Code | Title | Hours |
---|---|---|
Note: Consult faculty advisor for other acceptable courses. | ||
Tracks | ||
Select at least two courses from one track: | 8 | |
Compilers | ||
Wireless Network | ||
Digital Signal Processing | ||
Computer Architecture | ||
Mobile and Wireless Networking | ||
Computer Hardware Security | ||
Fundamentals of Computer Networking | ||
Machine Learning | ||
Deep Learning | ||
Introduction to Machine Learning and Pattern Recognition | ||
Advanced Machine Learning | ||
Wireless Network | ||
Network Security | ||
Foundations of Distributed Systems | ||
Seminar in Computer Security | ||
Computer System Security | ||
Wireless Sensor Networks and the Internet of Things | ||
Wireless Communication Systems | ||
Digital Communications | ||
Mobile and Wireless Networking | ||
Fundamentals of Computer Networks | ||
Compilers | ||
Intensive Computer Systems | ||
Foundations of Distributed Systems | ||
Computer System Security | ||
Network Security | ||
Wireless and Mobile Systems Security | ||
Computer Architecture | ||
Advanced Algorithms | ||
Complexity Theory | ||
Foundations of Cryptography | ||
Seminar in Theoretical Computer Science | ||
Information Theory | ||
Empirical Research Methods | ||
Privacy, Security, and Usability | ||
Theory and Methods in Human Computer Interaction | ||
Research Methods in the Social Sciences | ||
Qualitative Methods | ||
Statistical Analysis | ||
Quantitative Analysis | ||
Criminology | ||
Evidence-Based Crime Policy | ||
Security Risk Management and Assessment | ||
Information System Forensics | ||
Decision Making for Critical Infrastructure | ||
Security and Resilience Policy | ||
Electives | ||
Selected in consultation with advisor from graduate-level CS and ECE courses and graduate-level courses offered by the College of Social Sciences and Humanities, including CRIM, CS, CY, DS, EECE, INSH, MATH and POLS. | 28 |
Code | Title | Hours |
---|---|---|
Dissertation Term 1 | ||
Dissertation Term 2 | ||
Complete the following (repeatable) course until graduation: | ||
Dissertation Continuation |
48 total semester hours required Minimum 3.000 GPA required
Incoming PhD in Cybersecurity students who have already completed a Master of Science in an adjacent field may petition to the graduate program administration for advanced entry. Advanced entry petitions are reviewed by the program administration on a case-by-case basis. Please note that advanced entry does not waive by itself any part of the PhD coursework requirements. As a degree conferral requirement, a minimum of 16 semester hours of coursework beyond the 32 semester hours of the master’s degree is required of advanced entry PhD students (48 semester hours is required of standard entry PhD students). A grade of B or higher is required in each course. A cumulative 3.500 GPA is required for the core requirement.
Refer to the PhD Cybersecurity overview for admission to candidacy requirements.
Refer to the PhD Cybersecurity overview for residency requirements.
Refer to the PhD Cybersecurity overview for teaching requirements.
Refer to the PhD Cybersecurity overview for dissertation advising requirements.
Refer to the PhD Cybersecurity overview for dissertation committee requirements.
Refer to the PhD Cybersecurity overview for comprehensive examination requirements.
Refer to the PhD Cybersecurity overview for dissertation defense and completion requirements.
Students must maintain a minimum GPA of 3.500 as well as earn a grade of B or better in each core course.
Code | Title | Hours |
---|---|---|
Consult your faculty advisor for approved courses. | 16 |
Minimum 16 semester hours required Minimum 3.000 GPA required
Send Page to Printer
Print this page.
Download Page (PDF)
The PDF will include all information unique to this page.
2023-24 Undergraduate Day PDF
2023-24 CPS Undergraduate PDF
2023-24 Graduate/Law PDF
2023-24 Course Descriptions PDF
Millions in scholarships.
Explore National University’s scholarship opportunities.
Our admissions team reviews applications year-round.
Become a member of NU’s global community.
National and Northcentral have merged, and this program is now offered by NU. Learn more .
In today’s data-dependent world, every organization needs senior-level experts with the knowledge and training to monitor its networks for vulnerabilities and security breaches and use tools like firewalls and data encryption programs to protect sensitive information. National University’s online Doctor of Philosophy of Cybersecurity (PhD-CY) degree program takes an applied approach to cybersecurity theory and research.
