• Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

Cybersecurity Guide

Research with impact: Find online cybersecurity PhD programs

In this guide

  • 2024 rankings
  • Steps to get an online PhD
  • Financial assistance
  • Career paths
  • School listings

The digital landscape is changing, and so is higher education. Online PhD programs in cybersecurity are not just trending, they’re revolutionizing the way we cultivate experts in the field.

Whether you’re a student eyeing advanced studies or an institution looking to expand your curriculum, discover why an online PhD in cybersecurity degree is becoming the go-to option for next-level learning and expertise.

Programs to make the public aware of the problem and attract bright young minds to the profession are becoming more widespread and are starting to have an effect.

With the ranks of willing candidates beginning to swell, certificate, training and education programs are in great demand. The number of available degree programs offered by colleges in particular is gaining momentum .

Bachelor’s degrees have become a near necessity for new cybersecurity professionals in recent years. And higher-level positions like chief information security officers (CISOs) often require a master’s degree . 

At present, though, the need for doctorate degrees in cybersecurity is becoming evident.

High-level management positions, higher-education faculty posts, and advanced research initiatives are all growing in demand much more quickly than the numbers of candidates to fill them.

Generally speaking, most doctoral candidates will fill the rapidly expanding and critical roles of educators, consultants, and researchers.

PhD’s (doctor of philosophy degrees) and DSc’s (doctor of science degrees) are designed for these roles.

PhD’s tend to focus on theory and research, while DSc’s study research and technical expertise. With more focus on technical knowledge, DSc’s sometimes continue working directly in practical applications within the field.

On the other hand, DPS’s (doctor of professional studies degrees) are almost entirely devoted to the highest levels of training in hands-on practical knowledge and skills instead of theory and research. 

All three types of doctoral programs are now available to those wishing to advance their careers to the pinnacle of the cybersecurity field.

However, PhD is by far the most commonly offered doctoral cybersecurity degree at present, followed by DSc’s and DPS’s.

The world has a critical need for infosec practitioners, but there is also an equally essential need to expand the capacity of our educational institutions to teach new practitioners.

We also are in dire need of advanced, innovative, strategic thinkers to conduct research in the science of cybersecurity.

Best online cybersecurity PhD programs for 2024

Capella university, capitol technology university, nova southeastern university, the george washington university, mississippi state university, marymount university.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

Obtaining an online cybersecurity PhD 

Six steps for choosing an online phd cybersecurity program.

So with all of these options available, as well as a growing number of colleges offering these programs, how can one best decide which direction is right for you? Here is a quick six-step process to help.

1. Self-appraisal : Those looking to expand their knowledge and background in cybersecurity with a PhD have already succeeded in attaining lesser degrees and certifications, and likely have several years of work experience as well.

That education, and exposure to practical applications provide an excellent overall view of the infosec world. All that experience will be critical in deciding exactly which direction to explore in the next phase of a career. The biggest decisions are of two types. 

  • Are online PhD programs the right way to go, or would real-time college be a better choice? 
  • Is a future in research, education or consulting the right path? Or is work in a real-world application a better fit? Picking the correct answer to both questions will take a good bit of introspective research. And the decisions shouldn’t be made without a thorough self-inspection.

2. Admission requirements : As with any college degree, each individual institution offering it will have its own views of what a desirable PhD candidate should look like.

All require at least a BS degree, some require an MS. But there are often loose specifications as to what discipline the degrees must be in, like STEM or computer science. Other demands may include a minimum GPA threshold, usually 3.0 or higher, and GRE test scores. 

Waivers are for the GRE tests are often granted for candidates with strong academic or professional backgrounds. The rest is normally just paperwork, like a personal goal statement, personal and work references, a current resume, and college transcripts.

The primary point here is to pay attention to the requirements of each school under consideration, and whether it will necessitate more time, classwork, certifications, etc. to comply with these demands.

3. Tuition and scholarships : Unless an early career left a PhD candidate with an abundance of cash, money will always be a concern.

Obviously, tuition is the first number to check. But don’t stop with that. There are almost always alternatives for financial assistance available from the school, private scholarship sources, and sometimes government agencies attempting to increase the cybersecurity workforce.

And, of course, government-sponsored and private education loans exist .                                                                                                                            

4. School reputation, course quality and availability : To get the most return out of an investment of time and money in education, it’s always best to choose from schools with the best reputation among cybersecurity professionals.

Specific courses and available concentrations vary from one school to another. Students must therefore make sure a particular school’s special course offerings match their needs and desires. 

5. Centers for Academic Excellence in Cyber Defense : US government intelligence agencies are perhaps the organizations most interested in developing the science and resources needed to conduct the most extensive, advanced and complete cybersecurity operations anywhere.

The National Security Agency ( NSA ) and the Department of Homeland Security ( DHS ) jointly sponsor a program to promote cybersecurity education called National Centers for Academic Excellence in Cyber Defense ( CAE-CD ). NSA conducts extensive reviews and audits of colleges offering cybersecurity college degrees and designates a select few with CAE approval .

Choosing an institution approved by the NSA provides a high level of certainty that the program offered is of the highest quality. It will also give graduates a leg up on securing a career with federal government intelligence agencies. NSA recently published a fact sheet showing 272 CAE-CD approved institutions across the country. 

6. Dissertation research options and faculty : A critical part of any masters or doctoral degree is the dissertation. The exact topic and focus do not need to be determined at the outset of entering the program.

However, it should be possible to know that faculty members and other available resources provide the greatest knowledge, technology and other means of support for the student’s specialty. 

What to look for in an online PhD cybersecurity program

For any given doctoral candidate, enrolling in an online program offering the best and most numerous courses within the cybersecurity specialty desired may be top on the list of criteria.

One should also research the infosec faculty members at the school to determine which and how many have expertise within that students focus.

If possible, a chance to meet these faculty members may be very illuminating. Requesting the opportunity to audit one or more classes will also provide invaluable insight into how courses are structured and how close a fit the tutorial style may be.

Opting to attend a PhD program with the best possible reputation among cybersecurity professionals will help open doors when it comes time to find a post-doctoral job. 

An institution that cultivates an innovative environment and offers the latest in technological capabilities will help maximize the educational experience. It will also be of great educational benefit to attend a college that fosters consultative communications among students and faculty.

Probably the easiest variables to determine are tuition costs and the availability of school offered financial assistance, especially scholarships, grants, other offsets to student expenses.

Online PhD cybersecurity program timeline

Typically, obtaining a doctorate in cybersecurity will require between three and seven years of dedication.

The specific timeline will depend upon the individual college and the level of testing and qualification required for each student to be accepted into a program.

Coursework can take up to three years, depending in part depending upon credits earned and transferred before entering the program. Once courses have been completed, the next step is to design a research project for the dissertation. 

With a well thought out idea in hand, have a chosen faculty mentor assist with fine-tuning the scope, and then approving the research outline.

The rest is extensive research and then writing the dissertation, while all along consulting with a faculty mentor. This phase can take two or more years, sometimes in excess of five years. 

The length of time devoted to completing a dissertation will depend in part on the amount of time the candidate is able to devote to the research required.

Once the dissertation is complete, student will schedule a board review and present their research to faculty members to attain the final award of their doctoral degree.

Online PhD cybersecurity tuition and scholarships

Don’t be scared off by tuition rates at any school.

Pick the best academic environments for the degree and specialty desired first, then see what can be done to mitigate the cost.

Tuition rates

The Cybersecurity Guide team recently took a look at the 14 programs in the US that offer an online cybersecurity PhD program in order to get a better sense of what tuition looks like at these programs. All figures below are based on out-of-state tuition rates.

$32,940 is the most affordable online PhD program and its available at the University of Cumberlands.

$56,004 is the average cost of the 14 online cybersecurity PhD programs.

$85,248 is the highest tuition and is at the University of North Texas.

There are almost always several options to consider. Some schools have work-study options where students can take classes for a semester or two, then work in the industry for a time. This provides a balance of academics and practical experience, and also income to offset tuition costs.

Of course, those already working and going to school would not be able to utilize this option. 

Most frequently, scholarships, grants and fellowships will be the most accessible financial assistance vehicles.

At present, it seems most scholarships are being directed to undergraduate and graduate students, with less now available for PhD’s.

This is likely to change in coming years as demand for PhD’s is set to expand rapidly. The bulk of scholarships available for PhD candidates at present are provided through individual schools, corporate sponsors, of government agencies. 

Cybersecurity PhD career path

The very nature of doctor of philosophy degree programs means those who complete a PhD will be best suited to academic or theoretical applications of their cybersecurity expertise.

However, other times there are really interesting industry jobs available to PhD holders, especially in research-oriented companies. 

 Typically, these professionals will hold the highest of infosec management positions, such as CISO, information security director, information security manager, or the like.

But many will be destined for advanced investigative research into the cutting edge ideas and technologies being discussed and discovered in the cybersecurity world.

Others will opt for academic posts in higher education. And still others will be employed as consultants to large corporations and/or high leverage government agencies that often have not been able to hire enough cybersecurity employees to adequately satisfy their own needs, or just don’t possess the advanced capabilities that a PhD offers.

Frequently asked questions

An online PhD in cybersecurity is an advanced academic program that allows you to earn your doctorate remotely, focusing on research and expertise in cybersecurity.

Online programs offer flexibility, making it easier for working professionals to balance studies with other commitments. Plus, you can access top-tier faculty and resources from anywhere.

The duration varies but expect to spend 3-7 years, depending on the program and your pace of study.

Graduates often pursue roles in academia, research, or high-level positions in corporate cybersecurity departments.

Yes, most employers consider an online PhD in cybersecurity as valuable as an on-campus degree, provided it’s from an accredited institution.

While convenient, online programs may lack some networking opportunities and face-to-face interactions found in traditional settings.

School listings for online PhD in cybersecurity

As is any course of study, attending school through an online college affords maximum flexibility for students with demanding lives. Whether the limiting factor is work, family, health restrictions or other reasons, a flexible online doctoral program permits PhD candidates to work toward a goal on their own time. 

Below is a complete list of schools offering online PhD programs that features current and comprehensive information for an easy side-by-side comparison.

  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.

National University

  • Skills Gained: After finishing, students will know how to improve cybersecurity, set rules, find threats, and use tools to protect information.
  • Job Opportunities: Graduates can become Security Analysts, Systems Engineers, Cloud Security Experts, and more.
  • Quality Assurance: The course is recognized and approved by the Western Association of Schools and Colleges (WASC).
  • Recognition: Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense by the National Security Agency and Department of Defense.
  • Career Opportunities: The program prepares students for senior leadership roles, program development, or policy-making positions in federal agencies and the private sector.
  • Overview: Designed for individuals aiming to advance both scholarly research and their careers in the field of cybersecurity.

Colorado Technical University

  • Accreditation: CTU is recognized by the Higher Learning Commission.
  • Cost-Saving Options: There are ways to reduce fees, like military discounts, transferring credits, and scholarships.
  • Special Sessions: There's a mandatory in-person gathering called a symposium.

The University of Fairfax

  • Goals: This program is for those who want to lead, research, or make policies in cybersecurity.
  • Special Guide: They use a guide from a national institute to teach students the best ways to keep information safe online.
  • Help with Big Project: The university has a plan to help students with their final project.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

Marymount University, School of Technology and Innovation

  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.

The University of the Cumberlands

  • Jobs After Graduation: After getting a PhD in IT, students can find many job opportunities.Jobs in areas like cloud computing and cybersecurity will be in high demand.
  • Recognition: The university is known for its excellence in cybersecurity by major U.S. departments.
  • Benefits: Students can study online, so they don't have to leave their jobs. A PhD can also lead to better job chances and higher pay.

Nova Southeastern University, College of Computing & Engineering

  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.
  • Capstone Project: Students create a big project to use their new skills in real-world situations.
  • Focus on Modern IT: The course teaches current IT topics like online security and managing projects.
  • Job Opportunities: After finishing, students can aim for high-level IT jobs in various sectors.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

Walden University

  • Why Walden: The program offers one-on-one mentoring, helpful tools, real-world IT scenarios, and chances to network.
  • Jobs After Graduation: The IT field is growing. With a DIT, you can become a college teacher, computer scientist, or a top IT manager.
  • Skills Gained: You'll learn to evaluate IT methods, create IT systems, lead IT teams, communicate tech ideas, and do original research.
  • Goals: Boost organizations' ability to handle cyber threats and lead organizations in enhancing cybersecurity.
  • Classes: Held on Saturdays in a fast-paced format.
  • Structure: 24 hours of courses and 24 hours of research, including a major project (praxis) on cybersecurity.

Arizona State University

Computer Science (Cybersecurity), PhD

  • Program description
  • At a glance
  • Degree requirements
  • Admission requirements
  • Tuition information
  • Application deadlines
  • Career opportunities
  • Contact information

Computer, Cybersecurity, Information, Information Assurance, Security, approved for STEM-OPT extension, assurance, enggradcs, foundation, network, systems

A degree in computer science is the next step in your journey to become a great leader, innovator, entrepreneur and educator.

The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance.

The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including applied cryptography, computer and network security, computer forensics, data and information security and software security.

According to the National Security Agency, information assurance is defined as the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality and nonrepudiation. This includes providing restoration of information systems by incorporating protection, detection and reaction capabilities.

Domestic students enrolled in the cybersecurity concentration are eligible for federal fellowships, such as the Department of Defense Information Assurance Scholarship Program and the Federal Cyber Service Scholarship for Service Program. For more information, students can visit the Cybersecurity and Trusted Foundations website

ASU is certified as a National Center of Academic Excellence in Information Assurance Education and a National Center of Academic Excellence in Information Assurance - Research by the National Security Agency and the Department of Homeland Security. Information assurance courseware at ASU has been certified by the Information Assurance Courseware Evaluation Program to satisfy the standards for Information Systems Security Professionals (NSTISSI 4011) and Senior Systems Managers (CNSSI 4012).

