• Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

PhD Graduate Education at Northeastern University logo

This program engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities. It prepares students from diverse backgrounds and interests to advance the reliability and security of cyberspace as researchers, faculty members, and policy advisors.

In addition to focusing on using technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

Our program is affiliated with the International Secure Systems Lab , a collaboration between European and US researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues. We are also the lead institution in the ALERT Center , a multi-university Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

  • Admitted PhD students are guaranteed full tuition scholarship and are supported with stipends or fellowships for the first five years of their program
  • Northeastern University has been designated by the National Security Agency and the U.S. Department of Homeland Security as a Center of Academic Excellence in Information Assurance/Cyber Defense, in IA Research, and in Cyber Operations
  • Boston area is home to some of the nation’s largest Department of Defense contractors as well as prestigious government and independent labs, such as MIT Lincoln Lab, MITRE, and Draper Lab
  • Interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs and makes it unique in the Boston area

Application Materials

  • Online application and fee
  • Unofficial undergraduate/graduate transcripts (you can submit official transcripts from all colleges/universities attended at the time of admission)
  • Statement of purpose that should include career goals and expected outcomes and benefits from the program
  • Recent professional resume listing detailed position responsibilities
  • Three confidential letters of recommendation
  • GRE Test Scores Optional for 2022-23
  • Degree earned or in progress at an U.S. institution
  • Degree earned or in progress at an institution where English is the only medium of instruction
  • Official exam scores from either the TOEFL iBT, IELTS, or  PTE exam
  • Applicants seeking enrollment prior to the Fall 2023 term should apply through this  link .

Application

Applicants must submit the online application and all required admission materials no later than the stated deadlines to be considered for admission. Admissions decisions are made on a rolling basis.

Applicants are reviewed annually for admission to the Fall Term:

  • December 15

Applicants seeking enrollment prior to the Fall 2023 term should apply at the link under application materials below.

  • Program Website

Request Information for PhD in Cybersecurity

a student listens to a lecture

PhD in Cybersecurity

The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

  • Explore plan of study
  • View program requirements
  • How to apply
  • Request info

phd cybersecurity

PhD students at Khoury College gain deep knowledge and invaluable experience—preparing them for a career in academia as well as research.

phd cybersecurity

Our flagship campus in Boston is just minutes away from esteemed universities, exciting start-ups, and leaders in tech, finance, health care, and more.

phd cybersecurity

Research Projects

December 15, 2023

Khoury Graduate Admissions Team

  • Financial support

January 1, 1066

January 1, 1492

Khoury Align Admissions Team

  • How to Apply
  • Cost & Financial Aid

Northeastern University - Khoury College of Computer Sciences

Khoury Social

Khoury College youtube link

Contact Khoury

phd cybersecurity

I'm seeking information for

phd cybersecurity

Northeastern University

Academic Catalog 2023-2024

  • Cybersecurity

Students can apply for admission to two distinct degree programs.

Doctor of Philosophy (PhD) in Cybersecurity

A research-based, interdisciplinary PhD in cybersecurity spans theory and systems, from hardware to software security, from cryptography to policy, and from malware to wireless security. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and government. The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Master of Science (MS) in Cybersecurity

An industry-focused, interdisciplinary Master of Science in Cybersecurity combines knowledge of information security technology and cybersecurity hands-on tools with relevant knowledge from law, the social sciences, criminology, and management. The Master of Science in Cybersecurity is designed for students focused on cybersecurity careers in companies or government agencies, thus applying their knowledge to their workplaces to assess security threats and manage information security risks and technical and policy controls.

Northeastern University designations by the National Security Agency and the Department of Homeland Security:

NSA/DHS Center of Academic Excellence in Cybersecurity—Cyber Defense Education

NSA/DHS Center of Academic Excellence in Cybersecurity—Research

NSA/DHS Center of Academic Excellence in Cybersecurity—Cyber Operations

Align Master of Science (MS) in Cybersecurity

Without exception, every organization needs to protect their information system. Every day cyber risks are becoming more complex, and the sophistication and number of threats is growing continuously. For these reasons, cybersecurity professionals need to become more prepared, with a very solid background and with the capacity to evolve and adapt to the current and future information systems challenges.