NU’s curriculum challenges you to explore advanced topics, learn the very latest concepts, and prepare for anticipated risks in the field of cybersecurity. The Cybersecurity doctorate is designed to prepare researchers with technology strategies that are applicable to leading positions in both the private and public sectors. Our program offers four specializations that allow you to tailor your studies and research to match your interest in a specific area of cybersecurity.
In this rigorous curriculum, you’ll explore governance, compliance, leading frameworks, models, and standards to reduce threats and vulnerabilities. You’ll also create a portfolio of valuable capabilities, addressing internal and external issues through the intelligent manipulation of data while completing your doctoral studies.
The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.
Degree and course requirements.
The PhD program requires a minimum of 60 credits. Additional credit hours may be allowed as needed to complete the dissertation research. If granted, additional courses will be added to the student degree program in alignment with the SAP and Academic Maximum Time to Completion policies. Students who do not complete their program in accordance with these policies may be dismissed.
The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours.
*Students select one pair of research methods and directed research courses based on their own research proposal.
The PhD in Cybersecurity requires the following courses for every specialization:
In this course, students are prepared for an understanding of networks and related theory to support computer science, cybersecurity, and technology management needs. Students will learn network concepts, as well as designing networks for reliability, availability, confidentiality, and network monitoring. Content will include high-level design of networks, evaluation of service providers, and strategies to prepare an organization for future communication needs (such as multi-cloud, satellite, 5G & 6G, and quantum data communications, plus related security techniques). Students will learn network design, planning, the role of network data communication devices, global access, and safe third-party data exchange.
This course will consolidate a foundation of concepts relating to security and cybersecurity, enabling the successful examination of greater detail and complexity in later courses. You will examine the full range from governance through compliance with laws, through people risks, to technology. Various mitigation options are considered to reduce vulnerabilities, counter threats, and to protect an organization’s data and system assets. You will study the need to protect organizations from future exposures and apply critical thinking and synthesis to motivate the resources needed to defend an organization.
Cybersecurity has the primary objective of averting losses and restoring proper operations should there be a loss. During this course you will study the foundations of risk and the opportunities to reduce cybersecurity losses for organizations. Risk assessment abilities and research options form the base of cyber defenses and determine the need for subsequent resources. The course continues with measuring risk and events leading to the identification of potential incidents and solutions. Learning about contingencies consider the needs of the organization, maintaining operations, and preparing for the best recovery should there be a loss.
Tracking and responding to cyber events requires massive databases integrating content from all devices at every location. Cyber threat analysis and response implies long term access and complex manipulation of event databases. In this course you will learn techniques to capture and display relevant data and leverage automation to reduce losses. Data manipulation, automated sense-making, appropriate fast reactions, machine learning, data analysis, and presentation are rapidly developing cybersecurity techniques. You will also leverage required capabilities for the defense of the organization, respond to enhanced threat complexity and capabilities, and address the need to counter data poisoning by threat actors.
Risk management is the foundation of defending organizations from information security, cyber threats, compliance, audit, and privacy exposures. To address risk and assurance, this course builds an integrated approach solution leading to the prioritization of resources for an organization. You will extend your knowledge and skills for global protection within and beyond the perimeter. This course positions the importance of risk management within a cybersecurity program and its role within Enterprise Risk Management (ERM). You will also assess theories and practices concerning risk management, compose a risk strategy, and leverage maturity models to improve the protection of organizations.
This course serves as an extensive exploration of statistics for the technology leader. Included in the course, is an advanced examination of statistical analyses commonly used for information systems and technology research. During this course, you will use different statistical tools to enhance your advanced analytical skills. These statistical analysis skills are required to plan, conduct, and interpret quantitative data to inform enterprise decisions. You will also learn to illustrate and produce technical output reports.
Global integration and broad alliances between criminal elements and nation-states frequently lead to rapidly changing and significant threats to all nations, organizations, and citizens. During this course, you will study current and predictable threats, target critical infrastructure, and determine risks implied in new technology. You will also learn to recognize the risks originating from cybercriminals, terrorism, hacktivism, and nation-state, and other significant threat actors. You will devise and work to get funding for viable strategies to defend critical infrastructures, organizations, and the citizens of the nation.
This course provides a survey of the different methods used to conduct technology-based research. During this course, you will learn about the research principles and methodologies that guide scientific inquiry in order to develop an understanding of the effects of research on individuals and organizations. Specifically, you will study the scientific research lifecycle, data collection methods, and research design methodology. You will finish the course by selecting a research design methodology to support your research interests through the remainder of your program.