This program may be eligible for an Optional Practical Training extension for up to 36 months. This OPT work authorization term may help international students gain skills and experience in the U.S. Those interested in an OPT extension should review ASU degrees that qualify for the STEM-OPT extension at ASU's International Students and Scholars Center website.

The OPT extension only applies to students on an F-1 visa and does not apply to students completing the degree through ASU Online.

  • College/school: Ira A. Fulton Schools of Engineering
  • Location: Tempe

84 credit hours, a written comprehensive exam, a prospectus and a dissertation

Required Core Areas (9 credit hours) foundations (3) systems (3) applications (3)

Concentration (9 credit hours) CSE 543 Information Assurance and Security (3) Choose two: CSE 539 Applied Cryptography (3) CSE 545 Software Security (3) CSE 548 Advanced Computer Network Security (3)

Research (18 credit hours) CSE 792 Research (18)

Electives and Additional Research (36 credit hours)

Culminating Experience (12 credit hours) CSE 799 Dissertation (12)

Additional Curriculum Information Courses that are used to satisfy the core area requirement cannot be used to satisfy electives or other requirements. A grade of "B" or better is required for core courses.

18 credit hours of CSE 792 Research are required, and up to 54 credit hours are allowed on the plan of study. Students with research credit hours in excess of 18 add these credit hours to their electives and additional research.

Electives include:

  • additional CSE 792 Research credit hours (up to 36 credit hours allowed beyond the required 18)
  • computer science courses of which up to 18 credit hours of CSE 590 and CSE 790: Reading and Conference is allowed
  • up to six credit hours of interdisciplinary electives in other academic units that are subject to program chair approval

When approved by the academic unit and the Graduate College, this program allows 30 credit hours from a previously awarded master's degree to be used for this degree.

A maximum of three credit hours of 400-level coursework may be applied on the plan of study.

Applicants must fulfill the requirements of both the Graduate College and the Ira A. Fulton Schools of Engineering.

Applicants are eligible to apply to the program if they have earned a bachelor's degree in computer science, computer engineering or a closely related area. Most applicants should have earned a master's degree, but exceptional undergraduate applicants may be admitted directly into the doctoral program.

Applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in the last 60 hours of their first bachelor's degree program, or applicants must have a minimum cumulative GPA of 3.50 (scale is 4.00 = "A") in an applicable master's degree program.

All applicants must submit:

  • graduate admission application and application fee
  • official transcripts from every university attended
  • three letters of recommendation
  • a statement of purpose
  • curriculum vitae or resume
  • proof of English proficiency

Additional Application Information An applicant whose native language is not English must provide proof of English proficiency regardless of their current residency.

GRE scores are optional.

If the student is assigned any deficiency coursework upon admission, those classes must be completed with a grade of "C" (scale is 4.00 = "A") or higher within two semesters of admission to the program. Deficiency courses include:

CSE 230 Computer Organization and Assembly Language Programming CSE 310 Data Structures and Algorithms CSE 330 Operating Systems CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science

The applicant's undergraduate GPA and depth of preparation in computer science and engineering are the primary factors affecting admission.

Graduates with a doctorate in computer science are able to analyze, understand and apply key theories and algorithms used in the field of computer science. They are also able to generate and evaluate new theories, algorithms and software modules that can advance the field of computer science. Graduates have a competitive advantage when it comes to securing employment.

Career examples include:

  • computer science researcher
  • computer science security professor
  • data scientist engineer
  • machine learning, AI or computer vision engineer
  • machine learning, AI or computer vision scientist

Computer Science and Engineering Program | CTRPT 105 [email protected] 480-965-3199

click back to top

PhD Graduate Education at Northeastern University logo

This program engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities. It prepares students from diverse backgrounds and interests to advance the reliability and security of cyberspace as researchers, faculty members, and policy advisors.

In addition to focusing on using technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

Our program is affiliated with the International Secure Systems Lab , a collaboration between European and US researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues. We are also the lead institution in the ALERT Center , a multi-university Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

  • Admitted PhD students are guaranteed full tuition scholarship and are supported with stipends or fellowships for the first five years of their program
  • Northeastern University has been designated by the National Security Agency and the U.S. Department of Homeland Security as a Center of Academic Excellence in Information Assurance/Cyber Defense, in IA Research, and in Cyber Operations
  • Boston area is home to some of the nation’s largest Department of Defense contractors as well as prestigious government and independent labs, such as MIT Lincoln Lab, MITRE, and Draper Lab
  • Interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs and makes it unique in the Boston area

Application Materials

  • Online application and fee
  • Unofficial undergraduate/graduate transcripts (you can submit official transcripts from all colleges/universities attended at the time of admission)
  • Statement of purpose that should include career goals and expected outcomes and benefits from the program
  • Recent professional resume listing detailed position responsibilities
  • Three confidential letters of recommendation
  • GRE Test Scores Optional for 2022-23
  • Degree earned or in progress at an U.S. institution
  • Degree earned or in progress at an institution where English is the only medium of instruction
  • Official exam scores from either the TOEFL iBT, IELTS, or  PTE exam
  • Applicants seeking enrollment prior to the Fall 2023 term should apply through this  link .

Application

Applicants must submit the online application and all required admission materials no later than the stated deadlines to be considered for admission. Admissions decisions are made on a rolling basis.

Applicants are reviewed annually for admission to the Fall Term:

  • December 15

Applicants seeking enrollment prior to the Fall 2023 term should apply at the link under application materials below.

  • Program Website

Request Information for PhD in Cybersecurity

a student listens to a lecture

PhD in Cybersecurity

The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

  • Explore plan of study
  • View program requirements
  • How to apply
  • Request info

phd cybersecurity

PhD students at Khoury College gain deep knowledge and invaluable experience—preparing them for a career in academia as well as research.

phd cybersecurity

Our flagship campus in Boston is just minutes away from esteemed universities, exciting start-ups, and leaders in tech, finance, health care, and more.

phd cybersecurity

Research Projects

December 15, 2023

Khoury Graduate Admissions Team

  • Financial support

January 1, 1066

January 1, 1492

Khoury Align Admissions Team

  • How to Apply
  • Cost & Financial Aid

Northeastern University - Khoury College of Computer Sciences

Khoury Social

Khoury College youtube link

Contact Khoury

phd cybersecurity

I'm seeking information for

phd cybersecurity

The Gradcafe

  • Majors & Careers
  • Online Grad School
  • Preparing For Grad School
  • Student Life

Top 10 Best Programs for a PhD in Cyber Security

Lisa Marlin

Technology is becoming more and more integrated with our daily lives — with it comes threats from hackers that make your information vulnerable. Indeed, cybersecurity threats  are expected to grow even more in the next few years, making cybersecurity professionals sought-after in the hiring market. Already have an extensive computer science  background? Why not take it to the next level with a PhD in cyber security?

A doctorate degree in cyber security gives you a valuable qualification and in-depth knowledge of cybersecurity challenges. Not only will you be equipped to help organizations protect their crucial information, but you’ll also be qualified to develop strategies for better data security and even teach the subject in university.

Ready to unlock unlimited career potential in the cybersecurity space? Let’s jump into our top programs for cybersecurity PhD programs, including common requirements and costs and future career potential.

Table of Contents

Best Programs for a PhD in Cyber Security

Arizona state university, ira a. fulton schools of engineering.

Ph.D. Computer Science (Cybersecurity)

Arizona State University logo

Arizona State University is certified as a National Center of Academic Excellence for Information Assurance Research and Education (CAEIAE). Its doctorate of cyber security program helps students master key theories and algorithms to apply to a modern computer science realm.

  • Courses:  Data and information systems , information assurance and security, applied Cryptography, and advanced computer network security.
  • Credits:  84
  • Delivery: On-campus
  • Tuition :  $11,720 per year
  • Financial aid:  Scholarships, grants, and loans.
  • Acceptance rate: 88.4%
  • Location:  Phoenix, Arizona

Capitol Technology University

Doctorate (DSc) in Cybersecurity

Capitol University logo

Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense. The school’s doctorate in cybersecurity program is a low-residency online program and was the first of its kind  in the USA.

  • Courses : Situation awareness analysis & action plan processes, information assurance strategic management, information assurance implementation
  • Credits : 54-66
  • Duration : 3 years (8 semesters)
  • Delivery : Online (low residency)
  • Tuition : $933 per credit
  • Financial aid: Loans, Grants, scholarships, work-study
  • Acceptance rate:  84.4%
  • Location : Laurel, MD

Northcentral University, School of Technology

Doctor of Philosophy in Cybersecurity (PhD-CY)

Northcentral University logo

Northcentral University is a regionally accredited university that offers many educational programs for students all over the world with one-on-one mentorship. Its PhD cybersecurity degree has a special emphasis on global security issues and covers international laws and multicultural elements.

  • Courses : Global cybersecurity demand, securing globally distributed infrastructure & support, and governance, audit, compliance & risk
  • Credits : 60
  • Duration : 40-44 months
  • Delivery : Online
  • Tuition : $1,094 per credit
  • Financial aid : Grants, loans, veteran benefits, and third-party scholarships.
  • Acceptance rate : 93%
  • Location : San Diego, CA & Scottsdale, Arizona

University of Colorado – Colorado Springs, College of Engineering and Applied Science

Ph.D. in Security

University of Colorado Springs logo

University of Colorado, Colorado Springs has partnerships with several defense departments, semiconductor manufacturers, and other prominent institutions, thanks to its strategic location. Though students must conduct the majority of the coursework for this doctorate degree in cyber security on-campus, a provision permits some online courses.

  • Courses : System administration & security, applied cryptography, and advanced system security design.
  • Delivery : On-campus
  • Tuition : $918.83 per credit
  • Financial aid : Scholarships, student employment, and loans.
  • Acceptance rate:  89.6%
  • Location : Colorado Springs, Colorado

Northeastern University

Cybersecurity, Ph.D.

Northeastern University logo

Northeastern University promotes a co-operative education philosophy with a blend of classroom learning and professional experience. This cybersecurity PhD program offers the opportunity to conduct research in specialized facilities and labs, including the Cybersecurity & Privacy Institute and International Secure Systems Lab.

  • Courses : Software vulnerabilities & security, computer hardware security, and machine learning in cybersecurity & privacy.
  • Credits : 48
  • Tuition : $1,532 per credit hour
  • Financial aid:  Scholarships, fellowships, assistantships, and company sponsorships.
  • Acceptance rate : 20.5%
  • Location : Boston, Massachusetts

Dakota State University

Cybersecurity, DSc

Dakota State University logo

Dakota State University is known for its specialization in computer education-related programs. Its doctorate in cyber security is delivered through a combination of various distance education methods and a handful of on-campus seminars. You can apply for the program even if you don’t have a master’s degree, but you’ll need to complete an additional 27 credits.

  • Courses : Full scope security testing, cyber security research, and security software engineering.
  • Credits : 61
  • Duration : 3 years
  • Delivery : Online (plus on-campus seminars)
  • Tuition : $210.80 per credit hour
  • Financial aid:  Grants, work-study, and loans.
  • Acceptance rate: 83%
  • Location:  Madison, SD

Purdue University, The Center for Education and Research in Information Assurance and Security (CERIAS)

Interdisciplinary Ph.D. Program in Information Security

Purdue University logo

Purdue University was ranked in the top 10  most innovative universities in 2022 by the US News & World Report. This interdisciplinary cybersecurity PhD program covers ethical, political, and philosophical courses, to provide insight into technology policy issues and information ethics.

  • Courses include:  Information security, advanced network security, and modern ethical theories.
  • Credits: 60
  • Delivery:  On-campus
  • Tuition:  Refer tuition calculator
  • Financial aid:  Fellowships, teaching assistantships, and research assistantships.
  • Acceptance rate: 67.2%
  • Location:  West Lafayette, IN

Nova Southeastern University, College of Computing and Engineering

Ph.D. in Cybersecurity Management

Nova Southeastern University

NSU is considered one of the National Centers of Academic Excellence (NCAE) in cybersecurity. To qualify for this school’s PhD program in cybersecurity, you’ll need to have either a bachelor’s or master’s degree in the field. The school also offers a direct BS to PhD pathway.

  • Courses : Fundamentals of cybersecurity, information security governance, and human-computer interaction.
  • Credits : 51 minimum
  • Delivery : Hybrid
  • Tuition : $1,282 per credit hour
  • Financial aid:  Fellowships, scholarships
  • Acceptance rate:  76.2%
  • Location : Fort Lauderdale, Florida

St Thomas University

Doctor of Business Administration in Cyber Security Management

St, Thomas University logo

St. Thomas University is a non-profit Catholic university that emphasizes global and cultural diversity. Its doctorate of cybersecurity program lets you choose one of three research options: traditional dissertation, action research, and article dissertation.

  • Courses : Cyberlaw, policy & security, cyber security risk management, and information ethics.
  • Duration : 1.5 years plus dissertation
  • Delivery : On-campus, online, and hybrid options
  • Tuition : $1,029 per credit hour
  • Financial aid:  Scholarships, grants, loans, and work-study.
  • Acceptance rate: 59.6%
  • Location : Miami Gardens, FL

George Mason University, Volgenau School of Engineering

Information Technology Ph.D. (Information Security and Assurance (ISA) Concentration)

George Mason University logo

George Mason University is a public research university with an emphasis on sustainability that was ranked the most diverse university  in Virginia by the US News & World Report 2018. Its PhD program in Information Technology offers a concentration in Information Security Assurance (ISA) covering cybersecurity subjects.

