the nation with the next generation of thought leaders, policy makers, and top consultants in cyber security. The completion time of the degree is between 3 and 5 years, and courses are taken in both synchronous and asynchronous manner (often a boon to flexibility for students). 57 credit hours of foundational pre-dissertation work are required in the program, with 5 dissertation hours (at least) required afterwards. This is actually a slightly lower number than a number of other programs, and may be seen as a way to accelerate time until degree for worthy students.

  • Tuition per credit hour: $895

6.) North Central University

north central e1500416222541

Northcentral University (not to be confused with North Central University, a private religious college) is a private, for-profit, virtual college with a corporate headquarters located in San Diego, CA. Home to some 10,000+ students, the university is known for its wide range of professional and practical degree offerings, primarily in counseling, education, business, and technology. The university is one of only a handful in the nation that are 100% online, and has been lauded for its online course presentation and support services by the likes of US News and other online degree ranking entities for years. Northcentral University is regionally accredited by the Western Association of Schools and Colleges.

The fully online PhD in computer in information security offers a number of high quality enhancements seldom found online. Students in the program may choose start dates on a weekly basis, only engage with faculty with doctorates in their field, and have no scheduled lecture hours. This leads to unrivaled flexibility and the ability to balance working through the several years of a PhD with work and home commitments. While the programs primary focus are is on computer and information security, the program is technically a doctorate in business administration, which frames lines of inquiry into information assurance from a business and management perspective. Though individual time-until-degree times may vary, the program requires an estimated 45 months to complete makin it one of the quicker programs on our list.

  • Tuition per credit hour: $1197
  • NSA/CAE Designated Program: No

The Gradcafe

  • Majors & Careers
  • Online Grad School
  • Preparing For Grad School
  • Student Life

Top 10 Best Programs for a PhD in Cyber Security

Lisa Marlin

Technology is becoming more and more integrated with our daily lives — with it comes threats from hackers that make your information vulnerable. Indeed, cybersecurity threats  are expected to grow even more in the next few years, making cybersecurity professionals sought-after in the hiring market. Already have an extensive computer science  background? Why not take it to the next level with a PhD in cyber security?

A doctorate degree in cyber security gives you a valuable qualification and in-depth knowledge of cybersecurity challenges. Not only will you be equipped to help organizations protect their crucial information, but you’ll also be qualified to develop strategies for better data security and even teach the subject in university.

Ready to unlock unlimited career potential in the cybersecurity space? Let’s jump into our top programs for cybersecurity PhD programs, including common requirements and costs and future career potential.

Table of Contents

Best Programs for a PhD in Cyber Security

Arizona state university, ira a. fulton schools of engineering.

Ph.D. Computer Science (Cybersecurity)

Arizona State University logo

Arizona State University is certified as a National Center of Academic Excellence for Information Assurance Research and Education (CAEIAE). Its doctorate of cyber security program helps students master key theories and algorithms to apply to a modern computer science realm.

  • Courses:  Data and information systems , information assurance and security, applied Cryptography, and advanced computer network security.
  • Credits:  84
  • Delivery: On-campus
  • Tuition :  $11,720 per year
  • Financial aid:  Scholarships, grants, and loans.
  • Acceptance rate: 88.4%
  • Location:  Phoenix, Arizona

Capitol Technology University

Doctorate (DSc) in Cybersecurity

Capitol University logo

Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense. The school’s doctorate in cybersecurity program is a low-residency online program and was the first of its kind  in the USA.

  • Courses : Situation awareness analysis & action plan processes, information assurance strategic management, information assurance implementation
  • Credits : 54-66
  • Duration : 3 years (8 semesters)
  • Delivery : Online (low residency)
  • Tuition : $933 per credit
  • Financial aid: Loans, Grants, scholarships, work-study
  • Acceptance rate:  84.4%
  • Location : Laurel, MD

Northcentral University, School of Technology

Doctor of Philosophy in Cybersecurity (PhD-CY)

Northcentral University logo

Northcentral University is a regionally accredited university that offers many educational programs for students all over the world with one-on-one mentorship. Its PhD cybersecurity degree has a special emphasis on global security issues and covers international laws and multicultural elements.

  • Courses : Global cybersecurity demand, securing globally distributed infrastructure & support, and governance, audit, compliance & risk
  • Credits : 60
  • Duration : 40-44 months
  • Delivery : Online
  • Tuition : $1,094 per credit
  • Financial aid : Grants, loans, veteran benefits, and third-party scholarships.
  • Acceptance rate : 93%
  • Location : San Diego, CA & Scottsdale, Arizona

University of Colorado – Colorado Springs, College of Engineering and Applied Science

Ph.D. in Security

University of Colorado Springs logo

University of Colorado, Colorado Springs has partnerships with several defense departments, semiconductor manufacturers, and other prominent institutions, thanks to its strategic location. Though students must conduct the majority of the coursework for this doctorate degree in cyber security on-campus, a provision permits some online courses.

  • Courses : System administration & security, applied cryptography, and advanced system security design.
  • Delivery : On-campus
  • Tuition : $918.83 per credit
  • Financial aid : Scholarships, student employment, and loans.
  • Acceptance rate:  89.6%
  • Location : Colorado Springs, Colorado

Northeastern University

Cybersecurity, Ph.D.

Northeastern University logo

Northeastern University promotes a co-operative education philosophy with a blend of classroom learning and professional experience. This cybersecurity PhD program offers the opportunity to conduct research in specialized facilities and labs, including the Cybersecurity & Privacy Institute and International Secure Systems Lab.

  • Courses : Software vulnerabilities & security, computer hardware security, and machine learning in cybersecurity & privacy.
  • Credits : 48
  • Tuition : $1,532 per credit hour
  • Financial aid:  Scholarships, fellowships, assistantships, and company sponsorships.
  • Acceptance rate : 20.5%
  • Location : Boston, Massachusetts

Dakota State University

Cybersecurity, DSc

Dakota State University logo

Dakota State University is known for its specialization in computer education-related programs. Its doctorate in cyber security is delivered through a combination of various distance education methods and a handful of on-campus seminars. You can apply for the program even if you don’t have a master’s degree, but you’ll need to complete an additional 27 credits.

  • Courses : Full scope security testing, cyber security research, and security software engineering.
  • Credits : 61
  • Duration : 3 years
  • Delivery : Online (plus on-campus seminars)
  • Tuition : $210.80 per credit hour
  • Financial aid:  Grants, work-study, and loans.
  • Acceptance rate: 83%
  • Location:  Madison, SD

Purdue University, The Center for Education and Research in Information Assurance and Security (CERIAS)

Interdisciplinary Ph.D. Program in Information Security

Purdue University logo

Purdue University was ranked in the top 10  most innovative universities in 2022 by the US News & World Report. This interdisciplinary cybersecurity PhD program covers ethical, political, and philosophical courses, to provide insight into technology policy issues and information ethics.

  • Courses include:  Information security, advanced network security, and modern ethical theories.
  • Credits: 60
  • Delivery:  On-campus
  • Tuition:  Refer tuition calculator
  • Financial aid:  Fellowships, teaching assistantships, and research assistantships.
  • Acceptance rate: 67.2%
  • Location:  West Lafayette, IN

Nova Southeastern University, College of Computing and Engineering

Ph.D. in Cybersecurity Management

Nova Southeastern University

NSU is considered one of the National Centers of Academic Excellence (NCAE) in cybersecurity. To qualify for this school’s PhD program in cybersecurity, you’ll need to have either a bachelor’s or master’s degree in the field. The school also offers a direct BS to PhD pathway.

  • Courses : Fundamentals of cybersecurity, information security governance, and human-computer interaction.
  • Credits : 51 minimum
  • Delivery : Hybrid
  • Tuition : $1,282 per credit hour
  • Financial aid:  Fellowships, scholarships
  • Acceptance rate:  76.2%
  • Location : Fort Lauderdale, Florida

St Thomas University

Doctor of Business Administration in Cyber Security Management

St, Thomas University logo

St. Thomas University is a non-profit Catholic university that emphasizes global and cultural diversity. Its doctorate of cybersecurity program lets you choose one of three research options: traditional dissertation, action research, and article dissertation.

  • Courses : Cyberlaw, policy & security, cyber security risk management, and information ethics.
  • Duration : 1.5 years plus dissertation
  • Delivery : On-campus, online, and hybrid options
  • Tuition : $1,029 per credit hour
  • Financial aid:  Scholarships, grants, loans, and work-study.
  • Acceptance rate: 59.6%
  • Location : Miami Gardens, FL

George Mason University, Volgenau School of Engineering

Information Technology Ph.D. (Information Security and Assurance (ISA) Concentration)

George Mason University logo

George Mason University is a public research university with an emphasis on sustainability that was ranked the most diverse university  in Virginia by the US News & World Report 2018. Its PhD program in Information Technology offers a concentration in Information Security Assurance (ISA) covering cybersecurity subjects.

  • Courses : Secure software development, security protocol analysis, and security experimentation.
  • Credits : 72 minimum
  • Tuition : $663 per credit
  • Financial aid : Grants, work-study, and loans.
  • Acceptance rate:  89.2%
  • Location : Fairfax, Virginia

What are the Prerequisites for a PhD in Cybersecurity?

Most PhD programs in cybersecurity require a master’s in computer science or a related field. Other specific requirements vary depending on the program, but you’ll typically need to submit the following in your application:

  • Personal Statement  and/or research proposal
  • Academic resume
  • Letters of recommendation

Check individual requirements for each school you’re considering well in advance of the application cut-off date. These programs can be competitive, so give yourself plenty of time to put together the strongest application you can!

Preparing for a Cybersecurity Doctorate Program

The best cybersecurity doctorate programs can be intensive and competitive. Therefore, it’s a good idea to prepare before the program even starts – this can give you the edge you need to excel in the program!