The results of technical research are frequently used to support informed management decisions. This course provides technology leaders and professionals with the skills needed to design and conduct quantitative research studies to support specific types of data. During this advanced course in research, you will explore and apply different types of quantitative research methods and statistical techniques. You will also explore instrumentation, data collection, and data analysis tools and techniques to create aligned, ethical, and substantive research designs.
A quantitative research design includes objective analysis using experimental, quasi-experimental, and related techniques. Technical quantitative research involves statistical analysis of data collected from a larger number of participants to determine an outcome that can be applied to a general population. During this course, you will work through the scientific research process and apply your knowledge of quantitative research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.
The results of qualitative research are frequently used to support informed management decisions. This course provides technology leaders with an in-depth introduction to qualitative methods for studying human behavior, including grounded theory, narrative analysis, and case studies. During this advanced course in research, you will apply qualitative research methods to an information technology-based study. You will also deepen your research knowledge and skills by conducting interviews, collecting and coding data, producing ethical data conclusions, and creating objective research reports.
A qualitative approach to research of a technical nature integrates theoretical, conceptual, and empirical constructs with common practices and experience to gain an understanding of performance and functionality, develop an applied and testable model for improvement, or provide insights into problems to develop new ideas. During this course, you will work through the scientific research process and apply your knowledge of qualitative research design to develop a technical research proposal to support your research interests through the remainder of your program.
The results of technical research are frequently used to develop new products and services. This course provides technology leaders and professionals with the skills needed to design and conduct constructive research studies based on theory. During this advanced course in research, you will examine the methods and measurements used to design constructive research studies to develop sound technical solutions or prototypes. You will also explore software and security testing tools and user acceptance testing methods in order to create aligned, ethical, and substantive research designs.
Technical constructive research focuses on models, frameworks, tools, and software used by industry to improve value creation. A constructive approach to research of a technical nature integrates theoretical and empirical constructs with common practices and experience to develop an applied and testable model to improve the fields of computer science and information technology. During this course, you will work through the scientific research process and apply your knowledge of constructive research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.
The Pre-Candidacy Prospectus course is intended to ensure students have mastered knowledge of their discipline within cybersecurity prior to doctoral candidacy status and are able to demonstrate the ability to design empirical research as an investigator before moving on to the dissertation research coursework. During this course, you will demonstrate the ability to synthesize empirical, peer-reviewed research to prepare for the dissertation sequence of courses. This course should be completed only after the completion of all foundation, specialization, and research courses.
Students in this course will be required to complete Chapter 1 of their dissertation proposal including a review of literature with substantiating evidence of the problem, the research purpose and questions, the intended methodological design and approach, and the significance of the study. A completed, committee approved (against the minimum rubric standards) Chapter 1 is required to pass this course successfully. Students who do not receive approval of Chapter 1 to minimum standards will be able to take up to three supplementary 8-week courses to finalize and gain approval of Chapter 1.
Students in this course will be required to work on completing Chapters 1-3 of their dissertation proposal and receive committee approval for the Dissertation Proposal (DP) in order to pass the class. Chapter 2 consists of the literature review. Chapter 3 covers the research methodology method and design and to includes population, sample, measurement instruments, data collection and analysis, limitations, and ethical considerations. In this course, a completed, committee-approved Chapters 2 and 3 are required and, by the end of the course, a final approved dissertation proposal (against the minimum rubric standards). Students who do not receive approval of the dissertation proposal will be able to take up to three supplementary 8-week courses to finalize and gain approval of these requirements.
Students in this course will be required to prepare, submit, and obtain approval of their IRB application, collect data, and submit a final study closure form to the IRB. Students still in data collection at the end of the 12-week course will be able to take up to three supplementary 8-week courses to complete data collection and file an IRB study closure form.
In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.
Total Credit Hours: 60 Credit Hours Courses: 20 Courses Recommended Completion Time: 40-44 Months Next Start Date: Every Monday Classroom Size: One
General and technology, phd-cy.
The Doctor of Philosophy in Cybersecurity (PhD-CY), General and Technology specialization degree builds on the core computing principles and cybersecurity best practices, frameworks, and models. The degree provides a broad overview, adding governance and strategic views to compliment forensic, software development cloud, and systems certification content. Students use firsthand experience, explore advanced topics, learn the latest and anticipated concepts, consider the evolution of risks and mitigation, learn advanced threat detection, and propose their own research. The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors.