  • Courses : Secure software development, security protocol analysis, and security experimentation.
  • Credits : 72 minimum
  • Tuition : $663 per credit
  • Financial aid : Grants, work-study, and loans.
  • Acceptance rate:  89.2%
  • Location : Fairfax, Virginia

What are the Prerequisites for a PhD in Cybersecurity?

Most PhD programs in cybersecurity require a master’s in computer science or a related field. Other specific requirements vary depending on the program, but you’ll typically need to submit the following in your application:

  • Personal Statement  and/or research proposal
  • Academic resume
  • Letters of recommendation

Check individual requirements for each school you’re considering well in advance of the application cut-off date. These programs can be competitive, so give yourself plenty of time to put together the strongest application you can!

Preparing for a Cybersecurity Doctorate Program

The best cybersecurity doctorate programs can be intensive and competitive. Therefore, it’s a good idea to prepare before the program even starts – this can give you the edge you need to excel in the program!

Of course, your previous studies provide the foundation for your doctorate. An internship in the field can also help you to build useful skills and knowledge, especially when it comes to the latest trends  Likewise, participating in cybersecurity competitions or getting a cybersecurity certification can be highly advantageous.

However, the best thing you can do to prepare for a cybersecurity doctoral program is to build your network  in the sector. Join professional organizations and mingle with industry folks to gain insights into the field. You can also use social media platforms like LinkedIn and Twitter to enhance your networks.

Related Reading:  Best Master’s in Cybersecurity Programs

Why Get a Doctorate in Cybersecurity?

A doctorate in cybersecurity allows you to develop high-level skills and knowledge on preventing and analyzing security breaches, as well as formulating strategies to manage them. It is a valuable qualification that will qualify you for top jobs at some of the best organizations, with attractive remuneration.

When choosing the best cybersecurity PhD program for you, consider the school’s reputation and its accreditation. Also, look at the courses offered, as cybersecurity involves various specializations. You should also consider your budget in the context of each program’s tuition, fees, and financial aid offered.

Finally, where is the program located? Is it offered on-campus, offline, or in a hybrid program? These factors will affect your ability to balance your study with work and personal commitments.

Jobs and Salary Prospects for Doctors of Cybersecurity

Some of the common roles and median annual salaries  for graduates with a PhD in cybersecurity include:

  • Cybersecurity Engineer – $125,816
  • Information Security Manager – $96,406
  • Chief Information Security Officer (CISO) –  $124,405
  • Security Architect –  $111,433
  • Security Director  – $105,907

Key Takeaways

You may not find as many options for a PhD in cyber security as other fields. After all, it’s a specialized program. However, you’ll find a few solid top cybersecurity PhD programs that give you the opportunity to learn from top research institutions and faculty.

If you’ve found this round-up of the best PhDs in cybersecurity helpful, take a look at our guides to the best online Master’s in Computer Science  and online PhD Computer Science programs .

PhDs in Cybersecurity FAQs

What is the average cost of a phd in cybersecurity.

Costs vary depending on the school, program length, and delivery (on-campus or online). Usually, a PhD in cybersecurity can be anywhere between $30,000 to $100,000.

Is a PhD in Cybersecurity Worth it?

A PhD in cybersecurity is valuable because it will qualify you for some of the most in-demand and well-paid jobs available today. According to the BLS , jobs for information security professionals are estimated to grow by 33% over the next decade, significantly more than the national average.

Can You Get a PhD in Cybersecurity?

A PhD in cybersecurity is a specialized degree, but today, many universities offer it. Several programs are delivered on-campus, online, or in hybrid formats.

How Long is a PhD in Cybersecurity?

A PhD in cybersecurity can take from 3-7 years to complete. This will depend on the program, as well as individual factors such as whether you choose to study part-time or full-time.

What Can You Do with a PhD in Cybersecurity?

A PhD in cybersecurity will equip you to work for leading organizations as a CISO (Chief Information Security Officer), information security manager, or security architect. You’ll also be qualified to conduct research or work as a professor in cybersecurity or a related field.

How Many Credits are Required for a PhD in Cybersecurity?

You’ll typically need 60 credits to complete a cybersecurity PhD. However, this varies depending on the specific program or university.

What Kinds of Exams are Required During a PhD Program?

Unlike most undergraduate programs, a PhD degree relies heavily on coursework and, in particular, a main dissertation or thesis. However, you’ll still have to complete some exams.

Usually, there are three kinds of exams:

  • A qualifying exam  that occurs earlier in the program.
  • A preliminary exam  that proves the candidate’s readiness to start the dissertation/research.
  • The  final exam  for the candidate to defend their dissertation/research work.

How Do You Choose a PhD in Cyber Security Program?

You should consider faculty experience, networking opportunities, available funding, accreditation, and alumni statistics before choosing a PhD in cyber security program.

Lisa Marlin

Lisa Marlin

Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.

  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 12 Best Laptops for Computer Science Students
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ BA vs BS: What You Need to Know [2024 Guide]
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ The 19 Best MBA Scholarships to Apply for [2024-2025]

Best Master’s in Cybersecurity Programs in 2024

Thegradcafe and jobbio join forces to connect top talent with great companies, related posts.

Grad school application rates have more than doubled for artificial intelligence programs.

  • Grad Trends: Interest in Artificial Intelligence Surges

Here's how to earn consideration from the big tech players as a new grad.

  • Applying to Big Tech This Year? Here’s How to Ace It.

Fewer employers list education requirements in job postings.

73% of job seekers believe a degree is needed for a well-paying role–but is it?

There are more jobs than talent in these cities.

Tech Talent Crunch: Cities with More Jobs Than Workers

The Most Under-Rated Career Advancement Tip for 2024

The Most Under-Rated Career Advancement Tip for 2024

Top 5 Best Psychology PhD Programs in 2024

Top 5 Best Psychology PhD Programs in 2024

TheGradCafe and Jobbio join forces to connect top talent with great companies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • Breaking Records: Yale Sees Most Selective Grad Admissions Season Yet
  • 12 Best Laptops for Computer Science Students
  • Is a Master’s Degree Worth It? [2024 Guide]

The Gradcafe

© 2023 TheGradCafe.com All rights reserved

  • Partner With Us
  • Results Search
  • Submit Your Results
  • Write For Us
  • Current Students
  • Faculty + Staff
  • Alumni + Friends
  • Parents + Family
  • Community + Visitors
  • Bachelor's Degrees
  • Master's Degrees
  • Doctorate Degrees
  • Certificates
  • Arts & Design
  • Business & Industry
  • Communications & Media
  • Data Analytics & Information
  • Health & Wellness
  • Humanities & Social Sciences
  • Music & Performing Arts
  • Public Service
  • Multidisciplinary
  • Still Exploring & Undetermined
  • International
  • Bienvenidos
  • Featured Videos
  • College Tour
  • Tuition & Aid
  • Student Life
  • Search Type Search Search
  • Quicklinks:
  • STUDENT EMAIL
  • UNT DIRECTORY
  • INFO FOR CURRENT STUDENTS
  • INFO FOR FACULTY + STAFF
  • INFO FOR ALUMNI + FRIENDS
  • INFO FOR PARENTS + FAMILY
  • INFO FOR COMMUNITY + VISITORS
  • UNT LIBRARIES
  • UNT CALENDAR
  • JOBS AT UNT

phd cybersecurity

Information Science Ph.D. With a Concentration in Cybersecurity

Want more info.

We're so glad you're interested in UNT! Let us know if you'd like more information and we'll get you everything you need.

Why Earn an Information Science Ph.D. With a Concentration in Cybersecurity?

The UNT Information Science Ph.D. program with a concentration in Cybersecurity responds to the varied and changing needs of an information age, increasing recognition of the central role of information and information technologies in individual, social, economic and cultural affairs.

The mission of UNT's Information Science Ph.D. program is to provide a center of excellence in graduate education and research. Its primary goals are to:

  • Nurture critical and reflective thinking on the fundamental issues and elements of problems of utilization of information
  • Foster an environment of substantive and productive mentoring and apprenticeship
  • Prepare scholars passionate about the role of information in human affairs
  • Foster cross-disciplinary thinking and research.

Students are recruited to the program from a wide range of disciplines and encouraged to expand and refocus their expertise and skills in cutting-edge areas of information science that cross disciplinary boundaries. The multifaceted nature of information science warrants the focusing of resources, courses, and faculties from a broad range of academic units.

  • Research and publication
  • Pedagogical practices
  • Critical thinking
  • Leadership ability
  • Data analysis

Cybersecurity Information Science Ph.D. Highlights

What can you do with an information science ph.d. with a concentration in cybersecurity.

Graduates of the program are prepared to contribute to the advancement and evolution of the information society in a variety of roles and settings as administrators, researchers, and educators.

Cybersecurity Information Science Ph.D. Courses You Could Take

Learn More About UNT

Explore more options.

Information Data Science Ph.D.

Consumer Behavior and Experience Management Information Science Ph.D.

It’s easy to apply online. Join us and discover why we’re the choice of nearly 47,000 students.

Northeastern University

Academic Catalog 2023-2024

  • Cybersecurity

Students can apply for admission to two distinct degree programs.

Doctor of Philosophy (PhD) in Cybersecurity

A research-based, interdisciplinary PhD in cybersecurity spans theory and systems, from hardware to software security, from cryptography to policy, and from malware to wireless security. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Master of Science (MS) in Cybersecurity

An industry-focused, interdisciplinary Master of Science in Cybersecurity combines knowledge of information security technology and cybersecurity hands-on tools with relevant knowledge from law, the social sciences, criminology, and management. The Master of Science in Cybersecurity is designed for students focused on cybersecurity careers in companies or government agencies, thus applying their knowledge to their workplaces to assess security threats and manage information security risks and technical and policy controls.

Northeastern University designations by the National Security Agency and the Department of Homeland Security:

NSA/DHS Center of Academic Excellence in Cybersecurity—Cyber Defense Education

NSA/DHS Center of Academic Excellence in Cybersecurity—Research

NSA/DHS Center of Academic Excellence in Cybersecurity—Cyber Operations

Align Master of Science (MS) in Cybersecurity

Without exception, every organization needs to protect their information system. Every day cyber risks are becoming more complex, and the sophistication and number of threats is growing continuously. For these reasons, cybersecurity professionals need to become more prepared, with a very solid background and with the capacity to evolve and adapt to the current and future information systems challenges.

Organizations are looking for well-rounded cybersecurity professionals, who, beside their understanding of information technologies, can also comprehend the many other dimensions that contribute to effective and efficient information systems security. Professionals with diversified backgrounds are particularly interesting because they are able to provide different approaches to complex cybersecurity problems.

Align-MSCY students are perfect cybersecurity professionals, because they have proven their adaptability to the cybersecurity field and also because they bring an invaluable experience and knowledge from other areas to contribute to a global perspective of an organization's cybersecurity posture.

Doctor of Philosophy (PhD)

Master of science.

  • Cybersecurity—Align

Graduate Certificate

Cybersecurity courses.

CY 5001. Cyberspace Technology and Applications. (4 Hours)

Seeks to provide a systematic understanding of cyberspace technology and applications deployed in the global digital infrastructure. Covers topics in computer networks, server architectures, operating systems, and scripting. All the techniques and tools included in the course are oriented to serve as instruments of security administrators and cybersecurity professionals. Uses practical hands-on labs running on virtual machines and containers hosted in the cloud computing environment to train students. For that reason, a practical overview of virtualization technologies, containerization, and cloud computing models is provided.

CY 5010. Foundations of Information Assurance. (4 Hours)

Introduces information security via concepts of confidentiality, integrity, and availability. Discusses ethical, legal, and privacy ramifications while reviewing various laws, such as the Patriot Act, the Gramm-Leach-Bliley Act, and the General Data Protection Regulation. Covers security methods, controls, procedures, economics of cybercrime, criminal procedure, and forensics.

CY 5061. Cloud Security. (2 Hours)

Introduces the fundamentals of cloud computing while segueing into understanding its various security challenges, threat models, and data privacy issues in regard to compliance and legal decisions. Examines the strategies to implement security controls, perform risk assessments, handle incident detection and response, while emphasizing maintaining a business-minded security life cycle for cloud-based environments.

CY 5062. Introduction to IoT Security. (2 Hours)

Aims to provide a foundation for understanding the main issues associated with information security in a widely connected world in the context of Internet of Things (IoT). Emphasizes the vulnerabilities and threats of the IoT-based systems. Offers students an opportunity to learn the essentials of the IoT technologies and the underlying mechanisms for protecting information.

CY 5065. Cloud Security Practices. (4 Hours)

Introduces the fundamentals of cloud computing. Examines the strategies to implement security controls, perform risk assessments, and handle incident detection and response. Emphasizes maintenance of a business-minded security life cycle for cloud-based environments. Offers students an opportunity to obtain an understanding of various security challenges, threat models, and data privacy issues in regard to compliance and legal implications.

Prerequisite(s): CY 5010 with a minimum grade of C-

CY 5120. Applied Cryptography. (4 Hours)

Surveys the principles and the practices of cryptography. Overviews the core cryptographic algorithms: symmetric encryption schemes (e.g., DES and AES); public key cryptosystems (e.g., RSA and discrete logarithm); and hash functions (e.g., the SHA family). Discusses core information assurance building blocks, such as authentication, digital signatures, key management, and digital certificates. Finally, applies these concepts to important security architectures, including the IP network stack (e.g., IPsec and SSL/TLS), the cellular system, and broadcast media. Restricted to students in the College of Computer and Information Science and in the College of Engineering or by permission of instructor.

CY 5130. Computer System Security. (4 Hours)

Offers a practical overview of enterprise computer security, operating systems security, and related topics. Applies concepts such as authentication, access control, integrity, and audit to the modern operating system. Discusses and demonstrates system, process, memory, and file system-level defenses—and the attacks against them. Also discusses topics in data security and virtualization. Uses hands-on labs to reinforce skills and provide practical experience.