Organizations are looking for well-rounded cybersecurity professionals, who, beside their understanding of information technologies, can also comprehend the many other dimensions that contribute to effective and efficient information systems security. Professionals with diversified backgrounds are particularly interesting because they are able to provide different approaches to complex cybersecurity problems.

Align-MSCY students are perfect cybersecurity professionals, because they have proven their adaptability to the cybersecurity field and also because they bring an invaluable experience and knowledge from other areas to contribute to a global perspective of an organization's cybersecurity posture.

Doctor of Philosophy (PhD)

Master of science.

  • Cybersecurity—Align

Graduate Certificate

Cybersecurity courses.

CY 5001. Cyberspace Technology and Applications. (4 Hours)

Seeks to provide a systematic understanding of cyberspace technology and applications deployed in the global digital infrastructure. Covers topics in computer networks, server architectures, operating systems, and scripting. All the techniques and tools included in the course are oriented to serve as instruments of security administrators and cybersecurity professionals. Uses practical hands-on labs running on virtual machines and containers hosted in the cloud computing environment to train students. For that reason, a practical overview of virtualization technologies, containerization, and cloud computing models is provided.

CY 5010. Foundations of Information Assurance. (4 Hours)

Introduces information security via concepts of confidentiality, integrity, and availability. Discusses ethical, legal, and privacy ramifications while reviewing various laws, such as the Patriot Act, the Gramm-Leach-Bliley Act, and the General Data Protection Regulation. Covers security methods, controls, procedures, economics of cybercrime, criminal procedure, and forensics.

CY 5061. Cloud Security. (2 Hours)

Introduces the fundamentals of cloud computing while segueing into understanding its various security challenges, threat models, and data privacy issues in regard to compliance and legal decisions. Examines the strategies to implement security controls, perform risk assessments, handle incident detection and response, while emphasizing maintaining a business-minded security life cycle for cloud-based environments.

CY 5062. Introduction to IoT Security. (2 Hours)

Aims to provide a foundation for understanding the main issues associated with information security in a widely connected world in the context of Internet of Things (IoT). Emphasizes the vulnerabilities and threats of the IoT-based systems. Offers students an opportunity to learn the essentials of the IoT technologies and the underlying mechanisms for protecting information.

CY 5065. Cloud Security Practices. (4 Hours)

Introduces the fundamentals of cloud computing. Examines the strategies to implement security controls, perform risk assessments, and handle incident detection and response. Emphasizes maintenance of a business-minded security life cycle for cloud-based environments. Offers students an opportunity to obtain an understanding of various security challenges, threat models, and data privacy issues in regard to compliance and legal implications.

Prerequisite(s): CY 5010 with a minimum grade of C-

CY 5120. Applied Cryptography. (4 Hours)

Surveys the principles and the practices of cryptography. Overviews the core cryptographic algorithms: symmetric encryption schemes (e.g., DES and AES); public key cryptosystems (e.g., RSA and discrete logarithm); and hash functions (e.g., the SHA family). Discusses core information assurance building blocks, such as authentication, digital signatures, key management, and digital certificates. Finally, applies these concepts to important security architectures, including the IP network stack (e.g., IPsec and SSL/TLS), the cellular system, and broadcast media. Restricted to students in the College of Computer and Information Science and in the College of Engineering or by permission of instructor.

CY 5130. Computer System Security. (4 Hours)

Offers a practical overview of enterprise computer security, operating systems security, and related topics. Applies concepts such as authentication, access control, integrity, and audit to the modern operating system. Discusses and demonstrates system, process, memory, and file system-level defenses—and the attacks against them. Also discusses topics in data security and virtualization. Uses hands-on labs to reinforce skills and provide practical experience.

CY 5150. Network Security Practices. (4 Hours)

Explores issues involved in the security of computer networks. Topics include firewalls, viruses, virtual private networks, Internet security, and wireless security. Includes case studies and laboratory exercises. Restricted to students in the College of Computer and Information Science or by permission of instructor.

CY 5200. Security Risk Management and Assessment. (4 Hours)

Creates the opportunity for competency in the development of information security policies and plans including controls for physical, software, and networks. Discusses different malicious attacks, such as viruses and Trojan horses, detection strategies, countermeasures, damage assessment, and control. Covers information system risk analysis and management, audits, and log files. Uses case studies, site visits, and works with commercial products.