Specialization Courses – 15 Credit Hours Total. Each course is 3 semester credits and runs 8 weeks.
The Doctor of Philosophy in Cybersecurity (PhD-CY), Global Policy and Operations specialization builds on the core program general principles, best practices, frameworks, and models. The specialization adds specific global solutions through an integrated strategy and leadership capabilities to establish global operations.
The focus is on solving challenges of multi-time zone, multi-continent, and a range of laws, languages, and cultures. Specific considerations include diverse technologies, challenging support structures, and cyber target domains. The complication of widely distributed infrastructure, diverse political influences, and complex supply chains form part of the predictive strategy and the creation of operational excellence.
The Doctor of Philosophy in Cybersecurity (PhD-CY), Governance, Risk, and Compliance specialization combines the four knowledge areas to complete research or synthesize cybersecurity solutions for enterprises subject to national exposures and global threats. The combined resolution of risk, compliance, audit, and privacy will enable graduates to create enhanced solutions while limiting the need for resources.
The specialization investigates current and anticipated needs and solutions within all four areas, addressing key issues for larger organizations while providing improved strategic alignment. It includes important access control, and threat discovery across complex environments. The specialization includes an emphasis on preempting future losses.
The Doctor of Philosophy in Cybersecurity (PhD-CY), Secure Cloud Computing specialization builds on best practices, frameworks and models to synthesize unique solutions that optimize organization outcomes. The specialization investigates current and anticipated needs and solutions emphasizing the cloud computing. Learning and research adds practical and strategic insights to enable reduced risks for cloud computing and multi-cloud cybersecurity solutions.
The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors where advanced or complex cloud computing is important. Competencies include complex secure data communications, identity management, and access controls.
As a graduate of National University’s Doctor of Philosophy in Cybersecurity (PhD-CY), you’ll be able to:
The most demanding jobs in the field of cybersecurity require experienced professionals with advanced, industry-current knowledge and skills to develop security standards and best practices for their organization. It’s also a career that’s in high demand. For example, about 16,300 openings for information security analysts are projected each year, according to the Bureau of Labor Statistics, and they’ll be well compensated for their expertise – the BLS also states the median annual wage for IS analysts was $102,600 in May 2021, with the highest 10 percent earning more than $165,920.*
NU’s online PhD in Cybersecurity incorporates technical and organizational strategy, architecture, and data science, as well as important areas within artificial intelligence (including machine learning and deep learning). Our curriculum also offers a choice of career-focused specializations, allowing you to focus your studies on a specific area of interest, including:
*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1
NU’s Doctor of Philosophy in Cybersecurity opens the door to a wide range of important, in-demand careers for dedicated professionals with polished skills in communication, management, operations, leadership, and infrastructure. Some of the top job titles* posted in this field include:
Employers of senior-level cybersecurity professionals are spread across every industry, including: professional, scientific and technical services, finance and insurance, manufacturing, information services, healthcare, and administrative support services.
*Positions may require additional experience, training, and other factors beyond successfully completing this degree program. Depending on where you reside, many positions may also require state licensure, and it is the responsibility of the student to ensure that all licensure requirements are met. We encourage you to also review program-specific requirements with an NU advisor. Any data provided on this page is for informational purposes only and does not guarantee that completion of any degree program will achieve the underlying occupation or commensurate salary.
**SOURCE : Emsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 13, 2022 ). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.
Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.
To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.
Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.
To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you’re ready to apply, simply start your application today
Weekly Course Starts
We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners. Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.
“National University has impacted my career. You can immediately apply what you learn in class to your business.”
-Francisco R., Class of 2016
FLEXIBLE SCHEDULE
A PhD dissertation is a scholarly documentation of research that makes an original contribution to the field of study. This process requires care in choosing a topic, documenting its importance, planning the methodology, and conducting the research. These activities lead smoothly into the writing and oral presentation of the dissertation. At National University, faculty members assist every doctoral student with a systematic process designed to ensure the completion of a high-quality dissertation.
A doctoral candidate must be continuously enrolled throughout the series of dissertation courses. Dissertation courses are automatically scheduled and accepted without a break in scheduling to ensure that students remain in continuous enrollment throughout the dissertation course sequence. If additional time is required to complete any of the dissertation courses, students must re-enroll and pay the tuition for that course. Continuous enrollment will only be permitted when students demonstrate progress toward completing dissertation requirements. The Dissertation Committee determines progress.