CY 5150. Network Security Practices. (4 Hours)

Explores issues involved in the security of computer networks. Topics include firewalls, viruses, virtual private networks, Internet security, and wireless security. Includes case studies and laboratory exercises. Restricted to students in the College of Computer and Information Science or by permission of instructor.

CY 5200. Security Risk Management and Assessment. (4 Hours)

Creates the opportunity for competency in the development of information security policies and plans including controls for physical, software, and networks. Discusses different malicious attacks, such as viruses and Trojan horses, detection strategies, countermeasures, damage assessment, and control. Covers information system risk analysis and management, audits, and log files. Uses case studies, site visits, and works with commercial products.

Prerequisite(s): CS 2550 with a minimum grade of D- or CY 2550 with a minimum grade of D- or IA 5010 with a minimum grade of C- or CY 5010 with a minimum grade of C- or graduate program admission

CY 5210. Information System Forensics. (4 Hours)

Designed to allow students to explore the techniques used in computer forensic examinations. Examines computer hardware, physical and logical disk structure, and computer forensic techniques. Conducts hands-on experiences on DOS, Windows operating systems, Macintosh, Novell, and Unix/Linux platforms. Builds on basic computer skills and affords hands-on experience with the tools and techniques to investigate, seize, and analyze computer-based evidence using a variety of specialized forensic software in an IBM-PC environment.

CY 5240. Cyberlaw: Privacy, Ethics, and Digital Rights. (4 Hours)

Describes the legal and ethical issues associated with information security including access, use, and dissemination. Emphasizes legal infrastructure relating to information assurance, such as the Digital Millenium Copyright Act and Telecommunications Decency Act, and emerging technologies for management of digital rights. Examines the role of information security in various domains such as healthcare, scientific research, and personal communications such as email. Examines criminal activities such as computer fraud and abuse, desktop forgery, embezzlement, child pornography, computer trespass, and computer piracy.

Attribute(s): NUpath Ethical Reasoning, NUpath Writing Intensive

CY 5250. Decision Making for Critical Infrastructure. (4 Hours)

Focuses on the art and science of security program management leadership in the context of critical infrastructure protection programs. Includes selected readings, review of decision-making models in crisis, lectures and insights from accomplished leaders in infrastructure protection, and examination of the students’ own unique background and experiences. Trains students on the interaction of vulnerabilities, threats, and countermeasures and how to apply this knowledge to the protection of critical infrastructure using research and analysis of national and global strategies, historical and current legislation, and policies. Also seeks to give students a working knowledge of federal, state, and private-sector critical infrastructure protection resources and programs.

CY 5770. Software Vulnerabilities and Security. (4 Hours)

Seeks to help students to become aware of systems security issues and to gain a basic understanding of security. Presents the principal software and applications used in the Internet, discussing in detail the related vulnerabilities and how they are exploited. Also discusses programming vulnerabilities and how they are exploited. Examines protection and detection techniques. Includes a number of practical lab assignments as well as a discussion of current research in the field.

CY 5976. Directed Study. (1-4 Hours)

Seeks to provide cybersecurity (CY) students with the training experience of working on a specific IA project under the direction of an CY instructor. The instructor provides students with a plan of seminar sessions, including lectures, research, and development of project deliverables and with direction to complete the course. May be repeated without limit.

CY 5984. Research. (2-4 Hours)

Offers an opportunity to conduct research under faculty supervision. May be repeated without limit.

CY 6200. Special Topics in IT Security Governance, Risk, and Compliance. (1-4 Hours)

Offers various topics in IT security governance, risk, and compliance. May be repeated for up to 8 total credits.

CY 6240. Special Topics in Privacy Law. (1-4 Hours)

Offers various topics in privacy law. May be repeated for up to 8 total credits.

CY 6720. Machine Learning in Cybersecurity and Privacy. (4 Hours)

Covers a range of theoretical and applied topics related to machine learning uses in security and privacy. Examines vulnerabilities of machine learning and deep learning algorithms and the challenges of securing these systems in real-world applications. Machine learning and AI have enabled a number of critical applications— such as machine translation, speech recognition, and precision medicine—with large positive impact to our daily lives.

CY 6740. Network Security. (4 Hours)

Studies the theory and practice of computer security, focusing on the security aspects of multiuser systems and the Internet. Introduces cryptographic tools, such as encryption, key exchange, hashing, and digital signatures in terms of their applicability to maintaining network security. Discusses security protocols for mobile networks. Topics include firewalls, viruses, Trojan horses, password security, biometrics, VPNs, and Internet protocols such as SSL, IPSec, PGP, SNMP, and others.

CY 6750. Cryptography and Communications Security. (4 Hours)

Studies the design and use of cryptographic systems for communications and other applications such as e-commerce. Discusses the history of cryptographic systems, the mathematical theory behind the design, their vulnerability, and the different cryptanalytic attacks. Topics include stream ciphers including shift register sequences; block ciphers, such as DES and AES; public-key systems including RSA, discrete logarithms; signature schemes; hash functions, such as MD5 and SHA1; and protocol schemes including identification schemes, zero-knowledge proofs, authentication schemes, and secret sharing schemes. Discusses key management problems including Needham-Schroeder protocols and certificates.

Prerequisite(s): CS 5800 with a minimum grade of C- or CS 5800 with a minimum grade of D- or CS 7800 with a minimum grade of C-

CY 6760. Wireless and Mobile Systems Security. (4 Hours)

Focuses on security and privacy of mobile and wireless systems. Provides the foundations to understand the security and privacy threats and defenses in wireless and mobile systems, especially in an era where wireless network functions are implemented in software instead of traditional hardware-based solutions. Covers topics on availability/integrity issues in wireless networks, Wi-Fi and cellular network security, broadcast authentication techniques, jamming and antijamming techniques, etc. Emphasizes hands-on practical exercises to strengthen the understanding of concepts covered during the lectures. Reviews the state of the art in wireless security research through readings. Offers students an opportunity to execute a semester-long project in the broad area of wireless security.

CY 6962. Elective. (1-4 Hours)

Offers elective credit for courses taken at other academic institutions. May be repeated without limit.

CY 7790. Special Topics in Security and Privacy. (4 Hours)

Offers various topics in security and privacy. May be repeated for up to 8 total credits.

CY 7900. Capstone Project. (4 Hours)

Draws together candidates from diverse backgrounds (technical, legal, and/or law enforcement) in a collaborative activity to address one or more security issues from an integrated perspective. Requires a project proposal, generally industrially oriented, to be submitted and accepted prior to the semester in which the project is to be undertaken.

CY 7962. Elective. (2-4 Hours)

CY 7990. Thesis. (2-4 Hours)

Offers selected work with the agreement of a project supervisor. May be repeated without limit.

CY 7995. Project. (1-4 Hours)

Offers students an opportunity to participate in a direct cybersecurity project under the supervision of a faculty member. May be repeated once for a total of 8 credits.

CY 8982. Readings. (1-8 Hours)

Offers selected readings under the supervision of a faculty member. May be repeated without limit.

CY 9000. PhD Candidacy Achieved. (0 Hours)

Indicates successful completion of program requirements for PhD candidacy.

CY 9990. Dissertation Term 1. (0 Hours)

Offers selected work with the agreement of a thesis supervisor.

Prerequisite(s): CY 9000 with a minimum grade of S

CY 9991. Dissertation Term 2. (0 Hours)

Offers dissertation supervision by members of the department.

Prerequisite(s): CY 9990 with a minimum grade of S

CY 9996. Dissertation Continuation. (0 Hours)

Continues work with the agreement of a thesis supervisor.

Prerequisite(s): CY 9991 with a minimum grade of S or Dissertation Check with a score of REQ

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2023-24 Undergraduate Day PDF

2023-24 CPS Undergraduate PDF

2023-24 Graduate/Law PDF

2023-24 Course Descriptions PDF

PhD in Computer Science

The Tandon School of Engineering offers a PhD in Computer Science. Cybersecurity is a particular research strength of the program. Learn more and apply to the PhD in Computer Science  through the Tandon School of Engineering.

UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications open

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .

Fees and funding

Fees for this course.

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Choose your programme

Please read the Application Guidance before proceeding with your application.

Year of entry: 2024-2025

Got questions get in touch.

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE programmes
  • Primary PGCE programmes
  • Secondary PGCE programmes
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation
  • Funding your Master's

Cybersecurity

Program finder image

Graduate Program

Students enrolled in the Master of Liberal Arts program in Cybersecurity will build a strong foundation in security, privacy, and cryptography. They will acquire knowledge and skills to plan, manage, and maintain the security of an organization’s cloud infrastructure and applications.

Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

  • Majors & Degrees

Popular searches

  • Commencement
  • Academic Calendar
  • Tuition and Fees
  • Online Programs
  • Karl E. Mundt Library
  • Scholarships

smiling woman

Is DSU the right fit for you?

Even the best brochures and postcards (and yes, even websites) can only tell you so much about a college. The only surefire way to know if DSU is right for you is to see for yourself.

Cyber Defense Doctor of Philosophy (PhDCD)

Defend the elite.

Unsolicited threats pose a dangerous risk to government agencies and organizations alike. They, too, are vulnerable to hackers, malware, and data breaches. Equip your business or agency with the ultimate security protection –  you. 

With a doctorate in Cyber Defense, you can learn what it means to be a leader on the edge of innovation. 

Defend the elite and address growing cyber threats. Practice risk management strategies. Harbor knowledge in research methodology and practice. Validate authenticity and confidentiality. Design and implement security policies and provisions. Conduct recovery plans for your future IT infrastructure. Work and learn from faculty who are experts in their field. 

The program is provided entirely through online learning. There is an annual residency requirement of three on-site research seminars. Seminars will be held on the Madison, South Dakota campus (students may petition to participate in the residency requirement from a distance). A great way to finish your degree while holding a professional career.

  • VIEW COURSES
  • Timelines & Requirements
  • Tuition & Fees
  • Request Program Info

The Beacom College of Computer and Cyber Sciences

Arica Kulm ’18 MS Cyber Defense ’20 PhD Cyber Defense

Cyber defense is a career, not just a job

Arica Kulm was looking for a career, not just a job. After finishing her master’s in Cyber Defense, she decided to continue on as one of the first students in the PhD in Cyber Defense program. This gives her the knowledge base for a meaningful, interesting career in a field that is in great demand worldwide.

Student Spotlight

Explore the defensive line

DSU’s curriculum addresses the important technical aspects of cyber defense, and includes important leadership, ethics, and management concepts. This degree complements our PhD in Cyber Operations and fits tightly with our strategic priorities and initiatives. Our graduates obtain careers in private industries, government agencies, the military, and academia. We have a recognized excellence in cyber security, education, and research that is central to our mission. We currently hold four prestigious Centers of Academic Excellence Designations from the National Security Agency and Department of Homeland Security, including the most technical for Cyber Operations and the most prestigious as a Cyber Defense Consultative Regional Resource Center, one of four university-based centers in the nation.

Cyber Operations Masters of Science

Learning Outcomes

Upon completion of the Ph.D. degree in Cyber Defense, students will be able to:

  • Apply scientific research methodologies.
  •  Advance the field of cyber defense.
  • Apply ethical frameworks to security decisions.

Kyle Cronin

Kyle Cronin

Associate Professor, Coordinator for Ph.D. in Cyber Defense

Tyler  Flaagan

Tyler Flaagan

Assistant Professor

Chris Olson

Chris Olson

Associate Professor / Coordinator for MS in Cyber Defense

Related Programs

professor teaching class

Marymount University

  • Staff & Faculty
  • Current Students
  • Parents & Family
  • Visitors & Community
  • Corporate Partnerships
  • Support Marymount
  • Marymount Shuttles
  • Student Counseling Services
  • News & Events
  • Campus Safety
  • Faculty & Staff Directory
  • My Marymount
  • Registrar’s Office
  • Library & Learning Services
  • Campus Ministry
  • Human Resources
  • Office of the President
  • Marymount at a Glance
  • Points of Pride
  • Our Mission, Vision, & Plan
  • Capital Location
  • Our History
  • The Rixey History
  • Our Inclusive Community
  • Marymount’s Economic Impact
  • Involvement & Service
  • Distinguished Speakers
  • Map and Directions
  • Visit Marymount
  • Admitted Students
  • Undergraduate Students
  • Graduate Students
  • Online Students
  • Non Degree Students
  • Summer Programs
  • Early College Programs
  • Scholarships & Aid
  • Early Learning Academy
  • New Student Scholarships
  • How to Apply
  • Types of Aid
  • Graduate Student Aid
  • Military & Veteran Services
  • Financial Aid FAQs
  • Tuition & Fees
  • Satisfactory Academic Progress Standards
  • Office of the Provost
  • Academic Calendar
  • Majors & Programs
  • Online Programs
  • Services & Resources
  • College of Business, Innovation, Leadership, and Technology
  • College of Health and Education
  • College of Sciences and Humanities
  • Access, Belonging, Inclusion, Diversity, and Equity Hub
  • Marymount Global
  • Center for Optimal Aging
  • Saints’ Service Network
  • Faculty Research and Experts
  • Commencement
  • Student Affairs Administration
  • New Student Orientation
  • Dining Services
  • International Student & Scholar Services
  • Student Activities and Events
  • Student Accounts
  • Commuter Students
  • Student Health and Well-being
  • Community Standards and Title IX
  • Ministry, Activities & Leadership
  • Careers, Internships & Employment
  • Auxiliary Services
  • Campus Safety & Emergency Management
  • Student Government Association
  • Student Success and Well-being

Cybersecurity (D.Sc.)

Banner image

Academics College of BILT – Business, Innovation, Leadership and Technology School of Technology and Innovation School of Technology and Innovation Graduate Programs Cybersecurity (D.Sc.)