Of course, your previous studies provide the foundation for your doctorate. An internship in the field can also help you to build useful skills and knowledge, especially when it comes to the latest trends  Likewise, participating in cybersecurity competitions or getting a cybersecurity certification can be highly advantageous.

However, the best thing you can do to prepare for a cybersecurity doctoral program is to build your network  in the sector. Join professional organizations and mingle with industry folks to gain insights into the field. You can also use social media platforms like LinkedIn and Twitter to enhance your networks.

Related Reading:  Best Master’s in Cybersecurity Programs

Why Get a Doctorate in Cybersecurity?

A doctorate in cybersecurity allows you to develop high-level skills and knowledge on preventing and analyzing security breaches, as well as formulating strategies to manage them. It is a valuable qualification that will qualify you for top jobs at some of the best organizations, with attractive remuneration.

When choosing the best cybersecurity PhD program for you, consider the school’s reputation and its accreditation. Also, look at the courses offered, as cybersecurity involves various specializations. You should also consider your budget in the context of each program’s tuition, fees, and financial aid offered.

Finally, where is the program located? Is it offered on-campus, offline, or in a hybrid program? These factors will affect your ability to balance your study with work and personal commitments.

Jobs and Salary Prospects for Doctors of Cybersecurity

Some of the common roles and median annual salaries  for graduates with a PhD in cybersecurity include:

  • Cybersecurity Engineer – $125,816
  • Information Security Manager – $96,406
  • Chief Information Security Officer (CISO) –  $124,405
  • Security Architect –  $111,433
  • Security Director  – $105,907

Key Takeaways

You may not find as many options for a PhD in cyber security as other fields. After all, it’s a specialized program. However, you’ll find a few solid top cybersecurity PhD programs that give you the opportunity to learn from top research institutions and faculty.

If you’ve found this round-up of the best PhDs in cybersecurity helpful, take a look at our guides to the best online Master’s in Computer Science  and online PhD Computer Science programs .

PhDs in Cybersecurity FAQs

What is the average cost of a phd in cybersecurity.

Costs vary depending on the school, program length, and delivery (on-campus or online). Usually, a PhD in cybersecurity can be anywhere between $30,000 to $100,000.

Is a PhD in Cybersecurity Worth it?

A PhD in cybersecurity is valuable because it will qualify you for some of the most in-demand and well-paid jobs available today. According to the BLS , jobs for information security professionals are estimated to grow by 33% over the next decade, significantly more than the national average.

Can You Get a PhD in Cybersecurity?

A PhD in cybersecurity is a specialized degree, but today, many universities offer it. Several programs are delivered on-campus, online, or in hybrid formats.

How Long is a PhD in Cybersecurity?

A PhD in cybersecurity can take from 3-7 years to complete. This will depend on the program, as well as individual factors such as whether you choose to study part-time or full-time.

What Can You Do with a PhD in Cybersecurity?

A PhD in cybersecurity will equip you to work for leading organizations as a CISO (Chief Information Security Officer), information security manager, or security architect. You’ll also be qualified to conduct research or work as a professor in cybersecurity or a related field.

How Many Credits are Required for a PhD in Cybersecurity?

You’ll typically need 60 credits to complete a cybersecurity PhD. However, this varies depending on the specific program or university.

What Kinds of Exams are Required During a PhD Program?

Unlike most undergraduate programs, a PhD degree relies heavily on coursework and, in particular, a main dissertation or thesis. However, you’ll still have to complete some exams.

Usually, there are three kinds of exams:

  • A qualifying exam  that occurs earlier in the program.
  • A preliminary exam  that proves the candidate’s readiness to start the dissertation/research.
  • The  final exam  for the candidate to defend their dissertation/research work.

How Do You Choose a PhD in Cyber Security Program?

You should consider faculty experience, networking opportunities, available funding, accreditation, and alumni statistics before choosing a PhD in cyber security program.

Lisa Marlin

Lisa Marlin

Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.

  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 30+ Best Dorm Room Essentials for Guys in 2024
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 12 Best Laptops for Computer Science Students
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ BA vs BS: What You Need to Know [2024 Guide]

Best Master’s in Cybersecurity Programs in 2024

Thegradcafe and jobbio join forces to connect top talent with great companies, related posts.

Here's how to find a job as a recent college graduate.

  • How New Grads Research Companies to Find Jobs

phd cyber security air university

Experience Paradox: Entry-Level Jobs Demand Years in Field

Grad school application rates have more than doubled for artificial intelligence programs.

Grad Trends: Interest in Artificial Intelligence Surges

Here's how to earn consideration from the big tech players as a new grad.

Applying to Big Tech This Year? Here’s How to Ace It.

Fewer employers list education requirements in job postings.

73% of job seekers believe a degree is needed for a well-paying role–but is it?

There are more jobs than talent in these cities.

Tech Talent Crunch: Cities with More Jobs Than Workers

phd cyber security air university

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • When to Apply for Grad School: Easy Monthly Timeline [2026-2027]
  • 30+ Best Dorm Room Essentials for Guys in 2024
  • Best Laptop for Programming Students in 2024
  • The Sassy Digital Assistant Revolutionizing Student Budgeting

The Gradcafe

© 2024 TheGradCafe.com All rights reserved

  • Partner With Us
  • Results Search
  • Submit Your Results
  • Write For Us

Capitol Technology University

  • Aviation and Astronautical Sciences
  • Computer Science, Artificial Intelligence and Data Science
  • Construction and Facilities
  • Critical Infrastructure
  • Cyber & Information Security
  • Cyberpsychology
  • Engineering
  • Engineering Technologies
  • Intelligence and Global Security Studies
  • Management of Technology
  • Occupational Safety and Health
  • Uncrewed Systems
  • Doctoral Degrees
  • Master's Degrees
  • Bachelor's Degrees
  • Online Programs
  • Associate Degrees
  • Certificates
  • Minor Degrees
  • STEM Events
  • Webinars and Podcasts
  • Master's
  • Undergraduate
  • Transfer Students
  • Military and Veterans
  • International Students
  • Admissions Counselor
  • Capitol Connections
  • Accepted Students
  • Project Lead the Way
  • Builder Culture
  • Campus Life
  • Clubs and Organizations
  • Centers and Labs
  • Online Classes
  • The Capitol Commitment
  • Top Employers
  • Co-ops and Internships
  • Professional Education
  • Find a Mentor
  • Career Services
  • Capitol Online Job Board
  • Recruiters and Employers
  • Why Capitol Tech
  • At a Glance
  • Mission, Vision and Goals
  • Diversity, Equity and Inclusion
  • Washington, D.C.
  • Capitol History
  • Capitol Partners
  • News and Events
  • Visitors/Campus
  • Accreditation
  • Recognitions & Awards
  • Current Students
  • Faculty & Staff
  • Alumni & Giving
  • News & Events
  • Capitology Blog
  • Maps / Directions

phd cyber security air university

  • Degrees and Programs

Doctor of Philosophy (PhD) in Space Cybersecurity

  • Request Information

Degree options bar image

Earn a doctoral degree in space cybersecurity, defend this new cyber battleground

Space has become the latest cyber battleground. Many satellites in orbit were not designed with cybersecurity protection. In October 2020, the Wilson Center held an event, "Seeking Strategic Advantage: How Geopolitical Competition and Cooperation are Playing Out in Space," to highlight growing threat and the need for advancement in Space Cybersecurity. 

Much of the world's critical infrastructure is heavily dependent on space, specifically space-based assets, for its daily functioning. Essential systems—such as communications, air transport, maritime trade, financial services, weather monitoring and defense—all rely heavily on space infrastructure, including satellites, ground stations and data links at the national, regional and international level. This dependence poses a serious, and yet frequently under-recognized, security dilemma—especially cyber threats—for critical infrastructure providers and policymakers alike. 

The Doctor of Philosophy (PhD) in Space Cybersecurity degree is a unique program designed to meet the evolving needs of today's Space Cybersecurity in an ever-changing world of conflict. This program provides students with the opportunity to conduct extensive and sustained, original research at the highest level in this field of Space Cybersecurity. It is designed to meet the demands of the highest-skilled professionals to assist them in becoming leaders who will be involved in the advancement, expansion, and support of Space Cybersecurity on a national and international level. The PhD in Space Cybersecurity is for current professionals in the field who desire to elevate their skills to the highest level and to contribute to the body of knowledge in Space Cybersecurity. 

Graduates with the Ph.D. in Space Cybersecurity degree will be expected to fill technical executive and senior-level positions in commercial companies as well as local, state, and federal government with a variety of titles such as: 

  • Chief Executive Officer, Commercial Space Cybersecurity Company
  • Chief Space Cybersecurity Operations Officer
  • Chief Cybersecurity Officer, Space Vehicles
  • Senior Director, Space Cybersecurity
  • Cybersecurity Officer, U.S. Space Force
  • Senior Scientist, Space Cybersecurity
  • Senior Vice President, Space Cybersecurity
  • Senior Penetration Chief, Space Cybersecurity Division
  • Senior Director, Red Team, Space Cybersecurity

Graduates from the Ph.D. in Space Cybersecurity will possess the highest knowledge in Space Cybersecurity with the ability to serve as top leaders in their field. Graduates will also possess the required knowledge in Space Cybersecurity to serve as a subject matter expert and form their own private company. 

Why Capitol?

ccra opportunity

Our comprehensive cybersecurity center

The  Center for Cybersecurity Research and Analysis  serves as the university hub for training, research, analysis, and programming in all things cybersecurity. Learn to defeat simulated cyberattacks, land an internship where you can put your skills to work and prepare for the workforce, publish a scholarly article addressing an existing challenge in the field, and much more. Students–both on-ground and online–faculty, alumni, and community partners alike are welcome.

trophy

1st in the Nation

Capitol Technology University was awarded the 2020 title of the Best Cybersecurity Program in the nation and was selected by the NSA as the National Center of Academic Excellence (CAE) Northeast Regional Hub.

clock stopwatch

Learn around your busy schedule

Our low residency requirement takes in consideration the time commitment of your established career.

professional faculty

Our classes are taught by working professionals

The Baltimore/Washington D.C. area has one of the largest concentrations of high-tech companies, defense contractors, and government agencies in the United States, making it easier to find internships and high-paying jobs.