National University is dedicated to assisting students in the achievement of their academic aspirations and helping them become valuable contributors to their community and profession. To accomplish this, we now offer a dissertation completion pathway for students who have successfully completed their doctoral coursework and achieved doctoral candidacy at a previous institution but were unable to complete their dissertation.
Our Dissertation Completion Pathway (DCP) offers a unique opportunity for students to complete their doctorate in one of the doctoral programs offered at NU (excluding the PhD in MFT, DMFT, DNP, and DHA). Students successfully meeting the entrance and application requirements will complete a minimum of 23 credit hours to earn their doctorate.
The vision for the Dissertation Completion Pathway is to provide “all-but-dissertation” or ABD students a structured approach for completing their dissertation and help them achieve their academic goals in obtaining their doctorate. This pathway provides a student-centered, high touch, and structured pathway that recognizes past academic coursework while providing the student with the preparation and guidance to earn their doctoral degree.
National University allows 7 years to complete all doctoral programs of 60 credits or less. The median time to completion for this program is 44 months.
Time to completion varies depending upon the pace in which a student completes courses and the number of transfer credits accepted. As most NU students are working adults, balancing educational, professional, and personal commitments, our academic and finance advisors will work with you to develop a program schedule that works best for your needs.
Students following the preferred schedule designed by the Dean for this program, and applying no transfer credits, can expect to finish in as little as 40 months.
The highest degree for cybersecurity is typically a Doctor of Philosophy (PhD) in Cybersecurity or a related field. This degree typically requires several years of advanced coursework and research, and is designed for individuals who want to pursue careers in cybersecurity research, academia, or leadership positions.
Whether a PhD in cybersecurity is worth it depends on your career goals and personal interests. If you want to pursue a career in cybersecurity research or academia, a PhD can be a valuable asset that can lead to more job opportunities and higher salaries. However, if you’re primarily interested in working in industry, a PhD may not be necessary or worth the time and cost.
The salary for someone with a PhD in cybersecurity can vary depending on several factors, including the individual’s job title, experience, and location, but you can expect to earn a comfortable living in this field. According to payscale.com, the average base salary for someone with a PhD in Cybersecurity is around $172,000 per year in the United States. However, some positions such as chief security officer or director of operations could earn more.
Do you qualify for a needs-based scholarship? Learn more about the NU Key Grant Scholarship and other scholarship opportunities to unlock the door to your dreams!
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.
Search the site
Modal window with site-search and helpful links
Featured Programs
Helpful Links
Terms & Conditions
By submitting your information to National University as my electronic signature and submitting this form by clicking the Request Info button above, I provide my express written consent to representatives of National University and National University affiliates (including City University of Seattle) to contact me about educational opportunities. This includes the use of automated technology, such as an automatic dialing system and pre-recorded or artificial voice messages, text messages, and mail, both electronic and physical, to the phone numbers (including cellular) and e-mail address(es) I have provided. I confirm that the information provided on this form is accurate and complete. I also understand that certain degree programs may not be available in all states. Message and data rates may apply. Message frequency may vary.
I understand that consent is not a condition to purchase any goods, services or property, and that I may withdraw my consent at any time by sending an email to [email protected] . I understand that if I am submitting my personal data from outside of the United States, I am consenting to the transfer of my personal data to, and its storage in, the United States, and I understand that my personal data will be subject to processing in accordance with U.S. laws, unless stated otherwise in our privacy policy . Please review our privacy policy for more details or contact us at [email protected] .
By submitting my information, I acknowledge that I have read and reviewed the Accessibility Statement .
By submitting my information, I acknowledge that I have read and reviewed the Student Code of Conduct located in the Catalog .
National University
Chat Options
A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.
The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance.
The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including applied cryptography, computer and network security, computer forensics, data and information security and software security.
According to the National Security Agency, information assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. This includes providing restoration of information systems by incorporating protection, detection and reaction capabilities.
Domestic students enrolled in the cybersecurity concentration are eligible for federal fellowships, such as the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. For more information, students can visit the Cybersecurity and Trusted Foundations website
ASU is certified as a National Center of Academic Excellence in Information Assurance Education and a National Center of Academic Excellence in Information Assurance - Research by the National Security Agency and the Department of Homeland Security. Information assurance courseware at ASU has been certified by the Information Assurance Courseware Evaluation Program to satisfy the standards for Information Systems Security Professionals (NSTISSI 4011) and Senior Systems Managers (CNSSI 4012).