D.Sc. Cybersecurity Program Overview

Marymount University’s doctorate program in Cybersecurity prepares highly qualified individuals for elite careers in cybersecurity, with unique knowledge and skill sets to manage increasingly complex networks and information systems to protect the nation’s digital infrastructure and our national security.

The D.Sc. in Cybersecurity program teaches candidates higher-order thinking and diversity of thought surrounding current and future cybersecurity issues, such as exploration of new technology, the role of artificial intelligence, and research to develop expertise in an area of cybersecurity of their choice.

  • Most strategic location

While available online and in person, Marymount’s Cybersecurity doctorate program takes advantage of the University’s strategic location. The national capital region is near more cybersecurity firms and related employment opportunities than anywhere else in the U.S. Here, you can find the Dept. of Homeland Security, Dept. of Defense, National Security Agency, Central Intelligence Agency, and National Science Foundation, as well as major companies such as Amazon Web Services, Capital One, Northrup Grumman, L-3, CACI, and more. Our faculty are also experts who are active in the federal government and corporate security, with experience you can’t easily find anywhere else.

Designed primarily for working professionals, the program offers a unique opportunity to work in different cybersecurity environments — from Google and Facebook to the Dept. of Defense, Dept. of Commerce, and so many others. You will learn by collaborating with a diverse set of experienced professionals and developing insights into the many real-world applications of cybersecurity.

  • Advanced cybersecurity t raining

Marymount’s Cybersecurity doctoral program goes beyond basic network security, recognizing an evolving field that is at the intersection of technology, management, ethics, leadership, human behavior, policy, and data science. We are a designated National Center of Academic Excellence for Cyber Defense Education (CAE/CDE) by the National Security Agency and the Dept. of Homeland Security, a distinction in the cybersecurity domain held by only select universities in the country. Marymount is also a recipient of the CyberCorps Scholarship for Service grant from the National Science Foundation, allowing us to offer scholarships to Cybersecurity students in turn for the same length of service in government cybersecurity positions.

  • Focus on applied research

Our goal is to share the expertise of cybersecurity professionals with students who will become the future leaders and educators in the field. We accomplish this through scholarly inquiry involving real-world situations as well as extensive research into the technological, societal, ethical, and policy domains of cybersecurity.

Program Features

Answer

  • 72 credits for post-bachelor’s degree applicants; 36 credits for post-master’s degree applicants
  • $1,275 per credit
  • Courses offered in person, online, and through a hybrid format

Admission Requirements

  • Graduate application
  • Official transcripts of all postsecondary education
  • Professional résumé
  • 1-page statement describing research-focused coursework, papers, and projects completed, and possible research interests for final dissertation
  • 2 writing samples from either an academic paper or professional work report (approx. 4-6 pages) pertaining to the IT or cybersecurity field
  • Grade of B- in a college-level statistics course is required prior to 800-level coursework
  • Interview is required for qualified applicants

International Students: For university coursework completed outside the U.S., a course-by-course transcript evaluation is required from a  NACES  member evaluation agency such as  World Education Services  or  Educational Credentials Evaluators .

Students for whom English is a second language must submit a recent official score of 96 from TOEFL, 6.5 from IELTS, or 58 from the PTE academic exam, or documentation of program completion at 1 of Marymount University’s language partners. For complete information about International Admissions Guidelines and language partner programs, visit our  International Graduate Students page .

For more information, please contact:    Sean Buchanan   [email protected] 703-526-6899

Program Curriculum Snapshot

IT 727: Managing Cybersecurity Risk

In general, the digital assets of modern-day organizations are susceptible to numerous threats and potential vulnerabilities — but there’s not always enough money and resources to protect them. This course covers all aspects of managing cyberattack risk and covers the foundations of developing cyber defense strategies for any organization. Also covered is the strategic decision-making process, including formal methodologies, of which assets to defend and why.

IT 757: Cyber Threat Intelligence

This course covers the cyber threat intelligence landscape, including tactical, operational, and strategic dimensions. It includes open-source, social media, and mobile app intelligence gathering techniques. Investigational strategies such as counterintelligence methods and attribution are also discussed.

IT 777: Malware Analysis

This is an advanced hands-on class that explores the roles of malware analysis, cybersecurity defenses, developing policies to handle malware, and performing dynamic and static analysis to recognize existing and potential malware. Students learn how and when to use analysis techniques to mitigate risks associated with malware.

IT 800: Beginning Applied Research in Cybersecurity

This course prepares doctoral students for the applied research process in the cybersecurity field. Students review APA guidelines and look at special requirements for academic writing. They start thinking of issues in the field that could benefit from additional research and then develop these ideas into potential dissertation topics. Students also analyze past work and consider ethical issues that might occur during their cybersecurity research.

Career and Salary Possibilities

Through the D.Sc. Cybersecurity program, we offer work opportunities and other experiential learning practicums, including a variety of paid research and teaching assignments through the CyberTeach program and publications of group research projects completed with other D.Sc. in Cybersecurity students. In addition, the Center for Career Development has experts to help with résumés, LinkedIn, and interviewing.  

The median annual salary for Computer and Information Systems Managers in 2021 was $199,010, according to the U.S. Bureau of Labor Statistics. During the next decade, the career outlook for cybersecurity professionals is expected to grow 33%, far above the national average.

More information on careers in cybersecurity can be found at cyberseek.org .

Meet Our Faculty

Welcome to the  School of Technology and Innovation  within Marymount University’s  College of Business, Innovation, Leadership, and Technology (BILT) .

Today, technology is a major part of all of our lives and our School is here to educate the next generation of technology gurus in whatever that technology brings. We are extremely proud of our progressive technology programs and the quality of our students who are entering the challenging workplaces of today and tomorrow.

The School of Technology and Innovation focuses on preparing individuals to take part in the global critical technology workforce shortage. Our programs, whether they are at the undergraduate, masters, or doctoral levels, prepare students for roles in digital transformation, cybersecurity, data science, cloud computing, and the constantly growing field of technology applications.

We are particularly proud of our diversity, equity, and inclusion initiatives as we help significant numbers of minorities, women, veterans, and the neurodiverse succeed in the technology field.

Please explore our website to learn more about our programs and our faculty, staff, students, and alumni.

Dr. Diane Murphy

Click here to view our Faculty

Contact an Admissions Advisor

Schedule an appointment with one of our dedicated admissions advisors today to get more information about our programs, the application process and our student support structure..

logo

(703) 522-5600

Privacy Policy - Terms of Use

  • Contact CONTACT MARYMOUNT
  • Directions MAPS & DIRECTIONS
  • Careers CAREERS AT MARYMOUNT
  • Student Jobs JOBS ON CAMPUS (MU STUDENT)
  • Our Mission, Vision & Plan
  • Maps & Directions

phd cybersecurity

phd cybersecurity

Online Students

For All Online Programs

International Students

On Campus, need or have Visa

Campus Students

For All Campus Programs

Is a Cybersecurity Degree Worth It?

A woman using a tablet to pursue an online cybersecurity degree

Understanding the Numbers When reviewing job growth and salary information, it’s important to remember that actual numbers can vary due to many different factors — like years of experience in the role, industry of employment, geographic location, worker skill and economic conditions. Cited projections do not guarantee actual salary or job growth.

The field of cybersecurity is growing rapidly, with diverse job opportunities available across many different industries. But with so many ways to build technology skills, is a cybersecurity degree worth it? 

Adam Goldstein, an online IT team lead and adjunct instructor at SNHU

“Numerous reports and studies have shown that there are hundreds of thousands of cybersecurity job openings and that demand is on the rise,” said Goldstein, who has more than 20 years of experience in information security. “And while educational programs are increasing, the number of trained professionals is significantly below that demand, so there will be continued opportunities for years to come.”*

So, is a degree in cybersecurity right for you? The first step toward making that determination is to better understand what a cybersecurity degree is  and how it prepares you for the career you want.

What is a Cybersecurity Degree?

A cybersecurity degree is a higher education credential designed to give you skills, knowledge and experience in key areas of the information technology (IT) field. Cybersecurity degree programs can prepare you to respond to cyber threats , assess risk and apply security techniques to keep software, data and digital infrastructure safe from cyber attacks.

Depending on your past educational and professional experience, there are different types of cybersecurity degrees that may be right for you, including:

  • Associate of Science in Cybersecurity
  • Bachelor of Science in Cybersecurity
  • Master of Science in Cybersecurity

Cybersecurity degree coursework can vary, but most programs include a mix of general education courses and degree-specific classes, such as:

  • Application Security
  • Computer Networking
  • Computer Operating Systems
  • Network Security
  • Operating System Security
  • Security Risk Management

Find Your Program

Are cybersecurity degrees hard .

An icon of a computer with a lock on the screen.

“With evolving and innovative education models, aspiring professionals can develop strong technical skills in areas such as network security, cryptography and ethical hacking, as well as understanding legal and ethical considerations,” Goldstein said.

He also noted that cybersecurity can sometimes be a challenging field because it's changing all the time and requires students to build skills across a broad range of subjects. But this rapid evolution is also what makes the field exciting and results in a diverse range of jobs available .

Is a Cybersecurity Degree Enough to Get a Job?

In 2024, there are many cybersecurity positions available in the U.S. that still need to be filled. According to Cyberseek, there are only enough cybersecurity workers to fill 82% of the jobs employers need.*

An icon indicating a process with three circles, two of which are checked off, connected by two lines

"Degree programs are a great way to acquire the wide range of KSAs that are needed for a cybersecurity position,” he said.

A degree in cybersecurity can also open up career opportunities across many fields. While you could work for an information technology company, Goldstein said that many other industries also rely on cybersecurity professionals to secure their networks and digital assets, including:

  • Manufacturing

“The job types are varied from security engineers focused on building and maintaining secure systems to auditors and compliance experts, and to those working in incident response who help organizations deal with cyber incidents,” Goldstein said.

What Branch of Cybersecurity Pays the Most?

According to Terrance Winn , an adjunct faculty member in cybersecurity at SNHU, and a cybersecurity professional with 30 years of experience, cybersecurity has become an umbrella term that covers many specialty jobs.

These jobs include:

  • Cybersecurity Analyst
  • Governance, Risk and Compliance (GRC)
  • Incident Responder
  • Vulnerability Analyst
  • Security Consultant

The earning potential within cybersecurity depends on the industry you work in, your specific role and your level of education and experience –and, quite often, the geographic region of the organization for which you work.

As an information security analyst, for example, you could help plan and carry out security strategies designed to protect an organization’s computer networks and systems.

According to the U.S. Bureau of Labor Statistics (BLS), information security analysts earned a median annual salary of $120,360 in 2023.* BLS data projects jobs for information security analysts will grow 32% by 2032.*

Is a Cybersecurity Degree Worth the Investment?

Your earning potential and the job opportunities available to you will depend on the type of cybersecurity degree you pursue and the skills and experience you build as a result. But data from BLS and other organizations shows that there are many benefits to earning a cybersecurity degree.

In-Demand Field

According to Cyberseek , there were 448,033 cybersecurity job openings in the United States between February 2023 through January 2024, many of which required a bachelor’s level degree or higher.*

For cybersecurity specialist jobs, for example, 42% of online job listings requested a bachelor’s degree, and 44% requested a master’s degree, according to Cyberseek data. Jobs for incident and intrusion analysts were similar. Cyberseek reported that 52% requested applicants with a bachelor’s degree, and 46% requested applicants with a master’s degree.

“The demand remains high and will undoubtedly stay that way for the foreseeable future,” said Winn.*

Higher Earning Potential

Earning a cybersecurity degree could also help you earn more. According to BLS data, bachelor’s degree holders earned a median weekly income of $1,493 in 2023, compared to just $899 per week for workers with a high school diploma.*

Master’s degree holders saw an even bigger boost in salary potential, earning a median weekly income of $1,737 in 2023, according to BLS.

Lower Unemployment Rates

Stable employment is another potential benefit of earning a degree in cybersecurity. BLS data shows that in 2023, master’s degree holders had an unemployment rate of just 2%, while bachelor’s degree holders experienced 2.2% unemployment.* Workers with a high school diploma, on the other hand, had unemployment rates of 3.9%, according to BLS.*

Opportunities for Personal and Professional Growth

One of the biggest benefits of earning a cybersecurity degree is the growth you can experience in your personal and professional life. 

Remus Figueroa Orozco wearing a graduation cap and gown to celebrate his bachelor’s degree in cybersecurity from SNHU

His advice for other students considering a cybersecurity degree program is simple.

“My advice would be to just do it,” he said. “Time is not slowing down for anybody. Don’t give up on yourself, because at the end of the day, you are your best support system. Do what’s best for you, and don’t let anybody stop you.”

What is the Best Cybersecurity Degree? 

An icon of a graduation cap.

A bachelor’s degree is the typical entry-level education for cybersecurity roles like information security analysts, according to BLS . But two-year degrees, certificate programs and graduate-level degrees can also help you reach your goals.

“Any degree ... shows a potential hiring manager or recruiter that there is an interest in the field,” said Winn.

Is it Better to Get a Cybersecurity Degree or Certificate? 

Terrance Winn, an adjunct faculty member in cybersecurity at SNHU

If you decide to pursue a degree after earning a certificate, your courses should apply toward the program, said Winn.

Read more: Is a Cybersecurity Certificate Worth It?

Is a 2-Year Degree in Cybersecurity Worth It?

Earning an associate degree in cybersecurity  can also be a good starting point for professionals in the field, said Goldstein — particularly if the program incorporates hands-on learning .

“Programs with a strong commitment to hands-on and applied learning are beneficial," he said. "Practice working with technology is going to make you stand out to employers."

Are Cybersecurity Master’s Degrees Worth It?