Key Faculty

phd cyber security air university

Vice President

phd cyber security air university

Dissertation Chair

Career Opportunities

market

Market demand for cybersecurity

Get the necessary credentials to become a senior leader, program developer or policy maker in federal agencies and the private sector.

ideas

A degree that is relevant to any and every organization

Graduates will contribute significantly to their fields in cybersecurity through the creation of new knowledge and ideas.

Degree Details

This program may be completed with a minimum of 60 credit hours, but may require additional credit hours, depending on the time required to complete the dissertation/publication research. Students who are not prepared to defend after completion of the 60 credits will be required to enroll in RSC-899, a one-credit, eight-week continuation course. Students are required to be continuously enrolled/registered in the RSC-899 course until they successfully complete their dissertation defense/exegesis.

The Doctorate degree in Cybersecurity is a total of 60 credits, which covers a literature review, professional research and theory, professional ethics and leadership, dissertation preparation, and other topics. Students can select from several electives based on their personal focus.

The student will produce, present, and defend a doctoral dissertation after receiving the required approvals from the student’s Committee and the PhD Review Boards.

Prior achieved credits may be accepted, pending approval

Doctor of Philosophy - 60 credits

 

6

6

6

6

6

 

6

6

6

6

6

Program Objectives:

  • Students will evaluate the need for robust protection of space cybersecurity within the field of military and commercial Space Cybersecurity.
  • Students will demonstrate advanced knowledge and competencies needed for the future in Space Cybersecurity.
  • Students will analyze theories, tools, and frameworks used in Space systems.
  • Students will execute a plan to complete a significant piece of scholarly work in Space Cybersecurity.
  • Students will develop skill to implement Space Cybersecurity plans needed for advanced global protection of national assets.

Learning Outcomes:

Upon graduation, graduates will:

  • incorporate the theoretical basis and practical applications of Space Cybersecurity into their professional work;
  • demonstrate the highest mastery the needs of Space Cybersecurity;
  • evaluate complex problems, synthesize divergent/alternative/contradictory perspectives and ideas fully, and develop advanced solutions to Space Cybersecurity challenges; and
  • contribute to the body of knowledge in the study of Space Cybersecurity in commercial applications and military if appropriate.

Tuition & Fees

Tuition rates are subject to change.

The following rates are in effect for the 2024-2025 academic year, beginning in Fall 2024 and continuing through Summer 2025:

  • The application fee is $100
  • The per-credit charge for doctorate courses is $950. This is the same for in-state and out-of-state students.
  • Retired military receive a $50 per credit hour tuition discount
  • Active duty military receive a $100 per credit hour tuition discount for doctorate level coursework.
  • Information technology fee $40 per credit hour.
  • High School and Community College full-time faculty and full-time staff receive a 20% discount on tuition for doctoral programs.

Find additional information for 2024-2025 doctorate tuition and fees.

The National Security Agency and Department of Defense have designated Capitol Technology University as a National Center of Academic Excellence in Cyber Defense. We were honored to have a communications team from the NSA come to campus and produce this video explaining the benefits of our award-winning program.

Capitol Tech's PhD in Space Cybersecurity seemed to have the perfect blend of flexibility in how I can conduct research and study that aligns with my current job as a Principal Cybersecurity Engineer for an Aerospace Company.

-Sean Adair PhD in Space Cybersecurity

Need more info, or ready to apply?

Northeastern University

Academic Catalog 2024-2025

Cybersecurity, phd.

A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Students who choose the PhD in Cybersecurity program have a strong desire to pursue academic research solving critical cybersecurity challenges facing today’s society. The PhD program is a natural path for students in the college’s  Master of Science in Cybersecurity  program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers. Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to  gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science

A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a National Center of Academic Excellence in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations

The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern University’s Khoury College of Computer Sciences, the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities

Access to research projects at Northeastern’s research centers focused on security:

The Cybersecurity and Privacy Institute :  The mission of Northeastern's Cybersecurity and Privacy Institute is to safeguard critical technology. Forging partnerships with experts in industry, government, and academia worldwide, the Institute’s faculty and students develop, protect, and enhance technologies on which the world relies—from mobile devices and “smart” IoT applications to tomorrow’s self-driving cars and delivery drones. Their expertise spans algorithm auditing; cloud security; cryptography; differential privacy; embedded device security; internet-scale security measurements; machine learning; big data; security, malware, and advanced threats; network protocols and security; web and mobile security; and wireless network security.

The International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware, and vulnerability analysis; intrusion detection; and other computer security issues.

The ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

The benefits of the Boston area:

  • World-renowned for academic and research excellence, the Boston area is also home to some of the nation’s largest Department of Defense contractors and government and independent labs such as MIT Lincoln Lab, MITRE, and Draper Lab.

Degree Requirements

The PhD in Cybersecurity degree requires completion of at least 48 semester semester hours beyond a bachelor’s degree. Students who enter with an undergraduate degree will typically need four to five years to complete the program, and they will be awarded a master’s degree en route to the PhD.

Doctoral Degree Candidacy

A student is considered a PhD degree candidate after  completing the core courses with at least a 3.500 GPA, with no grades lower than a B in the core courses, and either publishing a paper in a strong conference or journal or passing an oral exam that is conducted by a committee of three cybersecurity faculty members and based on paper(s) written by the student.

One year of continuous full-time study is required after admission to the PhD candidacy. During this period, the student will be expected to make substantial progress in preparing for the comprehensive examination.

Teaching Requirement

All cybersecurity PhD students must satisfy the teaching requirement in order to graduate. This requirement is fulfilled when the student works as a teaching assistant or instructor of record for one semester and during this semester:

  • Teaches at least three hours of classes
  • Prepares at least one assignment or quiz or equivalent

PhD students are expected to satisfy the teaching requirement some time after completing their first year and at least one semester prior to scheduling their PhD defense. 

Dissertation Advising

The doctoral dissertation advising team for each student consists of two cybersecurity faculty members, one in a technical area. When appropriate, the second faculty advisor will be from the policy/social science area.

Dissertation Committee

With the help of the advisor, a student selects the committee, consisting of at least four members, to be approved by the PhD cybersecurity curriculum committee. The four members must include the advisor, two internal members, and an external member.

Comprehensive Examination

A PhD student must submit a written dissertation proposal and present it to the dissertation committee. The proposal should identify the research problem, the research plan, and the potential impact of the research on the field. The presentation of the proposal will be made in an open forum, and the student must successfully defend it before the dissertation committee after the public presentation.

Dissertation Defense

A PhD student must complete and defend a dissertation that involves original research in cybersecurity.

Awarding of Master’s Degrees

Students who enter the PhD in Cybersecurity program with a bachelor’s degree have the option of earning a master's degree from one of the departments participating in the program. To do so, they must meet all of the department’s degree requirements.

  • Concentrations and course offerings may vary by campus and/or by program modality.  Please consult with your advisor or admissions coach for the course availability each term at your campus or within your program modality.  
  • Certain options within the program may be  required  at certain campuses or for certain program modalities.  Please consult with your advisor or admissions coach for requirements at your campus or for your program modality. 

Bachelor’s Degree Entrance

Complete all courses and requirements listed below unless otherwise indicated.

Teaching Qualifying exam and area exam Annual review Dissertation proposal Dissertation committee Dissertation defense

Core Requirements

A grade of B or higher is required in each core course. A cumulative 3.500 grade-point average is required for the core requirement.

Course List
Code Title Hours
Foundations
Cyberlaw: Privacy, Ethics, and Digital Rights4
Software Vulnerabilities and Security4
or  Introduction to Software Security
Network Security4
or  Computer Hardware and System Security

Electives and Tracks

Course List
Code Title Hours
Note: Consult faculty advisor for other acceptable courses.
Tracks
Select at least two courses from one track:8
Compilers
Wireless Network
Digital Signal Processing
Computer Architecture
Mobile and Wireless Networking
Computer Hardware Security
Fundamentals of Computer Networking
Machine Learning
Deep Learning
Introduction to Machine Learning and Pattern Recognition
Advanced Machine Learning
Wireless Network
Network Security
Foundations of Distributed Systems
Seminar in Computer Security
Computer System Security
Wireless Sensor Networks and the Internet of Things
Wireless Communication Systems
Digital Communications
Mobile and Wireless Networking
Fundamentals of Computer Networks
Compilers
Intensive Computer Systems
Foundations of Distributed Systems
Computer System Security
Network Security
Wireless and Mobile Systems Security
Computer Architecture
Advanced Algorithms
Complexity Theory
Foundations of Cryptography
Seminar in Theoretical Computer Science
Information Theory
Empirical Research Methods
Privacy, Security, and Usability
Theory and Methods in Human Computer Interaction
Research Methods in the Social Sciences
Qualitative Methods
Statistical Analysis
Quantitative Analysis
Criminology
Evidence-Based Crime Policy
Security Risk Management and Assessment
Information System Forensics
Decision Making for Critical Infrastructure
Security and Resilience Policy
Electives
Selected in consultation with advisor from graduate-level CS and ECE courses and graduate-level courses offered by the College of Social Sciences and Humanities, including CRIM, CS, CY, DS, EECE, INSH, MATH and POLS.28

Dissertation

Course List
Code Title Hours
Dissertation Term 1
Dissertation Term 2
Complete the following (repeatable) course until graduation:
Dissertation Continuation

Program Credit/GPA Requirements

48 total semester hours required Minimum 3.000 GPA required

Incoming PhD in Cybersecurity students who have already completed a Master of Science in an adjacent field may petition to the graduate program administration for advanced entry. Advanced entry petitions are reviewed by the program administration on a case-by-case basis. Please note that advanced entry does not waive by itself any part of the PhD coursework requirements. As a degree conferral requirement, a minimum of 16 semester hours of coursework beyond the 32 semester hours of the master’s degree is required of advanced entry PhD students (48 semester hours is required of standard entry PhD students). A grade of B or higher is required in each course. A cumulative 3.500 GPA is required for the core requirement.