This program may be eligible for an Optional Practical Training extension for up to 24 months. This OPT work authorization term may help international students gain skills and experience in the U.S. Those interested in an OPT extension should review ASU degrees that qualify for the STEM-OPT extension at ASU's International Students and Scholars Center website.
The OPT extension only applies to students on an F-1 visa and does not apply to students completing a degree through ASU Online.
84 credit hours, a written comprehensive exam, a prospectus and a dissertation
Required Core Areas (9 credit hours) applications (3) foundations (3) systems (3)
Concentration (9 credit hours) CSE 543 Information Assurance and Security (3) Choose two: CSE 539 Applied Cryptography (3) CSE 545 Software Security (3) CSE 548 Advanced Computer Network Security (3)
Research (18 credit hours) CSE 792 Research (18)
Electives and Additional Research (36 credit hours)
Culminating Experience (12 credit hours) CSE 799 Dissertation (12)
Additional Curriculum Information Courses that are used to satisfy the core area requirement cannot be used to satisfy electives or other requirements. A grade of "B" or better is required for core courses.
18 credit hours of CSE 792 Research are required, and up to 54 credit hours are allowed on the plan of study. Students with research credit hours in excess of 18 add these credit hours to their electives and additional research.
Electives include:
When approved by the academic unit and the Graduate College, this program allows 30 credit hours from a previously awarded master's degree to be used for this degree.
A maximum of three credit hours of 400-level coursework may be applied on the plan of study.
Applicants must fulfill the requirements of both the Graduate College and the Ira A. Fulton Schools of Engineering.
Applicants are eligible to apply to the program if they have earned a bachelor's degree in computer science, computer engineering or a closely related area. Most applicants should have earned a master's degree, but exceptional undergraduate applicants may be admitted directly into the doctoral program.
Applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in the last 60 hours of their first bachelor's degree program, or applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in an applicable master's degree program.
All applicants must submit:
Additional Application Information An applicant whose native language is not English must provide proof of English proficiency regardless of their current residency.
GRE scores are optional.
If the student is assigned any deficiency coursework upon admission, those classes must be completed with a grade of "C" (scale is 4.00 = "A") or higher within two semesters of admission to the program. Deficiency courses include:
CSE 230 Computer Organization and Assembly Language Programming CSE 310 Data Structures and Algorithms CSE 330 Operating Systems CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science
The applicant's undergraduate GPA and depth of preparation in computer science and engineering are the primary factors affecting admission.
Session | Modality | Deadline | Type |
---|---|---|---|
Session A/C | In Person | 12/31 | Final |
Session | Modality | Deadline | Type |
---|---|---|---|
Session A/C | In Person | 08/01 | Final |
Graduates with a doctorate in computer science are able to analyze, understand and apply key theories and algorithms used in the field of computer science. They are also able to generate and evaluate new theories, algorithms and software modules that can advance the field of computer science. Graduates have a competitive advantage when it comes to securing employment.
Career examples include:
Computer Science and Engineering Program | CTRPT 105 [email protected] 480-965-3199
A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.
Students who choose the PhD in Cybersecurity program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society. The PhD program is a natural path for students in the Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers. Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:
Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .
The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.
Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.
Gonzaga’s Jesuit, Catholic, Humanistic education will challenge and inspire you.
Gonzaga offers 16 undergraduate degrees through 53 majors, 68 minors and 73 concentrations, 23 master’s degrees and 5 doctoral-level degrees.
All the how-to's and why-you-should's for becoming a Zag.
The Division of Student Affairs is committed to creating an academically rich environment and fostering a strong sense of community.
The Gonzaga spirit, blended with hard work and dedication in athletic endeavors, yields success both on the field of play and in the classroom.
Cybersecurity.
Director: Shanchieh (Jay) Yang
Gonzaga’s online Master of Science in Cybersecurity equips you with the expertise to mitigate risk within an organization’s computer systems.
Students will learn to look for threats, weaknesses and holes in software and computers systems while studying wired and wireless networks, software, hardware, operating systems, data collection and privacy. Students in this program will gain deep knowledge in the structure of computer systems and become a strategic thinker who considers human behavior as a key player in any threat.