If you’ve already earned a bachelor’s degree and want to advance your career even further, earning a master’s degree in cybersecurity  can help, said Goldstein.

Master’s degrees can give you more advanced technical skills and help you build  key leadership skills  employers look for when hiring for management positions in cybersecurity.

But no matter what degree program you pursue, Winn said it’s important to ensure you attend a university with a proven track record of providing high-quality cybersecurity education.

According to Winn, one way to do this is to look for institutions that have important designations. For instance, SNHU has been designated a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA). The Bachelor of Science (BS) in Cybersecurity is SNHU's validated program of study.

Is a Cybersecurity Degree Right for Me?

If you want to join the evolving cybersecurity field , it’s important to consider the degree programs available and how they align with your unique goals. Once you decide how to move forward with your cybersecurity career aspirations, the opportunities are virtually limitless.

“No two situations are the same within this field, and there are opportunities to carve out a great career in one of the niche specialty areas,” said Winn. “The field continues growing, and cybersecurity professionals must ensure businesses/organizations can protect customer information and resources.”

Discover more about SNHU's online BS in Cybersecurity degree : Find out what courses you'll take, skills you'll learn and how to request information about the program.

*Cited job growth projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth. Actual salaries and/or earning potential may be the result of a combination of factors including, but not limited to: years of experience, industry of employment, geographic location, and worker skill.

Danielle Gagnon is a freelance writer focused on higher education. She started her career working as an education reporter for a daily newspaper in New Hampshire, where she reported on local schools and education policy. Gagnon served as the communications manager for a private school in Boston, MA before later starting her freelance writing career. Today, she continues to share her passion for education as a writer for Southern New Hampshire University. Connect with her on LinkedIn .

Explore more content like this article

Data analysts look at a tablet with charts of data on it

What Does a Data Analyst Do?

A woman with an associate degree in IT working in a server room

What Can You Do With an Associate Degree in Information Technology?

A woman looks at a computer screen studying how to become a software engineer

How to Become a Software Engineer

About southern new hampshire university.

Two students walking in front of Monadnock Hall

SNHU is a nonprofit, accredited university with a mission to make high-quality education more accessible and affordable for everyone.

Founded in 1932, and online since 1995, we’ve helped countless students reach their goals with flexible, career-focused programs . Our 300-acre campus in Manchester, NH is home to over 3,000 students, and we serve over 135,000 students online. Visit our about SNHU  page to learn more about our mission, accreditations, leadership team, national recognitions and awards.

Skip to Content

  • Current Students
  • Faculty/Staff

University of Denver MS in Cybersecurity program

MS in Cybersecurity at the University of Denver

Explore this Section

Master strategic thinking, problem-solving, and tackling cybersecurity challenges in any context. Gain a comprehensive skill set covering risk assessment, incident prevention, and protecting information systems against cyberthreats in our Master’s in Cybersecurity program .

Request Information

  • Tuition Information

Image of the University of Denver's Ritchie School of Engineering and Computer Science building

Program Overview

Flexibly designed to advance your career goals.

The University of Denver is recognized by the National Security Agency and the Department of Homeland Security as a Center for Academic Excellence in Cyber Defense (CAE). As a graduate of a CAE institution, employers will trust that you have received a high-quality education and are prepared for the job.

Our program is accepting applicants from a wide range of backgrounds for the Fall 2024 quarter (classes begin in September). Classes meet on-campus in the evenings, giving you flexibility to balance coursework with your ongoing professional and personal commitments.

  • Complete your degree in 18-24 months.
  • 12 course requirements (48 credit hours).
  • In-person program with small class sizes, providing a cohort experience.
  • Flexible enrollment: full or part-time options.
  • Evening classes taught by full-time faculty members and industry experts.
  • Engaging capstone projects - no thesis requirement.

No GRE requirement to apply. A computer science background is a plus, but not required.

Image of binary code

Accelerate Your Cybersecurity Career

Apply by May 15, 2024 to meet our priority admissions deadline, and we accept applications until our August 15, 2024 final submission deadline.

Apply Now & Start Sept. 2024

Curriculum Details

We teach technical underpinnings that build a strong foundation.

Your coursework will be reinforced with practical, hands-on projects with industry partners, giving you several opportunities to apply your skills in real-world settings. Our MS in Cybersecurity program provides you with tools and knowledge that are applicable to virtually any industry, including:

  • Protecting security information systems and infrastructure
  • Detecting, countering, recovering, and preventing cyber incidents
  • Ensuring availability and integrity of data resources
  • Assessing security risk across information systems
  • Understanding and affecting cybersecurity policy  

Our degree requires 12 courses (48 credits) that can be completed in under two years. Upon admission, you will take a pre-assessment exam to demonstrate your mastery of foundational concepts to ensure success in the program. If you do not have previous coursework in these subjects, our 3 foundational courses will serve as a basis prior to the 12 coursework requirements. More information on degree plans and full course descriptions are available on the University of Denver's Graduate Bulletin .

Cybersecurity students at the University of Denver working together

Career Opportunities

Cybersecurity growth rate icon

Meet the Demand

Projected growth rate of 35% in cybersecurity jobs from 2021-2031.

Competitive Salary Prospects

Cybersecurity professionals are in high demand, commanding an average annual salary of $119,860 .

Unlock Your Versatility

You will be prepared for a range of rapidly growing positions, including roles in security planning and strategy, programming, and analysis with titles like Security Analyst, Information Security Engineer, or Threat Intelligence Analyst.

Cybersecurity career support icon

Career Support

We offer extensive services to help support and accelerate your career, including coaching, job search support, interview training, and networking opportunities.

Tuition is heavily discounted from regular graduate tuition at the University of Denver. Therefore, we do not provide additional departmental scholarships. Federal student loans are available for all domestic students. More information on financial aid, including private loans for international students can be found on DU's financial aid website .

For the 2023-2024 academic year, tuition is $806 per credit. 

Estimate your annual tuition cost

Application information.

Our application materials require transcripts from every college or university you have attended, 2 letters of recommendation (3 preferred), a personal statement of at least 300 words, and a resume (or C.V.). View additional standards for international applicants and non-native English speakers . 

Elevate your cybersecurity career and start your application today. Additional admissions criteria and application materials requirements are available in the following steps:

Fall 2024 Priority Deadline (Domestic Students)

May 15, 2024

Application icon

Admissions Steps and Application Requirements

Academics icon

Financial Aid Options

Service icon

Start Your Application

Contact our graduate admissions manager.

Graduate Admissions Manager, Cybersecurity, Systems Engineering

Give photo

Undergraduate Applicants

The Common App is a universal application that can be sent to many schools, including the University of Denver.

First-Year Students Transfer Students

Graduate Applicants

Go to the graduate admission application to submit your information. For information on admission requirements, visit the graduate academic programs page and locate your program of interest.

Graduate Application

Explore Programs

Graduate Academic Programs

Take The First Step

Undergraduates.

Contact Undergraduate Admission

Request Info

Request Graduate Program Information

A group of five cyber security students has gathered at the campus library to brainstorm ideas for their new project

IT vs. Cyber Security Degree: What’s the Difference?

Author: University of North Dakota May 24, 2024

In an era often dubbed the digital age, the relevance of degree programs associated with technology has surged.

Request Information

This increased demand reflects the critical role these degrees play in developing and maintaining our interconnected world. Among these, degrees in Information Technology (IT) and Cybersecurity stand out due to their importance in safeguarding and managing digital infrastructure. 

While today there are a plethora of degree one can choose in their pursuit of having a career in technology, two degrees stand out: information technology (IT) and cybersecurity. As prospective students navigate their educational paths, many find themselves in the IT vs cybersecurity dilemma. Which one is better? Each offers unique skills and career opportunities, and understanding their similarities and differences is the sure way to making an informed decision.

What Is a Cybersecurity Degree?

A cybersecurity degree focuses on protecting information systems, networks, and data from cyber threats and attacks. This field, more specific than general IT, arms students with knowledge and tools to combat hackers, secure networks, and ensure the privacy and integrity of sensitive information. The curriculum typically covers topics such as ethical hacking, cryptography, digital forensics, and compliance. 

Cybersecurity degrees offer a range of career paths that cater to various skills and interests, from technical roles to leadership positions. Here are some key areas within the field:

  • Engineering and Architecture
  • Incident Response
  • Management and Administration
  • Testing and Hacking

These options emphasize proactive strategies in cyber defense, making the degree highly specialized with a focus on securing digital assets.

What Is an Information Technology Degree?

IT is a broad term and such is its degree which incudes the study and application of systems for storing, retrieving, and sending information. This degree provides a foundation in both the technical and administrative aspects of technology operations, including network administration, systems analysis, and database management.

IT programs equip students with the skills to manage and configure technology infrastructures and ensure they support an organization's strategic goals.

Specific roles suited for graduates with an IT degree include:

  • Network Administrator
  • Systems Analyst
  • Database Administrator
  • IT Project Manager

With its wide-ranging focus, an IT degree offers flexibility in various sectors, allowing students to adapt technology solutions to business needs.

What’s the Difference Between a Cybersecurity and Information Technology Degree?

Understanding the educational requirements, skill set, salary, and job outlook associated with careers stemming from cybersecurity and information technology degrees is crucial for determining to determine which one is the right career path for you.

Both fields offer excellent opportunities within the fast-evolving tech landscape, catering to different interests and skills. Below, we'll explore the specifics of each field to help clarify their distinctions and overlaps, aiding in a more informed decision-making process.

Three cyber security students are engaged in a collaborative study session

Education Requirements

A career in cybersecurity typically begins with obtaining a bachelor's degree in cybersecurity , which serves as the foundational entry point into the field. Such programs are designed to equip students with essential skills in network security, cryptography, and ethical hacking, so they can incorporate practical experiences in information security, systems protection, and vulnerability assessment.

For those who may not wish to commit to a full degree, a minor in cybersecurity offers a valuable supplement to majors in computer science or information technology, providing specialized knowledge in cybersecurity measures, threat detection, and data protection strategies.

For those eager to learn more and grow their career, graduate degrees, such as a master's degree in cybersecurity or Ph.D., allow for deeper specialization and are geared toward those seeking leadership roles. These graduate programs cover advanced topics such as forensic computing, advanced cryptography, and cyber operations, preparing students for roles that require a high level of expertise in protecting organizations from cyber threats.

The educational pathway into IT often begins with a bachelor's degree in computer science , a versatile foundation for various IT careers. Another option is a bachelor's in information technology, which zeros in on the practical applications of technology within business settings. Such degrees impart a broad understanding of computing technology, covering essential areas such as programming, software engineering, algorithms, and data structures. Students also have the option to specialize in more focused areas like network security or database management, depending on their interests and career aspirations.

While both fields offer pathways for specialization at the graduate level, their focus distinctly differs. Cybersecurity education concentrates on security aspects, equipping students with the skills to defend against cyber threats and manage security technologies. In contrast, IT education offers a broader technological curriculum, focusing on developing skills to design, implement, and effectively manage technology solutions that enhance and support business operations.

Skill Set Requirements

Both fields require a strong foundation in analytical thinking, problem-solving, and technical proficiency. However, the specific skills cultivated through each degree program are tailored to meet distinct career goals and industry demands, enabling graduates to thrive in targeted roles within the expansive landscape of technology and security.

In cybersecurity, the skill set is deeply rooted in the defense and protection of digital environments. These specialized skills and qualities are critical in identifying and responding to cyber threats and typically include: 

  • Ability to identify unauthorized access and potential breaches in networks.
  • Skills in creating software applications that are secure from the design phase to deployment.
  • Expertise in applying cryptographic methods to secure data during transmission, storage, and processing.
  • Proficiency in assessing potential risks to information systems and implementing strategies to mitigate these risks.

Conversely, the skill set for IT is oriented towards the creation, management, and effective operation of information systems:

  • Skills in setting up, configuring, and maintaining networks.
  • Expertise in managing databases, including storage, modification, and extraction of data.
  • Ability to provide support and quickly resolve technical issues to minimize downtime and maintain business productivity.
  • Skills in integrating various technological systems and software to work seamlessly together.

Salary and Job Outlook

Both cybersecurity and IT fields offer excellent financial rewards and career growth opportunities, yet their market demands and specific job trajectories present unique advantages.

Cybersecurity is becoming increasingly vital as digital threats continue to evolve and multiply. This surge in demand is mirrored by the U.S. Bureau of Labor Statistics' projection of 32% employment growth for information security analysts from 2022 to 2032—a rate much faster than the average for all occupations. This means an addition of 16,800 new job openings every year during the decade. The high demand for cybersecurity professionals is also reflected in their compensation, with an estimated average annual salary of $120,360 . 

Information Technology, on the other hand, encompasses a broader range of systems-oriented opportunities and is essential across virtually all sectors. The IT field is expected to see substantial growth, with the BLS projecting about 377,500 new openings each year through 2032 due to employment growth and the need to replace workers. The median annual wage for IT occupations stands at $104,420. This lucrative compensation highlights the enduring demand for IT expertise that drives continual business innovation and efficiency.

What to Consider Before Choosing Your Major?

Choosing between majors like cybersecurity and information technology—or any field—requires a thoughtful assessment of what best aligns with one's personal interests, professional goals, and lifestyle needs.

Cyber security students are studying together at the campus library

Your Interests and Your Goals

So, firstly, selecting a major that resonates with your passions and career objectives is essential for long-term satisfaction and success. Consider the story of Julia Dewhurst , who transferred to UND and chose cybersecurity because it matched her love for problem-solving and her desire to protect people's data. Her experience at UND, where she found a community through the Society of Women Engineers, illustrates the importance of environment and support in higher education. 

Julia's involvement in campus life transformed her from a shy newcomer into a well-rounded, outgoing individual, showcasing how the right program can not only build your skills but also enrich your personal growth and professional network.