Prerequisite(s): CS 2550 with a minimum grade of D- or CY 2550 with a minimum grade of D- or IA 5010 with a minimum grade of C- or CY 5010 with a minimum grade of C- or graduate program admission

CY 5210. Information System Forensics. (4 Hours)

Designed to allow students to explore the techniques used in computer forensic examinations. Examines computer hardware, physical and logical disk structure, and computer forensic techniques. Conducts hands-on experiences on DOS, Windows operating systems, Macintosh, Novell, and Unix/Linux platforms. Builds on basic computer skills and affords hands-on experience with the tools and techniques to investigate, seize, and analyze computer-based evidence using a variety of specialized forensic software in an IBM-PC environment.

CY 5240. Cyberlaw: Privacy, Ethics, and Digital Rights. (4 Hours)

Describes the legal and ethical issues associated with information security including access, use, and dissemination. Emphasizes legal infrastructure relating to information assurance, such as the Digital Millenium Copyright Act and Telecommunications Decency Act, and emerging technologies for management of digital rights. Examines the role of information security in various domains such as healthcare, scientific research, and personal communications such as email. Examines criminal activities such as computer fraud and abuse, desktop forgery, embezzlement, child pornography, computer trespass, and computer piracy.

Attribute(s): NUpath Ethical Reasoning, NUpath Writing Intensive

CY 5250. Decision Making for Critical Infrastructure. (4 Hours)

Focuses on the art and science of security program management leadership in the context of critical infrastructure protection programs. Includes selected readings, review of decision-making models in crisis, lectures and insights from accomplished leaders in infrastructure protection, and examination of the students’ own unique background and experiences. Trains students on the interaction of vulnerabilities, threats, and countermeasures and how to apply this knowledge to the protection of critical infrastructure using research and analysis of national and global strategies, historical and current legislation, and policies. Also seeks to give students a working knowledge of federal, state, and private-sector critical infrastructure protection resources and programs.

CY 5770. Software Vulnerabilities and Security. (4 Hours)

Seeks to help students to become aware of systems security issues and to gain a basic understanding of security. Presents the principal software and applications used in the Internet, discussing in detail the related vulnerabilities and how they are exploited. Also discusses programming vulnerabilities and how they are exploited. Examines protection and detection techniques. Includes a number of practical lab assignments as well as a discussion of current research in the field.

CY 5976. Directed Study. (1-4 Hours)

Seeks to provide cybersecurity (CY) students with the training experience of working on a specific IA project under the direction of an CY instructor. The instructor provides students with a plan of seminar sessions, including lectures, research, and development of project deliverables and with direction to complete the course. May be repeated without limit.

CY 5984. Research. (2-4 Hours)

Offers an opportunity to conduct research under faculty supervision. May be repeated without limit.

CY 6200. Special Topics in IT Security Governance, Risk, and Compliance. (1-4 Hours)

Offers various topics in IT security governance, risk, and compliance. May be repeated for up to 8 total credits.

CY 6240. Special Topics in Privacy Law. (1-4 Hours)

Offers various topics in privacy law. May be repeated for up to 8 total credits.

CY 6720. Machine Learning in Cybersecurity and Privacy. (4 Hours)

Covers a range of theoretical and applied topics related to machine learning uses in security and privacy. Examines vulnerabilities of machine learning and deep learning algorithms and the challenges of securing these systems in real-world applications. Machine learning and AI have enabled a number of critical applications— such as machine translation, speech recognition, and precision medicine—with large positive impact to our daily lives.

CY 6740. Network Security. (4 Hours)

Studies the theory and practice of computer security, focusing on the security aspects of multiuser systems and the Internet. Introduces cryptographic tools, such as encryption, key exchange, hashing, and digital signatures in terms of their applicability to maintaining network security. Discusses security protocols for mobile networks. Topics include firewalls, viruses, Trojan horses, password security, biometrics, VPNs, and Internet protocols such as SSL, IPSec, PGP, SNMP, and others.

CY 6750. Cryptography and Communications Security. (4 Hours)

Studies the design and use of cryptographic systems for communications and other applications such as e-commerce. Discusses the history of cryptographic systems, the mathematical theory behind the design, their vulnerability, and the different cryptanalytic attacks. Topics include stream ciphers including shift register sequences; block ciphers, such as DES and AES; public-key systems including RSA, discrete logarithms; signature schemes; hash functions, such as MD5 and SHA1; and protocol schemes including identification schemes, zero-knowledge proofs, authentication schemes, and secret sharing schemes. Discusses key management problems including Needham-Schroeder protocols and certificates.