In many ways students will learn to think like a hacker for good, learning to detect data breaches before they happen and contain them if they do.
|
|
Master of Science in Cybersecurity |
|
CPSC 523 Machine Learning for Cybersecurity | 3 credits |
CPSC 553 Applied Cryptography | 3 credits |
CPSC 549 Computer Security | 3 credits |
CPSC 541 Internet of Things | 3 credits |
CPSC 546 Operating Systems Security | 3 credits |
CPSC 547 Network Security | 3 credits |
CPSC 510 Intrusion Detection | 3 credits |
CPSC 511 Offensive Security and Penetration Testing | 3 credits |
CPSC 539 Risk Management and Incident Response | 3 credits |
CPSC 590 Security Project | 3 credits |
The Department of Cyber Security is offering the following degree program.
Duration: 4 Years
Eligibility:
Note: “Students with pre-medical, must have to pass deficiency courses of Mathematics of 6 credit hours in first two semesters.”
PEO 1: Graduates will have knowledge and skills in cyber security and will contribute to solving real-world cyber security challenges.
PEO 2: Graduates will be able to act as effective team players, leaders, and strong communicatorss.
PEO 3: Graduates will demonstrate initiative in emerging technology areas of cyber security and adapt to challenging professions.
PEO 4: Graduates will engage in lifelong professional development and contribute to the ethical cyber security practices, cyber security related industry or pursue advanced study.
PLO-1: Academic Education: To prepare graduates as computing professionals.
PLO-2: Knowledge for Solving Computing Problems: Apply knowledge of computing fundamentals, knowledge of a computing specialization, and mathematics, science, and domain knowledge appropriate for the computing specialization to the abstraction and conceptualization of computing models from defined problems and requirements.
PLO-3: Problem Analysis: Identify, formulate, research literature, and solve complex computing problems reaching substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain disciplines.
PLO-4: Design/ Development of Solutions: Design and evaluate solutions for complex computing problems, and design and evaluate systems, components, or processes that meet specified needs with appropriate consideration for public health and safety, cultural, societal, and environmental considerations.
PLO-5: Modern Tool Usage: Create, select, adapt and apply appropriate techniques, resources, and modern computing tools to complex computing activities, with an understanding of the limitations.
PLO-6: Individual and Teamwork: Function effectively as an individual and as a member or leader in diverse teams and multi-disciplinary settings
PLO-7: Communication: Communicate effectively with the computing community and with society at large about complex computing activities by being able to comprehend and write effective reports, design documentation, make effective presentations, and give and understand clear instructions.
PLO-8: Computing Professionalism and Society: Understand and assess societal, health, safety, legal, and cultural issues within local and global contexts, and the consequential responsibilities relevant to professional computing practice.
PLO-9: Ethics: Understand and commit to professional ethics, responsibilities, and norms of professional computing practice.
PLO-10: Life-long Learning: Recognize the need, and have the ability to engage in independent learning for continual development as a computing professional.
Duration: 2 Years
Credit Hrs: 31
Specializations Offered:
Credit Hrs: 32
Program Aims:
Duration: 3 Years
Credit Hrs: 48 (18 Credit Hours of Course work, 30 Credit Hours of dissertation work)
The applicant has to meet following minimum eligibility requirements.
IMAGES
VIDEO
COMMENTS
Mission Statement. "To provide knowledge and skills for producing graduates proficient in solving real-world cyber security problems with a keen sense of social responsibility and passion for lifelong learning. The department aims to collaborate with industry and government institutions for the protection of our national digital assets." Life @.
PhD Cyber Security. 18 years M/Mphil degree in computer science or relevant field with minimum CGPA 3.0 At least 60% score in GRE/NTS GAT (subject) or equivalent Air University Test with at least 70 % score. UAN (051-111-AIR-UNI) [email protected] Service Road E-9, Islamabad, Pakistan. Quick Links.
Welcome to the Department of Cyber Security at Air University, Islamabad Campus. We are pleased to shed light on our academic programs and accomplishments. Our department stands as a pioneering force in Pakistan, offering comprehensive degree programs in Cyber Security. Our journey began in Fall 2018 with the introduction of the undergraduate ...
Faculty Development PHD Program. Every year, SAASS selects approximately 2 graduating students to earn a doctoral degree at a civilian university immediately following graduation from SAASS. These students spend three years at graduate school, then typically complete a "re-bluing" assignment in the Air Force before returning to SAASS faculty.
Here's a breakdown of tuition rates (all figures are based on out-of-state tuition). $17,580 is the most affordable PhD program option and it is available at the Georgia Institute of Technology. $86,833 is the average cost of a cybersecurity PhD and is based on tuition rates from all 26 schools.