The Program’s Flexibility

Flexibility in a degree program is another crucial factor, especially for students who need to balance academic responsibilities with personal commitments. Programs that offer both online and on-campus options provide the necessary versatility.

At UND, for example, both the cybersecurity and computer science bachelor's degree programs are available online and on campus. This flexibility allows students to tailor their education to fit their lives, ensuring they don't have to sacrifice personal obligations to advance their careers.

Salary Expectations

Finally, consider the financial aspect of your chosen field. Evaluating the return on investment (ROI) of your education is important, as it impacts your economic stability post-graduation. Fields like IT and cybersecurity not only offer intellectually fulfilling careers but also promise strong salary prospects, which can justify the initial cost of education. Understanding the potential earnings in your chosen field can guide you in making an informed decision about which major to pursue.

All in all, the main distinction between IT and cybersecurity lies in their focus: IT covers a broad spectrum of technology applications and system management, ensuring that infrastructures work seamlessly. In contrast, cybersecurity focuses on protecting these systems from threats and unauthorized access. 

Regardless of whether your passion lies in safeguarding digital assets or managing diverse technological operations, UND offers programs tailored to both career paths. Explore UND's programs and choose to catch cyber threats or connect systems.

What are the benefits of pursuing a degree in information technology? ( Open this section)

Pursuing a degree in information technology provides versatile skills applicable in nearly every industry, leading to diverse career opportunities with strong salary potentials.

How long does it typically take to complete a cybersecurity or information technology degree? ( Open this section)

Typically, a bachelor's degree in cybersecurity or information technology takes about four years to complete, with accelerated and part-time options available.

Is a cyber security degree worth it? ( Open this section)

Absolutely, a cybersecurity degree is highly valuable. It offers the expertise needed to protect critical information infrastructures and has the potential for high salaries and job growth.

Is it possible to transition from a cybersecurity degree program to an information technology program or vice versa? ( Open this section)

Yes, transitioning between cybersecurity and information technology programs is possible, especially early in the educational journey, as both fields share foundational tech courses.

By clicking any link on this page you are giving your consent for us to set cookies, Privacy Information .

  • The Graduate School >
  • Graduate News >

Financial cybersecurity expert to speak at UB

Published March 16, 2023

Cybersecurity is vital for organizations to maintain the integrity of their financial data and meet regulatory requirements, and this spring, the School of Management is hosting Dave Burg, cybersecurity leader at EY Americas, for a free lecture.

Presented by the school’s Helen and Oscar Sufrin Lectureship in Accounting, Burg’s talk — titled “Cybersecurity Issues and Implications for Financial Reporting” — will take place at 5:45 p.m. March 29 in 225 Natural Sciences Complex, North Campus.

Financial markets and investors continue to view cybersecurity as critical to the integrity of business processes and the underlying financial information, making Burg’s lecture particularly timely for accounting students and professionals.

Burg is an expert on practical issues related to cybersecurity. In his role at EY, one of the Big Four accounting firms, he assists clients in reactive and proactive consulting capacities involving the deployment of information technology solutions and their use.

He regularly contributes to, and has been quoted in, a variety of business and industry journals, and presents on a wide range of topics at global corporations, law firms, industry events and government agencies; he has lectured at NYU’s Stern School of Business, Georgetown University and Penn State University.

Open to the public, the free lecture will be followed by a Q&A. Advance registration is required by March 27. For more information, contact Cassie Nguyen , clinical assistant professor of accounting and law.

The Helen and Oscar Sufrin Lectureship in Accounting brings distinguished business professionals to the School of Management to speak about accounting issues. Funding is provided through the generous support of Leslie Sufrin and Gerald Sufrin, a longtime UB faculty member, in honor of their late parents.

Student Learning Outcomes — A student with a Graduate Certificate in Cybersecurity will use the knowledge and skills obtained in the program to:

  • Design, implement and analyze an organization’s information security policies.
  • Design, implement and deploy cybersecurity solutions for protecting an organization’s information resources.
  • Identify the appropriate cryptographic algorithms and protocols to be deployed in the context of an organization’s security policy.
  • Design and implement secure software.
  • Adapt to a dynamic multidisciplinary technological environment through teamwork, ethical concerns, and effective communication.

This program is designed to prepare graduates with most essential advanced skills in Cybersecurity. The graduates from the program can apply these skills to protect resources in the cyber domain.

Admission Requirements — Admission is granted on the basis of applicant’s academic aptitude and potential which will be evaluated through academic record and/or work experience. To be admitted to the program:

  • A student must have an undergraduate degree in computer science or a related discipline. Applicants who have degrees in some non-computing fields will also be considered for admission provided they have completed at least one programming course with a grade of B or better.
  • A student must have a minimum undergraduate grade point average (GPA) of 2.80.

Required Graduate Courses: 15 Semester Hours

  • CYBR 5310 - Design of Cryptographic Algorithms and Protocols (3)
  • CYBR 5720 - Cybersecurity Policies and Risk Management (3)
  • CYBR 5820 - Introduction to Information Assurance (3)
  • CYBR 5840 - Ethical Hacking (3)
  • CYBR 5940 - Threat Intelligence and Incident Response (3)

Minimum Graduate Hour Total: 15 Semester Hours

  • Tata Steel share price
  • 174.85 -0.37%
  • HDFC Bank share price
  • 1,530.50 0.17%
  • ITC share price
  • 428.90 -0.60%
  • State Bank Of India share price
  • 830.90 -0.38%
  • Infosys share price
  • 1,466.20 -0.37%

Back

Top 10 Cyber Security Courses

Iiitb offers advanced executive program to train cybersecurity leaders. snhu provides bsc cyber security program, while fullstack academy offers cybersecurity analytics bootcamp for immersive learning experience..

IIITB offers Advanced Executive Program to train cybersecurity leaders.

In today's digital era, cybersecurity is critical, with Nasscom projecting one million new cybersecurity jobs by 2027. However, 30% of these positions remain unfilled due to a lack of skilled professionals. The rapid digital evolution highlights the need for experts in cloud security, AI, IoT, and risk management. Closing this talent gap requires academic, industry, and government collaboration to train a new generation of cybersecurity professionals. Enrolling in an Advanced

Executive Program in Cybersecurity allows individuals to become leaders in fighting cybercrime, regardless of their background. To simplify decision-making, we've ranked the top 10 cybersecurity courses , helping aspirants narrow their choices and find the ideal course to advance their careers.

1. Advanced Executive Program in Cybersecurity from IIITB 

2. Bachelor of Science Cyber security

3. Cybersecurity Analytics Bootcamp

4. Executive Education in Cybersecurity Engineering

5. Professional Certificate Program In Cybersecurity- Red Team

6. Talentsprint e-Masters Degree program in Cybersecurity

7. Post Graduate Certificate in Cybersecurity

8. BSc (H) in Advanced Networking & Cyber Security

9. Jaro Education's PG Certificate Programme in Cyber Security Management and Data Science

10. Great Learning Post Graduate Programme in Cyber Security

Methodology used-

  • Curriculum Depth: The content and skills covered in the program.
  • Interactive Hands-on Learning: Assessing learning interactivity and practical application, focusing on using real-world tools and solving industry problems.
  • Program Recognition: Assessment of the program's reputation, accreditation status, and recognition within the industry and academic communities.
  • Industry Engagement: Consideration of the program's connections with industry professionals, internship opportunities, and alignment with current industry practices and trends.

While Fullstack Academy offers Cybersecurity Analytics Bootcamp for immersive learning experience.

Here are the details of specific programs, institutes/courses you may choose from -

  • Advanced Executive Program in Cybersecurity from IIITB 

Join the top-ranked Simplilearn Advanced Executive Program in Cybersecurity, partnered with IIIT Bangalore , the World’s No. 1 Online Bootcamp in 2021. IIITB, a leader in IT education, , driving India's digital payment revolution, collaborate to offer immersive learning with real-world applications. Perfect for career changers seeking a rewarding path in cybersecurity.

Course Highlights:

● Mode of Learning : Online Bootcamp

● Course Duration : 6 months

● Program Recognition : Advanced Executive Program in Cybersecurity completion certificate from IIIT Bangalore.

● Job Assistance : Simplilearn's JobAssist helps you get noticed by top hiring companies.

● Hands-on Learning : 8+ hands-on projects aligned to various industry verticals.

● Skills covered : Ethical Hacking, Penetration Testing, Defensive Cybersecurity, Cryptography, Ransomware Analysis, Malware Analysis, Enterprise Security, Network Concepts, Threat Hunting, Application Security

● Program Advisors : Guidance and mentorship from industry experts and seasoned professionals in the field of cybersecurity, offering valuable insights and support throughout the program.

● Fees : ₹ 1,54,999 (incl taxes)

2. Bachelor of Science Cyber security-

SNHU's online Bachelor of Science in Cyber Security program equips students with skills to safeguard businesses in today's data-driven landscape. Study flexibly from home with 24/7 access to virtual classrooms. Engage with teachers through weekly Live Sessions and support sessions to enhance learning.

● Mode of Learning : Online

● Course Duration : 4 years

● Program Recognition : Degree from New England Commission of Higher Education (NECHE), a regionally U.S. accredited university.

● Tools Covered : Windows, Linux, Cisco Packet Tracer, GNS3, pfSense, programming languages such as Python, Java, Linus shells, Microsoft PowerShell, OpenVAS, Snort, Kali Linux and Metasploit.

● Program Advisors : Learn from Indian professors with advanced degrees and relevant field experience.

3.Cybersecurity Analytics Bootcamp-

Fullstack Academy Cybersecurity Bootcamp, the oldest bootcamp provider, offers a highly immersive and interactive learning experience. You'll attend live online classes, interacting with experts and a diverse group of classmates.

● Course Duration : 12-26 weeks

● Program Recognition : Fullstack Academy certification.The curriculum also integrates preparation for the CompTIA Security+ exam.

● Tools covered : Kali Linux, Command Line, Python, Wireshark, Bash, Nmap, Metasploit and Meterpreter

● Program Advisor : Gain insights from instructors with industry expertise. Tap into alumni network and career assistance, propelling graduates into roles at leading companies such as Accenture and the IRS.

● Fees : $14,995

4.Executive Education in Cybersecurity Engineering -

PES Executive Education in Cybersecurity Engineering offers flexible programs: certificate for newcomers, PG Diploma for non-engineering backgrounds, and a master's for engineering and CS graduates. The six-week program includes instructor-led classes, videos, quizzes, assignments, labs, and real-world case studies.

● Mode of Learning : Offline

● Course Duration : 6 weeks

● Skills covered : Data Structure and Algorithm Using C, Operating Systems, System Programming and Bash Scripting, Computer Networks, Web Technologies and Python Programming

● Program Advisors : Courses are led by experienced faculty from PESU and Industry experts.

Prerequisite Semester Program Fees (For non-engineering candidates) ₹ 1,00,000

Masters Program Fees ₹ 6,00,000 ( ₹ 1,50,000 per semester, 4 instalments)

PG-Diploma Program Fees ₹ 1,50,000 per semester

Audit Semester Program Fees ₹ 1,50,000 per semester

5.Professional Certificate Program In Cybersecurity- Red Team –

Enroll in the Cybersecurity-Red Team Professional Certificate Program by IIT Kanpur and Simplilearn. Gain hands-on skills to analyze threats, secure systems, and advance your career. Benefit from masterclasses, industry projects, and JobAssist for job placement. Stay updated with live sessions on AI trends.

  • Mode of Learning : Online Bootcamp
  • Course Duration : 6 months
  • Program Recognition : Professional Certificate Program in Cybersecurity- Red Team completion certificate from IIT Kanpur.
  • Job Assistance : Simplilearn's JobAssist helps you get noticed by top hiring companies.
  • Hands-on Learning with a capstone on industry-relevant use cases.
  • Skills covered : Ethical Hacking, Cryptography Concepts, DS Firewalls and Honeypots, Network Security, Vulnerability Assessment, Penetration Testing, Reconnaissance, Web App Threats, Generating Payload, Exploiting and Gaining Access, Anonymity Concept
  • Program Advisors : Guidance and mentorship from industry experts and seasoned professionals in the field of cybersecurity, offering valuable insights and support throughout the program.
  • Fees : ₹ 1,45,000 (incl taxes)

6.Talentsprint e-Masters Degree program in Cybersecurity -

The program is in partnership with IIT Kanpur. This fully online program provides a flexible learning environment, enabling working professionals to enhance their expertise in cybersecurity without compromising their current commitments.

● Course Duration : 3 years

● Program Recognition : eMasters Degree from IIT Kanpur

● Hands-on Learning : AI-powered iPearl.ai online LIVE and self-paced sessions.

● Program Advisors : Receive mentorship and career support from the IIT Kanpur placement cell

● Fees : ₹ 8,00,000

7. Post Graduate Certificate in Cybersecurity -

MIT xPRO's course is tailored for mid to senior-level IT professionals and graduates aiming to specialize in cybersecurity. This immersive program covers defensive and offensive techniques.

Course highlights:

● Mode of Learning: Online

● Course Duration: 10 months

● Program Recognition: A certificate from MIT xPRO on successful completion

● Hands-on Learning : Insights and case studies from renowned MIT faculty.

● Tools covered: Kali, Metasploit, Nikito, Cain and Abel, Wireshark

● Program Advisors: capstone project detailing the Equifax data breach of 2017 and associated events.

● Fees: ₹ 2,87,000

8. BSc (H) in Advanced Networking & Cyber Security –

Brainware University offers the BSc (H) in Advanced Networking & Cyber Security, providing students with the knowledge and skills to excel in the dynamic field of cybersecurity.