Refer to the PhD Cybersecurity overview for admission to candidacy requirements.

Refer to the PhD Cybersecurity  overview  for residency requirements.

Refer to the PhD Cybersecurity  overview for teaching requirements.

Refer to the PhD Cybersecurity  overview for dissertation advising requirements.

Refer to the PhD Cybersecurity  overview for dissertation committee requirements.

Refer to the PhD Cybersecurity  overview  for comprehensive examination requirements.

Refer to the PhD Cybersecurity  overview  for dissertation defense and completion requirements.

Core Requirement

Students must maintain a minimum GPA of 3.500 as well as earn a grade of B or better in each core course.

Course List
Code Title Hours
Consult your faculty advisor for approved courses.16

Minimum 16 semester hours required Minimum 3.000 GPA required

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2023-24 Undergraduate Day PDF

2023-24 CPS Undergraduate PDF

2023-24 Graduate/Law PDF

2023-24 Course Descriptions PDF

  • 1-800-NAT-UNIV (628-8648)
  • Bachelor of Arts Degree in Early Childhood Education (BAECE)
  • Bachelor of Arts in Early Childhood Development with an Inspired Teaching and Learning Preliminary Multiple Subject Teaching Credential (California)
  • Bachelor of Arts in English
  • Bachelor of Arts in History
  • Master of Arts in Social Emotional Learning
  • Master of Education in Inspired Teaching and Learning with a Preliminary Multiple and Single Subject Teaching Credential and Intern Option (CA)
  • Master of Arts in Education
  • Master of Early Childhood Education
  • Education Specialist
  • Doctor of Education
  • Doctor of Philosophy in Education
  • Doctor of Education in Educational Leadership
  • Ed.D. in Organizational Innovation
  • Certificate in Online Teaching (COT) Program
  • Online Medical Coding Program
  • Building Our Team Through Community Policing
  • Inspired Teaching and Learning with a Preliminary Single Subject Teaching Credential
  • Inspired Teaching and Learning with a Preliminary Multiple Subject Teaching Credential and Internship Option (California)
  • Preliminary Administrative Services Credential (CA Option)
  • Preliminary Education Specialist Credential: Mild/Moderate with Internship Option (CA)
  • All Teaching & Education
  • Associate of Science in Business
  • Bachelor of Business Administration
  • Bachelor of Science in Healthcare Administration
  • Bachelor of Arts in Management
  • Master of Business Administration (MBA)
  • Master of Public Health (MPH)
  • Master of Science in Data Science
  • Master of Public Administration
  • Doctor of Criminal Justice
  • Doctor of Philosophy in Organizational Leadership
  • Doctor of Business Administration
  • Doctor of Philosophy in Business Administration
  • Post-Baccalaureate Certificate in Business
  • Post-Master's Certificate in Business
  • Graduate Certificate in Banking
  • Certificate in Agile Project Management
  • All Business & Marketing
  • Bachelor of Science in Nursing (BSN) (California)
  • Bachelor of Science in Nursing (BSN) Second Bachelor Degree (California)
  • Bachelor of Science in Clinical Laboratory Science
  • Bachelor of Science in Public Health
  • Master of Science in Nursing
  • Master of Science in Health Informatics
  • Master of Healthcare Administration
  • Doctor of Nurse Anesthesia Practice (DNAP)
  • Doctor of Health Administration
  • Doctor of Nursing Practice in Executive Leadership
  • LVN to RN 30 Unit Option Certificate
  • Psychiatric Mental Health Nurse Practitioner Certificate
  • Family Nurse Practitioner Certificate
  • Emergency Medical Technician Certificate
  • All Healthcare & Nursing
  • Bachelor of Arts in Psychology
  • Bachelor of Arts in Integrative Psychology
  • Bachelor of Science in Criminal Justice Administration
  • Bachelor of Arts in Sociology
  • Master of Science in Applied Behavioral Analysis Degree
  • Master of Arts Degree in Counseling Psychology
  • Master of Arts in Consciousness, Psychology, and Transformation
  • Doctor of Clinical Psychology (PsyD) Program
  • Doctor of Philosophy in Marriage and Family Therapy
  • Doctor of Philosophy in Psychology
  • Doctorate of Marriage and Family Therapy
  • Graduate Certificate in Trauma Studies
  • Post-Master's Certificate in Psychology
  • Post-Baccalaureate Certificate in Applied Behavior Analysis
  • Pupil Personnel Services Credential School Counseling (PPSC)
  • University Internship Credential Program for Pupil Personnel Services School Counseling (California Only)
  • All Social Sciences & Psychology
  • Bachelor of Science in Cybersecurity
  • Bachelor of Science in Electrical and Computer Engineering
  • Bachelor of Science in Computer Science
  • Bachelor of Science in Construction Management
  • Master of Science in Cybersecurity
  • Master of Science in Computer Science
  • Master of Science in Engineering Management
  • Doctor of Philosophy in Data Science
  • Doctor of Philosophy in Computer Science
  • Doctor of Philosophy in Technology Management
  • Doctor of Philosophy in Cybersecurity
  • All Engineering & Technology
  • Associate of Arts in General Education
  • Bachelor of Arts in Digital Media Design
  • Bachelor of Arts in General Studies
  • Master of Arts in English
  • Master of Arts in Strategic Communication
  • Foreign Credential Bridge Program
  • All Arts & Humanities
  • Graduate Certificate in Forensic and Crime Scene Investigations
  • Bachelor of Public Administration
  • Bachelor of Science in Homeland Security and Emergency Management
  • Minor in Business Law
  • Master of Criminal Justice Leadership
  • Master of Forensic Sciences
  • Master of Science in Homeland Security and Emergency Management
  • Doctor of Public Administration
  • College of Law and Public Service
  • All Criminal Justice & Public Service
  • Paralegal Specialist Certificate Corporations
  • Paralegal Specialist Certificate Criminal Law
  • Paralegal Specialist Certificate Litigation
  • Associate of Science in Paralegal Studies
  • Bachelor of Arts in Pre-Law Studies
  • Bachelor of Science in Paralegal Studies
  • Juris Doctor
  • Associate of Science in Human Biology
  • Associate of Science in General Education
  • Bachelor of Science in Biology
  • Bachelor of Science in Mathematics
  • All Science & Math
  • Program Finder
  • Undergraduate Admissions
  • Graduate Program Admissions
  • Military Admissions
  • Early College
  • Credential & Certificate Programs
  • Transfer Information
  • Speak to an Advisor
  • How to Pay for College
  • Financial Aid
  • Scholarships
  • Tuition & Fees
  • NU offers a variety of scholarships to help students reduce their financial burden while focusing on achieving their goals. Explore Scholarships
  • Colleges/Schools
  • University Leadership
  • Office of the President
  • Academies at NU
  • Course Catalog
  • Accreditation
  • Workforce and Community Education
  • President’s Circle
  • Board of Trustees
  • NU Foundation
  • Military & Veterans
  • Coast Guard
  • Space Force
  • National Guard & Reservist
  • Military Spouses & Dependents
  • Military Resources
  • NU proudly serves active duty and Veteran students from all branches of the military — at home, on base, and abroad. Military Admissions
  • Online Degrees & Programs
  • Consumer Information
  • Student Login
  • Graduation Events
  • Student Portal
  • Student Bookstore
  • Student Resources
  • Dissertation Boot Camp
  • Show your NU pride and shop our online store for the latest and greatest NU apparel and accessories! Shop Now
  • Request Info
  • Our Programs

Couple leaving their home

Doctor of Philosophy   in Cybersecurity   (PhD-CY)

Millions in scholarships.

Explore National University’s scholarship opportunities. 

Year-round Enrollment

Our admissions team reviews applications year-round.

240K+ Alumni Worldwide

Become a member of NU’s global community.

National and Northcentral have merged, and this program is now offered by NU.  Learn more .

Doctor of Philosophy in Cybersecurity (PhD-CY)

In today’s data-dependent world, every organization needs senior-level experts with the knowledge and training to monitor its networks for vulnerabilities and security breaches and use tools like firewalls and data encryption programs to protect sensitive information. National University’s online Doctor of Philosophy of Cybersecurity (PhD-CY) degree program takes an applied approach to cybersecurity theory and research. 

NU’s curriculum challenges you to explore advanced topics, learn the very latest concepts, and prepare for anticipated risks in the field of cybersecurity. The Cybersecurity doctorate is designed to prepare researchers with technology strategies that are applicable to leading positions in both the private and public sectors. Our program offers four specializations that allow you to tailor your studies and research to match your interest in a specific area of cybersecurity.

Prepare for a Leadership Role Protecting an Organization’s Computer Networks and Systems

In this rigorous curriculum, you’ll explore governance, compliance, leading frameworks, models, and standards to reduce threats and vulnerabilities. You’ll also create a portfolio of valuable capabilities, addressing internal and external issues through the intelligent manipulation of data while completing your doctoral studies.

WASC icon

The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.

Course Details

Degree and course requirements.

The PhD program requires a minimum of 60 credits. Additional credit hours may be allowed as needed to complete the dissertation research. If granted, additional courses will be added to the student degree program in alignment with the SAP and Academic Maximum Time to Completion policies. Students who do not complete their program in accordance with these policies may be dismissed.

The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours. 

*Students select one pair of research methods and directed research courses based on their own research proposal. 