Professor and Chair at Department of Cyber Security, Air University, Islamabad · Have 20 years of academic experience as a Full-Time Faculty in Computing and cyber Security. <br>EC-Council's Certified Computer Hacking Forensic Investigator (CHFI). <br>Involved in multiple projects in Pakistan, Italy, UAE, and Saudi Arabia. <br>;Leading R&D activities at National Cybercrimes and ...
Graduate Education Programs. ... Cyber Security Sequence Master of Computer Engineering (GCE) ... Air University. Air Force Institute of Technology 2950 Hobson Way Wright-Patterson Air Force Base, OH 45433-7765 Commercial: 937-255-6565 | DSN: 785-6565
A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management. Cybersecurity Ph.D. programs allow students and ...
All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.
Payscale data from May 2024 indicates that graduates with bachelor's degrees in cybersecurity earned $77,000 on average. Payscale doesn't have enough data on Ph.D. in cybersecurity degree-holders, but individuals with cybersecurity master's degrees earned $96,000 on average, in contrast.
As is probably expected from one of the oldest online doctoral programs in cyber security, Capitol Technology University's cyber security programming has been designated a Center of Academic Excellence-Cyber Defense (CAE-CD) since 2003. Homepage. Tuition per credit hour: $867.
Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.
It aims at creating cyber security awareness among people of Pakistan. It promotes the importance and scope of cyber security programs and also serves as an initial platform for the future cyber experts to compete the world in the era of cyber security by expanding their technical expertise. ... (Cyber) Programme at Air University on 19 Aug ...
(ISC)2 Graduate Scholarships . Who Can Apply: The Center for Cyber Safety and Education offers up to 20 scholarships ranging from $1,000 to $5,000 to students pursuing or planning to pursue a master's or doctorate degree with a focus in cybersecurity or information assurance.Stokes Educational Scholarship Program. This tuition assistance program pays an annual salary, plus up to $30,000 for ...
The Doctor of Philosophy (PhD) in Space Cybersecurity degree is a unique program designed to meet the evolving needs of today's Space Cybersecurity in an ever-changing world of conflict. This program provides students with the opportunity to conduct extensive and sustained, original research at the highest level in this field of Space ...
Cybersecurity, PhD. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and ...
As a graduate of National University's Doctor of Philosophy in Cybersecurity (PhD-CY), you'll be able to: Advance theory and practical applications of cybersecurity. Formulate cybersecurity governance, policy, risk, and compliance. Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.
Why Study Cyber Security in United States. Studying Cyber Security in United States is a great choice, as there are 7 universities that offer PhD degrees on our portal. Over 957,000 international students choose United States for their studies, which suggests you'll enjoy a vibrant and culturally diverse learning experience and make friends ...
480-965-3199. All ASU graduate and undergraduate academic programs are fully accredited by the Higher Learning Commission. Many programs also have additional accreditation through specialized accrediting agencies. A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.
Overview. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.
Gonzaga's online Master of Science in Cybersecurity equips you with the expertise to mitigate risk within an organization's computer systems. ... Along with the application for graduate study, each program at Gonzaga has distinct admission requirements. ... CPSC 549 Computer Security: 3 credits : Spring, Semester 2: Systems (9 credits) CPSC ...
Our Graduate Certificate in Cybersecurity Policy and Implementation online program is designed to enhance your ability to manage and develop effective policies that mitigate risks and prevent data breaches. ... The College of Business and Management at the University of Illinois Springfield is accredited by AACSB International (AACSB ...
To make Air University a pioneer in this field at national level and one of the renowned Universities in the area of cyber Security internationally. To attract international students from the developing countries in the region to bring a good name to Air University and help improve the University's international ranking.
Cybersecurity policy and governance; Risk assessment and management; Incident response and recovery; Security architecture and engineering; Information security awareness and training; With their advanced education and research skills, our Ph.D. graduates are well-positioned for prestigious careers in industry, government, and academia.
NASTP Institute of Information Technology (NIIT), Lahore. Bilquis College of Education for Women, Chaklala, Rawalpindi. Ph.D Programs. PhD Engineering (Evening) Master degree (18years education) in engineering (with at least 24 credit-hours course work plus 6 credit hours thesis) with a CGPA of at least 3.00/4.00 or equivalent.
The Department of Physics at Instituto Superior Técnico (IST), University of Lisbon, is Portugal's foremost institution in Physics and Engineering. Its reputation for high academic standards and research excellence is unparalleled, and over 1,000 students are enrolled in various undergraduate, master's, and doctoral programmes.