Course highlight-

● Program Recognition: EC-Council Academia

● Hands-on Learning : RedHat Academy, CISCO, Webskitters, DPCL Tech

● Program Advisors : Knowledge partnering with TCS IoN and Academic collaboration with IEEE (student chapter)

● Fees : ₹ 3,72,600

9. Jaro Education's PG Certificate Programme in Cyber Security Management and Data Science -

The program, offered by IIM Nagpur (Established in 2015), combines data science and cybersecurity to develop data-driven security protocols.

Course highlights-

● Course Duration: 12 months

● Program Recognition: PG Certificate Programme in Cyber Security Management and Data Science" by IIM Nagpur.

● Hands-on Learning: Live classes by highly experienced faculty from IIM Nagpur

● Fees: ₹ 2,00,000/- + GST

10. Great Learning Post Graduate Programme in Cyber Security -

The Post Graduate Programme in Cyber Security, in collaboration with Great Lakes, provides a robust certification for career advancement in cybersecurity.

● Program Recognition : PG certificate in Cyber Security by Great Lake Executive Learning

● Hands-on Learning : Industry-ready curriculum, Live expert mentorship, 8 Hands-On lab activities, 2-week capstone project, CompTIA Security+ exam prep

● Tools covered : Palo Alto Firewall, Nessus, Azure Security Centre, Azure Sentinel, Metasploit, WAZUH, Ransim: Ransomware Simulator, Autopsy Forensics, Wireshark, NMAP, Recon-NG.

● Fees : ₹ 1,25,000

Having comprehensive knowledge and trusted guidance on institutes offering cybersecurity courses in India is crucial, as this selection emphasizes. Now is the time to distinguish yourself from the crowd, as many employers seek trained and skilled Cybersecurity professionals.

Disclaimer: This article is a paid publication and does not have journalistic/editorial involvement of Hindustan Times. Hindustan Times does not endorse/subscribe to the content(s) of the article/advertisement and/or view(s) expressed herein. Hindustan Times shall not in any manner, be responsible and/or liable in any manner whatsoever for all that is stated in the article and/or also with regard to the view(s), opinion(s), announcement(s), declaration(s), affirmation(s) etc., stated/featured in the same.

Milestone Alert! Livemint tops charts as the fastest growing news website in the world 🌏 Click here to know more.

You are on Mint! India's #1 news destination (Source: Press Gazette). To learn more about our business coverage and market insights Click Here!

footLogo

Wait for it…

Log in to our website to save your bookmarks. It'll just take a moment.

You are just one step away from creating your watchlist!

Oops! Looks like you have exceeded the limit to bookmark the image. Remove some to bookmark this image.

Your session has expired, please login again.

Congratulations!

You are now subscribed to our newsletters. In case you can’t find any email from our side, please check the spam folder.

userProfile

Subscribe to continue

This is a subscriber only feature Subscribe Now to get daily updates on WhatsApp

close

Open Demat Account and Get Best Offers

Start Investing in Stocks, Mutual Funds, IPOs, and more

  • Please enter valid name
  • Please enter valid mobile number
  • Please enter valid email
  • Select Location

I'm interested in opening a Trading and Demat Account and am comfortable with the online account opening process. I'm open to receiving promotional messages through various channels, including calls, emails & SMS.

Thanks

The team will get in touch with you shortly

Common Searches

  • M.S. in Cybersecurity with Computer Science Emphasis

Explore this section

  • About Us People Administration Contact Department History Mission Statement
  • Undergraduate Studies Degree Programs Computer Science Course Descriptions Course Rotation InfSys Preapproved Electives
  • Graduate Studies Degree Programs Graduate CS Course Descriptions Course Rotation
  • Certificates Undergraduate Certificates Graduate Certificates
  • Research Major Research Areas Sponsored Projects Research Faculty Publications
  • Career Outlook
  • News and Events News and Events Spencer Talks UMSL Computer Science people listed among top 2% world scientists. Articles in the News Announcements for Cybersecurity
  • Alumni Advisory Council Department Alumni Donors and Contributors Information for Alumni Recent PhDs Update Your Information
  • Scholarships and Opportunities Departmental Scholarships Job Opportunities Recent Awards
  • Computer Science
  • Graduate Studies

Note: Program replaced starting fs24 by an updated version . Students who started under this program can graduate under this program or choose  the new program for graduation requirements. Consult your admisor.

The program will allow graduates to pursue high-demand work roles such as Cybersecurity Specialist, Cyber Defense Analyst, Cyber Defense Incident Responder, Information Security Analyst, Vulnerability Assessment Analyst, Security Architect, among a variety of other entry to mid-level cybersecurity and computing related roles. The Computer Science emphasis is housed on the department of Mathematics and Computer Science and it focuses on more technical aspects of the field.

The entire program can be completed in the evening, and students starting now will be able to complete the program online. Thirty credit hours (ten courses) are required for graduation . Applicants must meet the general graduate admission requirements of the Graduate School . Those with bachelor’s degrees outside of cybersecurity or computer science must demonstrate significant proficiency as outlined in admission requirements using either prior coursework or experience. Applicants can be admitted with some deficiencies, which would need to be addressed by taking additional coursework. Applicants new to Computer Science and Cybersecurity are encouraged to take a few of the admission requirements courses before reapplying.

Students can group elective courses of interest and earn one of the available certificates with or without extra coursework.

Program Director:  Abderrahmen Mtibaa

Admissions Requirements

Degree Requirements

UMSL Cybersecurity

Related Links

  • TAKE A TOUR
  • FINANCIAL AID
  • ALUMNI AND FRIENDS

IMAGES

  1. IEEE SA

    phd cybersecurity

  2. Novel PhD Research Proposal in Cyber Security [Research Guide]

    phd cybersecurity

  3. Inauguration of the PhD in Cybersecurity

    phd cybersecurity

  4. 10 Best PhD Cyber Security Online Programs [2024 Guide]

    phd cybersecurity

  5. Program Overview for Ph.D. in Cybersecurity Management

    phd cybersecurity

  6. Best online PhDs in cyber security for 2021

    phd cybersecurity

VIDEO

  1. Msc,PhD cybersecurity Scholarship: Application, Study & Work Life Balance

  2. IITGN PhD Diaries

  3. Cybersecurity scholarship program

  4. Exactly What A GRC Analyst Does (Plain Talk)

  5. Cybersecurity Careers In 2024

  6. 10 Essential Steps to Break into Cybersecurity

COMMENTS

  1. List of Cybersecurity PhD Programs

    Learn about the benefits, trends, and challenges of pursuing a PhD in cybersecurity. Find out the best programs, tuition costs, and how to prepare for a doctoral degree in this dynamic field.

  2. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    Learn about the different types of cybersecurity doctoral degrees, admission requirements, coursework and potential career paths. A Ph.D. in cybersecurity prepares graduates for advanced roles in research, education and management across emerging technologies.

  3. Cybersecurity, PhD Degree

    A research-based, interdisciplinary PhD program that combines security technical foundation with policy and social sciences perspective. Learn from faculty experts, access research projects, and gain industry experience through co-op or experiential learning.

  4. Doctor of Philosophy in Cybersecurity (PhD-CY)

    The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours. *Students select one pair of research methods and directed research courses based on their own research proposal.

  5. Cybersecurity, PhD

    Cybersecurity, PhD. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and ...

  6. List of Online Cybersecurity PhD Degree Program Options

    All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.

  7. Doctoral Degrees in Cybersecurity

    New Skills: Cybersecurity doctoral students learn advanced computer science theory and skills, including risk management, software and network security, digital forensics, and cryptography. Increased Earning Power: Earning a graduate degree in cybersecurity can help you earn higher salaries and/or qualify for promotions.

  8. Computer Science (Cybersecurity), PhD

    The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance. The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including ...

  9. Cybersecurity

    Learn how to advance the reliability and security of cyberspace as a researcher, faculty member, or policy advisor. This program involves diverse disciplines and collaborations, and offers online application and fee, statement of purpose, resume, letters of recommendation, and proof of English proficiency.

  10. PhD in Cybersecurity

    The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design ...

  11. Ph.D. in Cybersecurity Management

    A graduate with a Ph.D. in Cybersecurity Management will have the ability to: acquire advanced knowledge and deeper understanding of the field of information assurance; communicate professionally and ethically about information assurance research issues; identify, analyze, and synthesize scholarly literature related to the field of information ...

  12. Top 10 Best Programs for a PhD in Cyber Security

    Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.

  13. Doctoral Degrees in Cybersecurity

    What To Expect From a Doctorate in Cybersecurity Program. Because cybersecurity is a subfield of computer science, these cybersecurity doctoral programs focus on advanced topics such as information assurance, research methodologies, professional ethics, and leadership.Program lengths vary, but learners usually finish their cybersecurity doctorate in 3-7 years, with an average load of 60 credits.

  14. Information Science Ph.D. With a Concentration in Cybersecurity

    The UNT Information Science Ph.D. program responds to the varied and changing needs of the information age by offering the Cybersecurity concentration, offered jointly with UNT Department of Computer Science and Engineering, and UNT Department of Information Technology and Decision Sciences with the ultimate goal of providing interdisciplinary training, research and professional services in ...

  15. Online PhD in Cybersecurity

    PhD in Cybersecurity Program Outcomes. Formulate solutions to cybersecurity problems. Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale. Manage legal, ethical, and security risks in technology-based systems. Explain concepts and arguments associated with cybersecurity.

  16. PhD in Cyber Security Programs 2024+

    A Doctor of Philosophy in Cyber Security (PhD) is a terminal degree path, meaning it is the final component of education in this field of study. It is typically accessible to students who have completed a bachelor's degree and, in some cases, completed a master's degree. This program often provides students with access to more insight and ...

  17. Online Doctorate in Cybersecurity

    The Doctor of Computer Science with a concentration in Cybersecurity and Information Assurance (DCS-CIA) is a 100-credit-hour terminal degree in computer science. The program includes 40 credit hours of core management courses, 20 credit hours of cybersecurity and information assurance concentration courses, 4 credit hours of symposium-related ...

  18. Cybersecurity

    Doctor of Philosophy (PhD) in Cybersecurity. A research-based, interdisciplinary PhD in cybersecurity spans theory and systems, from hardware to software security, from cryptography to policy, and from malware to wireless security. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet ...

  19. PhD in Computer Science

    PhD in Computer Science. The Tandon School of Engineering offers a PhD in Computer Science. Cybersecurity is a particular research strength of the program. Learn more and apply to the PhD in Computer Science through the Tandon School of Engineering.

  20. Cybersecurity MPhil/PhD

    Cybersecurity MPhil/PhD. London, Bloomsbury. It has long been recognised that cybersecurity is a 'wicked problem' - one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

  21. Cybersecurity

    Harvard Graduate School of Design Harvard Graduate School of Education Harvard John A. Paulson School of Engineering and Applied Sciences ... Students enrolled in the Master of Liberal Arts program in Cybersecurity will build a strong foundation in security, privacy, and cryptography. They will acquire knowledge and skills to plan, manage, and ...

  22. Cyber Defense Doctor of Philosophy (PhDCD)

    This degree complements our PhD in Cyber Operations and fits tightly with our strategic priorities and initiatives. Our graduates obtain careers in private industries, government agencies, the military, and academia. We have a recognized excellence in cyber security, education, and research that is central to our mission.

  23. Cybersecurity (D.Sc.)

    The D.Sc. in Cybersecurity program teaches candidates higher-order thinking and diversity of thought surrounding current and future cybersecurity issues, such as exploration of new technology, the role of artificial intelligence, and research to develop expertise in an area of cybersecurity of their choice. While available online and in person ...

  24. Is a Cybersecurity Degree Worth It?

    Stable employment is another potential benefit of earning a degree in cybersecurity. BLS data shows that in 2023, master's degree holders had an unemployment rate of just 2%, while bachelor's degree holders experienced 2.2% unemployment.*. Workers with a high school diploma, on the other hand, had unemployment rates of 3.9%, according to BLS.*.

  25. MS in Cybersecurity at the University of Denver

    Program Overview Flexibly designed to advance your career goals. The University of Denver is recognized by the National Security Agency and the Department of Homeland Security as a Center for Academic Excellence in Cyber Defense (CAE). As a graduate of a CAE institution, employers will trust that you have received a high-quality education and are prepared for the job.

  26. IT vs. Cyber Security Degree: What's the Difference?

    A cybersecurity degree focuses on protecting information systems, networks, and data from cyber threats and attacks. This field, more specific than general IT, arms students with knowledge and tools to combat hackers, secure networks, and ensure the privacy and integrity of sensitive information.

  27. Financial cybersecurity expert to speak at UB

    Financial cybersecurity expert to speak at UB. Cybersecurity is vital for organizations to maintain the integrity of their financial data and meet regulatory requirements, and this spring, the School of Management is hosting Dave Burg, cybersecurity leader at EY Americas, for a free lecture. Presented by the school's Helen and Oscar Sufrin ...

  28. Cybersecurity Graduate Certificate (50-G01) (15 hours)

    Student Learning Outcomes — A student with a Graduate Certificate in Cybersecurity will use the knowledge and skills obtained in the program to: Design, implement and analyze an organization's information security policies. Design, implement and deploy cybersecurity solutions for protecting an organization's information resources.

  29. Top 10 Cyber Security Courses

    7. Post Graduate Certificate in Cybersecurity. 8. BSc (H) in Advanced Networking & Cyber Security. 9. Jaro Education's PG Certificate Programme in Cyber Security Management and Data Science. 10 ...

  30. M.S. in Cybersecurity with Computer Science Emphasis

    Applicants must meet the general graduate admission requirements of the Graduate School. Those with bachelor's degrees outside of cybersecurity or computer science must demonstrate significant proficiency as outlined in admission requirements using either prior coursework or experience. Applicants can be admitted with some deficiencies, which ...