The PhD in Cybersecurity requires the following courses for every specialization:

Course Name

In this course, students are prepared for an understanding of networks and related theory to support computer science, cybersecurity, and technology management needs. Students will learn network concepts, as well as designing networks for reliability, availability, confidentiality, and network monitoring. Content will include high-level design of networks, evaluation of service providers, and strategies to prepare an organization for future communication needs (such as multi-cloud, satellite, 5G & 6G, and quantum data communications, plus related security techniques). Students will learn network design, planning, the role of network data communication devices, global access, and safe third-party data exchange.

This course will consolidate a foundation of concepts relating to security and cybersecurity, enabling the successful examination of greater detail and complexity in later courses. You will examine the full range from governance through compliance with laws, through people risks, to technology. Various mitigation options are considered to reduce vulnerabilities, counter threats, and to protect an organization’s data and system assets. You will study the need to protect organizations from future exposures and apply critical thinking and synthesis to motivate the resources needed to defend an organization.

Cybersecurity has the primary objective of averting losses and restoring proper operations should there be a loss. During this course you will study the foundations of risk and the opportunities to reduce cybersecurity losses for organizations. Risk assessment abilities and research options form the base of cyber defenses and determine the need for subsequent resources. The course continues with measuring risk and events leading to the identification of potential incidents and solutions. Learning about contingencies consider the needs of the organization, maintaining operations, and preparing for the best recovery should there be a loss.

Tracking and responding to cyber events requires massive databases integrating content from all devices at every location. Cyber threat analysis and response implies long term access and complex manipulation of event databases. In this course you will learn techniques to capture and display relevant data and leverage automation to reduce losses. Data manipulation, automated sense-making, appropriate fast reactions, machine learning, data analysis, and presentation are rapidly developing cybersecurity techniques. You will also leverage required capabilities for the defense of the organization, respond to enhanced threat complexity and capabilities, and address the need to counter data poisoning by threat actors.

Risk management is the foundation of defending organizations from information security, cyber threats, compliance, audit, and privacy exposures. To address risk and assurance, this course builds an integrated approach solution leading to the prioritization of resources for an organization. You will extend your knowledge and skills for global protection within and beyond the perimeter. This course positions the importance of risk management within a cybersecurity program and its role within Enterprise Risk Management (ERM). You will also assess theories and practices concerning risk management, compose a risk strategy, and leverage maturity models to improve the protection of organizations.

This course serves as an extensive exploration of statistics for the technology leader. Included in the course, is an advanced examination of statistical analyses commonly used for information systems and technology research. During this course, you will use different statistical tools to enhance your advanced analytical skills. These statistical analysis skills are required to plan, conduct, and interpret quantitative data to inform enterprise decisions. You will also learn to illustrate and produce technical output reports.

Global integration and broad alliances between criminal elements and nation-states frequently lead to rapidly changing and significant threats to all nations, organizations, and citizens. During this course, you will study current and predictable threats, target critical infrastructure, and determine risks implied in new technology. You will also learn to recognize the risks originating from cybercriminals, terrorism, hacktivism, and nation-state, and other significant threat actors. You will devise and work to get funding for viable strategies to defend critical infrastructures, organizations, and the citizens of the nation.

This course provides a survey of the different methods used to conduct technology-based research. During this course, you will learn about the research principles and methodologies that guide scientific inquiry in order to develop an understanding of the effects of research on individuals and organizations. Specifically, you will study the scientific research lifecycle, data collection methods, and research design methodology. You will finish the course by selecting a research design methodology to support your research interests through the remainder of your program.

The results of technical research are frequently used to support informed management decisions. This course provides technology leaders and professionals with the skills needed to design and conduct quantitative research studies to support specific types of data. During this advanced course in research, you will explore and apply different types of quantitative research methods and statistical techniques. You will also explore instrumentation, data collection, and data analysis tools and techniques to create aligned, ethical, and substantive research designs.

A quantitative research design includes objective analysis using experimental, quasi-experimental, and related techniques. Technical quantitative research involves statistical analysis of data collected from a larger number of participants to determine an outcome that can be applied to a general population. During this course, you will work through the scientific research process and apply your knowledge of quantitative research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.

The results of qualitative research are frequently used to support informed management decisions. This course provides technology leaders with an in-depth introduction to qualitative methods for studying human behavior, including grounded theory, narrative analysis, and case studies. During this advanced course in research, you will apply qualitative research methods to an information technology-based study. You will also deepen your research knowledge and skills by conducting interviews, collecting and coding data, producing ethical data conclusions, and creating objective research reports.

A qualitative approach to research of a technical nature integrates theoretical, conceptual, and empirical constructs with common practices and experience to gain an understanding of performance and functionality, develop an applied and testable model for improvement, or provide insights into problems to develop new ideas. During this course, you will work through the scientific research process and apply your knowledge of qualitative research design to develop a technical research proposal to support your research interests through the remainder of your program.

The results of technical research are frequently used to develop new products and services. This course provides technology leaders and professionals with the skills needed to design and conduct constructive research studies based on theory. During this advanced course in research, you will examine the methods and measurements used to design constructive research studies to develop sound technical solutions or prototypes. You will also explore software and security testing tools and user acceptance testing methods in order to create aligned, ethical, and substantive research designs.

Technical constructive research focuses on models, frameworks, tools, and software used by industry to improve value creation. A constructive approach to research of a technical nature integrates theoretical and empirical constructs with common practices and experience to develop an applied and testable model to improve the fields of computer science and information technology. During this course, you will work through the scientific research process and apply your knowledge of constructive research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.

The Pre-Candidacy Prospectus course is intended to ensure students have mastered knowledge of their discipline within cybersecurity prior to doctoral candidacy status and are able to demonstrate the ability to design empirical research as an investigator before moving on to the dissertation research coursework. During this course, you will demonstrate the ability to synthesize empirical, peer-reviewed research to prepare for the dissertation sequence of courses. This course should be completed only after the completion of all foundation, specialization, and research courses.

Students in this course will be required to complete Chapter 1 of their dissertation proposal including a review of literature with substantiating evidence of the problem, the research purpose and questions, the intended methodological design and approach,  and the significance of the study. A completed, committee approved (against the minimum rubric standards) Chapter 1 is required to pass this course successfully. Students who do not receive approval of Chapter 1 to minimum standards will be able to take up to three supplementary 8-week courses to finalize and gain approval of Chapter 1.

Students in this course will be required to work on completing Chapters 1-3 of their dissertation proposal and receive committee approval for the Dissertation Proposal (DP) in order to pass the class. Chapter 2 consists of the literature review. Chapter 3 covers the research methodology method and design and to includes population, sample, measurement instruments, data collection and analysis, limitations, and ethical considerations. In this course, a completed, committee-approved Chapters 2 and 3 are required and, by the end of the course, a final approved dissertation proposal (against the minimum rubric standards). Students who do not receive approval of the dissertation proposal will be able to take up to three supplementary 8-week courses to finalize and gain approval of these requirements.

Students in this course will be required to prepare, submit, and obtain approval of their IRB application, collect data, and submit a final study closure form to the IRB. Students still in data collection at the end of the 12-week course will be able to take up to three supplementary 8-week courses to complete data collection and file an IRB study closure form.

In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.

Program at a Glance

Total Credit Hours:  60 Credit Hours Courses:  20 Courses Recommended Completion Time:  40-44 Months Next Start Date:  Every Monday Classroom Size:  One

Specializations

General and technology, phd-cy.

The Doctor of Philosophy in Cybersecurity (PhD-CY), General and Technology specialization degree builds on the core computing principles and cybersecurity best practices, frameworks, and models. The degree provides a broad overview, adding governance and strategic views to compliment forensic, software development cloud, and systems certification content. Students use firsthand experience, explore advanced topics, learn the latest and anticipated concepts, consider the evolution of risks and mitigation, learn advanced threat detection, and propose their own research. The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors. 

Specialization Courses – 15 Credit Hours Total. Each course is 3 semester credits and runs 8 weeks.

Global Strategy and Operations, PhD-CY

The Doctor of Philosophy in Cybersecurity (PhD-CY), Global Policy and Operations specialization builds on the core program general principles, best practices, frameworks, and models. The specialization adds specific global solutions through an integrated strategy and leadership capabilities to establish global operations. 

The focus is on solving challenges of multi-time zone, multi-continent, and a range of laws, languages, and cultures. Specific considerations include diverse technologies, challenging support structures, and cyber target domains. The complication of widely distributed infrastructure, diverse political influences, and complex supply chains form part of the predictive strategy and the creation of operational excellence.

Governance, Risk, and Compliance, PhD-CY

The Doctor of Philosophy in Cybersecurity (PhD-CY), Governance, Risk, and Compliance specialization combines the four knowledge areas to complete research or synthesize cybersecurity solutions for enterprises subject to national exposures and global threats. The combined resolution of risk, compliance, audit, and privacy will enable graduates to create enhanced solutions while limiting the need for resources. 

The specialization investigates current and anticipated needs and solutions within all four areas, addressing key issues for larger organizations while providing improved strategic alignment. It includes important access control, and threat discovery across complex environments. The specialization includes an emphasis on preempting future losses.

Secure Cloud Computing, PhD-CY

The Doctor of Philosophy in Cybersecurity (PhD-CY), Secure Cloud Computing specialization builds on best practices, frameworks and models to synthesize unique solutions that optimize organization outcomes. The specialization investigates current and anticipated needs and solutions emphasizing the cloud computing. Learning and research adds practical and strategic insights to enable reduced risks for cloud computing and multi-cloud cybersecurity solutions. 

The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors where advanced or complex cloud computing is important. Competencies include complex secure data communications, identity management, and access controls.

Program Learning Outcomes

As a graduate of National University’s Doctor of Philosophy in Cybersecurity (PhD-CY), you’ll be able to:

  • Advance theory and practical  applications of cybersecurity
  • Formulate cybersecurity governance, policy, risk, and compliance
  • Assess internal and external threats and vulnerabilities to reduce organizational cyber risk
  • Evaluate tools, data, and processes  to enhance protection and foster resilience
  • Facilitate the protection of critical information resources from current and future loss

The most demanding jobs in the field of cybersecurity require experienced professionals with advanced, industry-current knowledge and skills to develop security standards and best practices for their organization. It’s also a career that’s in high demand. For example, about 16,300 openings for information security analysts are projected each year, according to the Bureau of Labor Statistics, and they’ll be well compensated for their expertise – the BLS also states the median annual wage for IS analysts was $102,600 in May 2021, with the highest 10 percent earning more than $165,920.*

NU’s online PhD in Cybersecurity incorporates technical and organizational strategy, architecture, and data science, as well as important areas within artificial intelligence (including machine learning and deep learning). Our curriculum also offers a choice of career-focused specializations, allowing you to focus your studies on a specific area of interest, including:

  • General and Technology 
  • Global Strategy and Operations 
  • Governance, Risk, and Compliance 
  • Secure Cloud Computing

*SOURCE:  https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1

NU’s Doctor of Philosophy in Cybersecurity opens the door to a wide range of important, in-demand careers for dedicated professionals with polished skills in communication, management, operations, leadership, and infrastructure. Some of the top job titles* posted in this field include:

  • Information Security Analysts
  • Systems Engineers
  • Security Engineers
  • DevSecOps Engineers
  • Cloud Security Engineers
  • Solutions Architects
  • Systems Administrators 
  • Postsecondary Teachers
  • Postsecondary Administrators

Employers of senior-level cybersecurity professionals are spread across every industry, including: professional, scientific and technical services, finance and insurance, manufacturing, information services, healthcare, and administrative support services.

*Positions may require additional experience, training, and other factors beyond successfully completing this degree program. Depending on where you reside, many positions may also require state licensure, and it is the responsibility of the student to ensure that all licensure requirements are met. We encourage you to also review program-specific requirements with an NU advisor. Any data provided on this page is for informational purposes only and does not guarantee that completion of any degree program will achieve the underlying occupation or commensurate salary.

**SOURCE :  Emsi Labor Analyst- Report. Emsi research company homepage at  https://www.economicmodeling.com/company/  (Report viewed:  May 13, 2022 ). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth.  Current and prospective students should use this data with other available economic data to inform their educational decisions.

Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.

To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.

Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.

To speak with our admissions team, call  (855) 355-6288  or request information and an advisor will contact you shortly. If you’re ready to apply, simply  start your application today

Man in a button-down shirt smiles at a young boy in glasses who also wears a backpack

Weekly Course Starts

Why Choose National University

  • 190+ Degree Programs
  • Year-Round Enrollment
  • Military Friendly

We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners. Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.

head shot image of man named Francisco

“National University has impacted my career. You can immediately apply what you learn in class to your business.”

-Francisco R., Class of 2016

Useful Links

  • Essential Skills for Cybersecurity Professionals
  • Why Consider a Career in Cybersecurity
  • Earning Your Cybersecurity Degree Online Related Programs:

A mother sits on a couch with a laptop and smiles at her toddler-aged son, who is looking forward.

FLEXIBLE SCHEDULE

PhD in Cybersecurity Program FAQs

A PhD dissertation is a scholarly documentation of research that makes an original contribution to the field of study. This process requires care in choosing a topic, documenting its importance, planning the methodology, and conducting the research. These activities lead smoothly into the writing and oral presentation of the dissertation. At National University, faculty members assist every doctoral student with a systematic process designed to ensure the completion of a high-quality dissertation. 

A doctoral candidate must be continuously enrolled throughout the series of dissertation courses. Dissertation courses are automatically scheduled and accepted without a break in scheduling to ensure that students remain in continuous enrollment throughout the dissertation course sequence. If additional time is required to complete any of the dissertation courses, students must re-enroll and pay the tuition for that course. Continuous enrollment will only be permitted when students demonstrate progress toward completing dissertation requirements. The Dissertation Committee determines progress.

National University is dedicated to assisting students in the achievement of their academic aspirations and helping them become valuable contributors to their community and profession. To accomplish this, we now offer a dissertation completion pathway for students who have successfully completed their doctoral coursework and achieved doctoral candidacy at a previous institution but were unable to complete their dissertation.  

Our Dissertation Completion Pathway (DCP) offers a unique opportunity for students to complete their doctorate in one of the doctoral programs offered at NU (excluding the PhD in MFT, DMFT, DNP, and DHA). Students successfully meeting the entrance and application requirements will complete a minimum of 23 credit hours to earn their doctorate.

The vision for the Dissertation Completion Pathway is to provide “all-but-dissertation” or ABD students a structured approach for completing their dissertation and help them achieve their academic goals in obtaining their doctorate. This pathway provides a student-centered, high touch, and structured pathway that recognizes past academic coursework while providing the student with the preparation and guidance to earn their doctoral degree.

National University allows 7 years to complete all doctoral programs of 60 credits or less. The median time to completion for this program is 44 months.

Time to completion varies depending upon the pace in which a student completes courses and the number of transfer credits accepted. As most NU students are working adults, balancing educational, professional, and personal commitments, our academic and finance advisors will work with you to develop a program schedule that works best for your needs.

Students following the preferred schedule designed by the Dean for this program, and applying no transfer credits, can expect to finish in as little as 40 months.

The highest degree for cybersecurity is typically a Doctor of Philosophy (PhD) in Cybersecurity or a related field. This degree typically requires several years of advanced coursework and research, and is designed for individuals who want to pursue careers in cybersecurity research, academia, or leadership positions.

Whether a PhD in cybersecurity is worth it depends on your career goals and personal interests. If you want to pursue a career in cybersecurity research or academia, a PhD can be a valuable asset that can lead to more job opportunities and higher salaries. However, if you’re primarily interested in working in industry, a PhD may not be necessary or worth the time and cost.

The salary for someone with a PhD in cybersecurity can vary depending on several factors, including the individual’s job title, experience, and location, but you can expect to earn a comfortable living in this field. According to payscale.com, the average base salary for someone with a PhD in Cybersecurity is around $172,000 per year in the United States. However, some positions such as chief security officer or director of operations could earn more.

white scholarship oppotunities icon

The Key Grant Scholarship

Do you qualify for a needs-based scholarship? Learn more about the NU Key Grant Scholarship and other scholarship opportunities to unlock the door to your dreams!

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

Search the site

Modal window with site-search and helpful links

Featured Programs

  • Business and Management
  • Computer Science
  • Teaching and Credentials

Helpful Links

  • Admissions & Application Information
  • Online College Degrees & Programs
  • Student Services
  • Request Your Transcripts

Terms & Conditions

By submitting your information to National University as my electronic signature and submitting this form by clicking the Request Info button above, I provide my express written consent to representatives of National University and National University affiliates (including City University of Seattle) to contact me about educational opportunities. This includes the use of automated technology, such as an automatic dialing system and pre-recorded or artificial voice messages, text messages, and mail, both electronic and physical, to the phone numbers (including cellular) and e-mail address(es) I have provided. I confirm that the information provided on this form is accurate and complete. I also understand that certain degree programs may not be available in all states. Message and data rates may apply. Message frequency may vary.

I understand that consent is not a condition to purchase any goods, services or property, and that I may withdraw my consent at any time by sending an email to [email protected] . I understand that if I am submitting my personal data from outside of the United States, I am consenting to the transfer of my personal data to, and its storage in, the United States, and I understand that my personal data will be subject to processing in accordance with U.S. laws, unless stated otherwise in our privacy policy . Please review our privacy policy for more details or contact us at [email protected] .

By submitting my information, I acknowledge that I have read and reviewed the Accessibility Statement . 

By submitting my information, I acknowledge that I have read and reviewed the Student Code of Conduct located in the Catalog .

National University

Chat Options

Arizona State University

Computer Science (Cybersecurity), PhD

  • Program description
  • At a glance
  • Degree requirements
  • Admission requirements
  • Tuition information
  • Application deadlines
  • Career opportunities
  • Contact information

Computer, Cybersecurity, Information, Information Assurance, Security, approved for STEM-OPT extension, assurance, enggradcs, foundation, network, systems

A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.

The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance.

The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including applied cryptography, computer and network security, computer forensics, data and information security and software security.

According to the National Security Agency, information assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. This includes providing restoration of information systems by incorporating protection, detection and reaction capabilities.

Domestic students enrolled in the cybersecurity concentration are eligible for federal fellowships, such as the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. For more information, students can visit the Cybersecurity and Trusted Foundations website

ASU is certified as a National Center of Academic Excellence in Information Assurance Education and a National Center of Academic Excellence in Information Assurance - Research by the National Security Agency and the Department of Homeland Security. Information assurance courseware at ASU has been certified by the Information Assurance Courseware Evaluation Program to satisfy the standards for Information Systems Security Professionals (NSTISSI 4011) and Senior Systems Managers (CNSSI 4012).

This program may be eligible for an Optional Practical Training extension for up to 24 months. This OPT work authorization term may help international students gain skills and experience in the U.S. Those interested in an OPT extension should review ASU degrees that qualify for the STEM-OPT extension at ASU's International Students and Scholars Center website.

The OPT extension only applies to students on an F-1 visa and does not apply to students completing a degree through ASU Online.

  • College/school: Ira A. Fulton Schools of Engineering
  • Location: Tempe

84 credit hours, a written comprehensive exam, a prospectus and a dissertation

Required Core Areas (9 credit hours) applications (3) foundations (3) systems (3)

Concentration (9 credit hours) CSE 543 Information Assurance and Security (3) Choose two: CSE 539 Applied Cryptography (3) CSE 545 Software Security (3) CSE 548 Advanced Computer Network Security (3)

Research (18 credit hours) CSE 792 Research (18)

Electives and Additional Research (36 credit hours)

Culminating Experience (12 credit hours) CSE 799 Dissertation (12)

Additional Curriculum Information Courses that are used to satisfy the core area requirement cannot be used to satisfy electives or other requirements. A grade of "B" or better is required for core courses.

18 credit hours of CSE 792 Research are required, and up to 54 credit hours are allowed on the plan of study. Students with research credit hours in excess of 18 add these credit hours to their electives and additional research.

Electives include:

  • additional CSE 792 Research credit hours (up to 36 credit hours allowed beyond the required 18)
  • computer science courses of which up to 18 credit hours of CSE 590 and CSE 790: Reading and Conference is allowed
  • up to six credit hours of interdisciplinary electives in other academic units that are subject to program chair approval

When approved by the academic unit and the Graduate College, this program allows 30 credit hours from a previously awarded master's degree to be used for this degree.

A maximum of three credit hours of 400-level coursework may be applied on the plan of study.

Applicants must fulfill the requirements of both the Graduate College and the Ira A. Fulton Schools of Engineering.

Applicants are eligible to apply to the program if they have earned a bachelor's degree in computer science, computer engineering or a closely related area. Most applicants should have earned a master's degree, but exceptional undergraduate applicants may be admitted directly into the doctoral program.

Applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in the last 60 hours of their first bachelor's degree program, or applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in an applicable master's degree program.

All applicants must submit:

  • graduate admission application and application fee
  • official transcripts from every university attended
  • three letters of recommendation
  • a statement of purpose
  • curriculum vitae or resume
  • proof of English proficiency

Additional Application Information An applicant whose native language is not English must provide proof of English proficiency regardless of their current residency.

GRE scores are optional.

If the student is assigned any deficiency coursework upon admission, those classes must be completed with a grade of "C" (scale is 4.00 = "A") or higher within two semesters of admission to the program. Deficiency courses include:

CSE 230 Computer Organization and Assembly Language Programming CSE 310 Data Structures and Algorithms CSE 330 Operating Systems CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science

The applicant's undergraduate GPA and depth of preparation in computer science and engineering are the primary factors affecting admission.

SessionModalityDeadlineType
Session A/CIn Person 12/31Final
SessionModalityDeadlineType
Session A/CIn Person 08/01Final

Graduates with a doctorate in computer science are able to analyze, understand and apply key theories and algorithms used in the field of computer science. They are also able to generate and evaluate new theories, algorithms and software modules that can advance the field of computer science. Graduates have a competitive advantage when it comes to securing employment.

Career examples include:

  • computer science researcher
  • computer science security professor
  • data scientist engineer
  • machine learning, AI or computer vision engineer
  • machine learning, AI or computer vision scientist

Computer Science and Engineering Program | CTRPT 105 [email protected] 480-965-3199

click back to top

  • Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

Gonzaga University

  • Search Search Button

Gonzaga’s Jesuit, Catholic, Humanistic education will challenge and inspire you.

  • Our Campus & Location
  • In the Community
  • Rankings & Recognition
  • At a Glance
  • Equity, Diversity & Inclusion
  • Our Mission & Jesuit Values
  • What Sets Us Apart
  • President & Leadership
  • News, Events & Stories
  • Sustainability
  • Offices & Services

Gonzaga offers 16 undergraduate degrees through 53 majors, 68 minors and 73 concentrations, 23 master’s degrees and 5 doctoral-level degrees.

  • Undergraduate Programs
  • Graduate Programs
  • Online Graduate Programs
  • Certificates
  • Our Faculty
  • College & Schools
  • Global Engagement
  • Centers & Institutes
  • Research & Creative Activities
  • Registrar's Office
  • Academic Resources
  • Regional Health Partnership

All the how-to's and why-you-should's for becoming a Zag.

  • Undergraduate Admission
  • Graduate Admission
  • International Student Admission
  • Financial Aid
  • Admission Contacts
  • Virtual Tour
  • Request Info

Student Life

The Division of Student Affairs is committed to creating an academically rich environment and fostering a strong sense of community.

  • Housing & Dining
  • Community Engagement & Service
  • Career Services
  • Student Support
  • Health & Well-Being
  • Arts & Culture
  • New Student & Family Programs
  • University Ministry
  • Student Affairs Division

The Gonzaga spirit, blended with hard work and dedication in athletic endeavors, yields success both on the field of play and in the classroom.

  • GoZags.com Athletics Website
  • Kermit M. Rudolf Fitness Center
  • Cheerleading
  • Spike the Bulldog
  • Intramurals
  • Fitness Classes
  • Gonzaga Basketball
  • Future Students
  • Current Students
  • Military & Veterans
  • Parents & Families
  • Faculty & Staff
  • Our Community
  • Basketball Fans

Gonzaga Home

catalog header

Course Catalog

Cybersecurity.

Director:  Shanchieh (Jay) Yang

Gonzaga’s online Master of Science in Cybersecurity equips you with the expertise to mitigate risk within an organization’s computer systems.

Students will learn to look for threats, weaknesses and holes in software and computers systems while studying wired and wireless networks, software, hardware, operating systems, data collection and privacy. Students in this program will gain deep knowledge in the structure of computer systems and become a strategic thinker who considers human behavior as a key player in any threat.

In many ways students will learn to think like a hacker for good, learning to detect data breaches before they happen and contain them if they do.

  • Students applying to Gonzaga University must submit Gonzaga’s Graduate Application, which can be accessed online at  https://www.gonzaga.edu/gradapply
  • Along with the application for graduate study, each program at Gonzaga has distinct admission requirements. Please refer to the table below to view that detailed information.

Master of Science in Cybersecurity

M.S. in Cybersecurity: 30 credits

CPSC 523 Machine Learning for Cybersecurity
3 credits
CPSC 553 Applied Cryptography 
3 credits
CPSC 549 Computer Security 3 credits 
CPSC 541 Internet of Things 3 credits
CPSC 546 Operating Systems Security 3 credits
CPSC 547 Network Security 3 credits
CPSC 510 Intrusion Detection  3 credits
CPSC 511 Offensive Security and Penetration Testing 3 credits
CPSC 539 Risk Management and Incident Response 3 credits
   
 
CPSC 590 Security Project 3 credits 

Complete Course List - CPSC

Programs Offered

The Department of Cyber Security is offering the following degree program.

Bachelor Programs

Duration: 4 Years

Eligibility:

  • At least 50% marks in Intermediate (HSSC) examination with Mathematics or equivalent qualification with Mathematics, certified by IBCC.
  • At least 50% marks in Intermediate (HSSC) examination with Pre-Medical or equivalent qualification, certified by IBCC.

Note: “Students with pre-medical, must have to pass deficiency courses of Mathematics of 6 credit hours in first two semesters.”

PEO 1: Graduates will have knowledge and skills in cyber security and will contribute to solving real-world cyber security challenges.

PEO 2: Graduates will be able to act as effective team players, leaders, and strong communicatorss.

PEO 3: Graduates will demonstrate initiative in emerging technology areas of cyber security and adapt to challenging professions.

PEO 4: Graduates will engage in lifelong professional development and contribute to the ethical cyber security practices, cyber security related industry or pursue advanced study.

PLO-1: Academic Education: To prepare graduates as computing professionals.

PLO-2: Knowledge for Solving Computing Problems: Apply knowledge of computing fundamentals, knowledge of a computing specialization, and mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models from defined problems and requirements.

PLO-3: Problem Analysis: Identify, formulate, research literature, and solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain disciplines.

PLO-4: Design/ Development of Solutions: Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.

PLO-5: Modern Tool Usage: Create, select, adapt and apply appropriate techniques, resources, and modern computing tools to complex computing activities, with an understanding of the limitations.

PLO-6: Individual and Teamwork: Function effectively as an individual and as a member or leader in diverse teams and multi-disciplinary settings

PLO-7: Communication: Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions.

PLO-8: Computing Professionalism and Society: Understand and assess societal, health, safety, legal, and cultural issues within local and global contexts, and the consequential responsibilities relevant to professional computing practice.

PLO-9: Ethics: Understand and commit to professional ethics, responsibilities, and norms of professional computing practice.

PLO-10: Life-long Learning: Recognize the need, and have the ability to engage in independent learning for continual development as a computing professional.

Master Programs

Duration: 2 Years

Credit Hrs: 31

Specializations Offered:

  • Embedded Systems Security
  • Network Security
  • Control Systems Security
  • Applicants who have done BS in telecom, electrical engineering, electronics, computer engineering, avionics, mechatronics and computer science with 16 year education are eligible to apply for this program.

Credit Hrs: 32

  • Software Security
  • Societal Security
  • Digital Forensics
  • Cryptography
  • Information Security Management
  • BS (Cyber Security/ Computer Science /Computer Engineering/ Software Engineering/ Information Technology) or Equivalent Degree (4 Years degree program/ minimum 130 credit hours) OR
  • Computer Science conversion course 2 Years degree program referred to as “MCS” or “MSc (CS)” or “MIT”.
  • BS degree in Computing discipline or Telecom or Computer Engineering with minim 130 credit hours and with at least 50% marks or 2.00/4.00 CGPA OR
  • BS degree in Mathematics (Min 130 credit hours) with at least 50% marks or 2.00/4.00 CGPA
  • Must pass a specialized AU admission test with at least 60% score.
  • Candidates will appear for an interview before final selection.

Program Aims:

  • To produce cryptography researchers and specialists to meet the current and future demands of the country to protect national critical infrastructure and information assets against internal and external cyber security threats and improve the country's cyber security posture.
  • To provide students with cryptography courses essential to develop a strong knowledge-base of crypto experts and researchers.
  • To attract international jobs/companies by creating a local pool of talented and skilled researchers and professionals.
  • To contribute toward establishing Pakistan’s cyber security industry.
  • To make Air University a pioneer in this field at national level and one of the renowned Universities in the area of cyber Security internationally.
  • To attract international students from the developing countries in the region to bring a good name to Air University and help improve the University’s international ranking.
  • To produce graduates which are more employable and economically productive.

Program Educational Objectives (PEOs):

  • PEO-1: To prepare students with the technical knowledge and skills needed to implement and explore cryptographic algorithms on digital systems and networks.
  • PEO-2: To develop graduates that can plan, analyze and break codes of encrypted contents.
  • PEO-3: To make students create solutions for arising problems in the cryptology domain.
  • Forensics Investigation Management
  • Applied Digital Forensics
  • Digital Forensics Technologies
  • BS degree in Computing discipline or Telecom or Computer Engineering with at least 50% marks or 2.00/4.00 CGPA
  • AU-GAT (Gen) at least 60% score OR NTS-GAT (Gen) at least 50% score.
  • Produce digital forensics researchers and specialists to meet the current and future demands of the country for cybercrime investigations.
  • To enable graduates to design and develop digital forensics solutions
  • To develop an understanding of digital forensics tools, techniques, methods, and technologies
  • To develop an understanding of ethical and legal issues associated with cybercrime investigations.
  • To attract international jobs/companies by creating a local pool of talented and skilled digital forensics professionals.
  • To contribute towards establishing the digital forensics industry in Pakistan.
  • To make Air University a pioneer in this field at the national level and one of the renowned Universities in the area of Digital Forensics internationally.
  • PEO-1: To prepare students with the technical knowledge and skills needed to investigate crimes including on digital systems and networks.
  • PEO-2: To develop graduates that can plan, investigate and manage cases of cybercrime investigation.
  • PEO-3: To make students create solutions for arising problems in the digital forensics domain.

Ph.D Programs

Duration: 3 Years

Credit Hrs: 48 (18 Credit Hours of Course work, 30 Credit Hours of dissertation work)

  • Hardware Security

The applicant has to meet following minimum eligibility requirements.

  • i. MS / M Phil /Equivalent degree in the Computer Science, Cyber Security, System Security or relevant area meeting (minimum 24 Cr Hrs coursework plus 6 Cr Hrs of thesis work) with a CGPA of at least 3.00 (on the scale of 4.00) or first division in annual system.
  • ii. GRE subject (Computer Science), or GAT Subject (Computer Science) with at least 60% score or AU GAT Subject Test (Computer Science) with at least 70% score is required for becoming eligible for admission.

IMAGES

  1. Air University Home

    phd cyber security air university

  2. 1st Cyber security training under NCSA in Air University

    phd cyber security air university

  3. Air University Home

    phd cyber security air university

  4. Air University Home

    phd cyber security air university

  5. Sarwat EJAZ

    phd cyber security air university

  6. Cyber College opens lectures to community > Air University (AU) > Air

    phd cyber security air university

VIDEO

  1. Exposing AIR UNIVERSITY

  2. Airbus Cybersecurity School

  3. Bs Cyber security from Air university

  4. Smart Phone Security

  5. Expected merits of air university 2023

  6. Switching Careers to Cybersecurity: Transferable Skills and Success Tips

COMMENTS

  1. Air University Home

    Mission Statement. "To provide knowledge and skills for producing graduates proficient in solving real-world cyber security problems with a keen sense of social responsibility and passion for lifelong learning. The department aims to collaborate with industry and government institutions for the protection of our national digital assets." Life @.

  2. Air University

    PhD Cyber Security. 18 years M/Mphil degree in computer science or relevant field with minimum CGPA 3.0 At least 60% score in GRE/NTS GAT (subject) or equivalent Air University Test with at least 70 % score. UAN (051-111-AIR-UNI) [email protected] Service Road E-9, Islamabad, Pakistan. Quick Links.

  3. Air University Home

    Welcome to the Department of Cyber Security at Air University, Islamabad Campus. We are pleased to shed light on our academic programs and accomplishments. Our department stands as a pioneering force in Pakistan, offering comprehensive degree programs in Cyber Security. Our journey began in Fall 2018 with the introduction of the undergraduate ...

  4. SAASS PHD Programs

    Faculty Development PHD Program. Every year, SAASS selects approximately 2 graduating students to earn a doctoral degree at a civilian university immediately following graduation from SAASS. These students spend three years at graduate school, then typically complete a "re-bluing" assignment in the Air Force before returning to SAASS faculty.

  5. List of Cybersecurity PhD Programs

    Here's a breakdown of tuition rates (all figures are based on out-of-state tuition). $17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology. $86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.

  6. Dr. Zunera Jalil

    Professor and Chair at Department of Cyber Security, Air University, Islamabad · Have 20 years of academic experience as a Full-Time Faculty in Computing and cyber Security. <br>EC-Council's Certified Computer Hacking Forensic Investigator (CHFI). <br>Involved in multiple projects in Pakistan, Italy, UAE, and Saudi Arabia. <br>;Leading R&D activities at National Cybercrimes and ...

  7. AFIT / Center for Cyberspace Research (CCR) / Graduate Education Programs

    Graduate Education Programs. ... Cyber Security Sequence Master of Computer Engineering (GCE) ... Air University. Air Force Institute of Technology 2950 Hobson Way Wright-Patterson Air Force Base, OH 45433-7765 Commercial: 937-255-6565 | DSN: 785-6565

  8. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management. Cybersecurity Ph.D. programs allow students and ...

  9. List of Online Cybersecurity PhD Degree Program Options

    All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.

  10. Doctoral Degrees in Cybersecurity

    Payscale data from May 2024 indicates that graduates with bachelor's degrees in cybersecurity earned $77,000 on average. Payscale doesn't have enough data on Ph.D. in cybersecurity degree-holders, but individuals with cybersecurity master's degrees earned $96,000 on average, in contrast.

  11. The Best Online Doctoral Degree Programs in Cyber Security

    As is probably expected from one of the oldest online doctoral programs in cyber security, Capitol Technology University's cyber security programming has been designated a Center of Academic Excellence-Cyber Defense (CAE-CD) since 2003. Homepage. Tuition per credit hour: $867.

  12. Top 10 Best Programs for a PhD in Cyber Security

    Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.

  13. Air University Cyber Security Society (AUCSS)

    It aims at creating cyber security awareness among people of Pakistan. It promotes the importance and scope of cyber security programs and also serves as an initial platform for the future cyber experts to compete the world in the era of cyber security by expanding their technical expertise. ... (Cyber) Programme at Air University on 19 Aug ...

  14. PhD in Cyber Security Programs 2024+

    (ISC)2 Graduate Scholarships . Who Can Apply: The Center for Cyber Safety and Education offers up to 20 scholarships ranging from $1,000 to $5,000 to students pursuing or planning to pursue a master's or doctorate degree with a focus in cybersecurity or information assurance.Stokes Educational Scholarship Program. This tuition assistance program pays an annual salary, plus up to $30,000 for ...

  15. Doctor of Philosophy (PhD) in Space Cybersecurity

    The Doctor of Philosophy (PhD) in Space Cybersecurity degree is a unique program designed to meet the evolving needs of today's Space Cybersecurity in an ever-changing world of conflict. This program provides students with the opportunity to conduct extensive and sustained, original research at the highest level in this field of Space ...

  16. Cybersecurity, PhD < Northeastern University Academic Catalog

    Cybersecurity, PhD. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and ...

  17. Doctor of Philosophy in Cybersecurity (PhD-CY)

    As a graduate of National University's Doctor of Philosophy in Cybersecurity (PhD-CY), you'll be able to: Advance theory and practical applications of cybersecurity. Formulate cybersecurity governance, policy, risk, and compliance. Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.

  18. Cyber Security in United States: 2024 PhD's Guide

    Why Study Cyber Security in United States. Studying Cyber Security in United States is a great choice, as there are 7 universities that offer PhD degrees on our portal. Over 957,000 international students choose United States for their studies, which suggests you'll enjoy a vibrant and culturally diverse learning experience and make friends ...

  19. Computer Science (Cybersecurity), PhD

    480-965-3199. All ASU graduate and undergraduate academic programs are fully accredited by the Higher Learning Commission. Many programs also have additional accreditation through specialized accrediting agencies. A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.

  20. Cybersecurity, PhD Degree

    Overview. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.

  21. Cybersecurity

    Gonzaga's online Master of Science in Cybersecurity equips you with the expertise to mitigate risk within an organization's computer systems. ... Along with the application for graduate study, each program at Gonzaga has distinct admission requirements. ... CPSC 549 Computer Security: 3 credits : Spring, Semester 2: Systems (9 credits) CPSC ...

  22. Graduate Certificate in Cybersecurity Policy and Implementation

    Our Graduate Certificate in Cybersecurity Policy and Implementation online program is designed to enhance your ability to manage and develop effective policies that mitigate risks and prevent data breaches. ... The College of Business and Management at the University of Illinois Springfield is accredited by AACSB International (AACSB ...

  23. Air University Home

    To make Air University a pioneer in this field at national level and one of the renowned Universities in the area of cyber Security internationally. To attract international students from the developing countries in the region to bring a good name to Air University and help improve the University's international ranking.

  24. Ph.D. in Cybersecurity Management

    Cybersecurity policy and governance; Risk assessment and management; Incident response and recovery; Security architecture and engineering; Information security awareness and training; With their advanced education and research skills, our Ph.D. graduates are well-positioned for prestigious careers in industry, government, and academia.

  25. Air University

    NASTP Institute of Information Technology (NIIT), Lahore. Bilquis College of Education for Women, Chaklala, Rawalpindi. Ph.D Programs. PhD Engineering (Evening) Master degree (18years education) in engineering (with at least 24 credit-hours course work plus 6 credit hours thesis) with a CGPA of at least 3.00/4.00 or equivalent.

  26. Call for Expression of Interest (2025): Assistant Professor in Lisboa

    The Department of Physics at Instituto Superior Técnico (IST), University of Lisbon, is Portugal's foremost institution in Physics and Engineering. Its reputation for high academic standards and research excellence is unparalleled, and over 1,000 students are enrolled in various undergraduate, master's, and doctoral programmes.