Prerequisite(s): CS 5800 with a minimum grade of C- or CS 5800 with a minimum grade of D- or CS 7800 with a minimum grade of C-

CY 6760. Wireless and Mobile Systems Security. (4 Hours)

Focuses on security and privacy of mobile and wireless systems. Provides the foundations to understand the security and privacy threats and defenses in wireless and mobile systems, especially in an era where wireless network functions are implemented in software instead of traditional hardware-based solutions. Covers topics on availability/integrity issues in wireless networks, Wi-Fi and cellular network security, broadcast authentication techniques, jamming and antijamming techniques, etc. Emphasizes hands-on practical exercises to strengthen the understanding of concepts covered during the lectures. Reviews the state of the art in wireless security research through readings. Offers students an opportunity to execute a semester-long project in the broad area of wireless security.

CY 6962. Elective. (1-4 Hours)

Offers elective credit for courses taken at other academic institutions. May be repeated without limit.

CY 7790. Special Topics in Security and Privacy. (4 Hours)

Offers various topics in security and privacy. May be repeated for up to 8 total credits.

CY 7900. Capstone Project. (4 Hours)

Draws together candidates from diverse backgrounds (technical, legal, and/or law enforcement) in a collaborative activity to address one or more security issues from an integrated perspective. Requires a project proposal, generally industrially oriented, to be submitted and accepted prior to the semester in which the project is to be undertaken.

CY 7962. Elective. (2-4 Hours)

CY 7990. Thesis. (2-4 Hours)

Offers selected work with the agreement of a project supervisor. May be repeated without limit.

CY 7995. Project. (1-4 Hours)

Offers students an opportunity to participate in a direct cybersecurity project under the supervision of a faculty member. May be repeated once for a total of 8 credits.

CY 8982. Readings. (1-8 Hours)

Offers selected readings under the supervision of a faculty member. May be repeated without limit.

CY 9000. PhD Candidacy Achieved. (0 Hours)

Indicates successful completion of program requirements for PhD candidacy.

CY 9990. Dissertation Term 1. (0 Hours)

Offers selected work with the agreement of a thesis supervisor.

Prerequisite(s): CY 9000 with a minimum grade of S

CY 9991. Dissertation Term 2. (0 Hours)

Offers dissertation supervision by members of the department.

Prerequisite(s): CY 9990 with a minimum grade of S

CY 9996. Dissertation Continuation. (0 Hours)

Continues work with the agreement of a thesis supervisor.

Prerequisite(s): CY 9991 with a minimum grade of S or Dissertation Check with a score of REQ

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2023-24 Undergraduate Day PDF

2023-24 CPS Undergraduate PDF

2023-24 Graduate/Law PDF

2023-24 Course Descriptions PDF

PhD in Computer Science

The Tandon School of Engineering offers a PhD in Computer Science. Cybersecurity is a particular research strength of the program. Learn more and apply to the PhD in Computer Science  through the Tandon School of Engineering.

Cybersecurity Guide

Research with impact: Find online cybersecurity PhD programs

In this guide

  • 2024 rankings
  • Steps to get an online PhD
  • Financial assistance
  • Career paths
  • School listings

The digital landscape is changing, and so is higher education. Online PhD programs in cybersecurity are not just trending, they’re revolutionizing the way we cultivate experts in the field.

Whether you’re a student eyeing advanced studies or an institution looking to expand your curriculum, discover why an online PhD in cybersecurity degree is becoming the go-to option for next-level learning and expertise.

Programs to make the public aware of the problem and attract bright young minds to the profession are becoming more widespread and are starting to have an effect.

With the ranks of willing candidates beginning to swell, certificate, training and education programs are in great demand. The number of available degree programs offered by colleges in particular is gaining momentum .

Bachelor’s degrees have become a near necessity for new cybersecurity professionals in recent years. And higher-level positions like chief information security officers (CISOs) often require a master’s degree . 

At present, though, the need for doctorate degrees in cybersecurity is becoming evident.

High-level management positions, higher-education faculty posts, and advanced research initiatives are all growing in demand much more quickly than the numbers of candidates to fill them.

Generally speaking, most doctoral candidates will fill the rapidly expanding and critical roles of educators, consultants, and researchers.

PhD’s (doctor of philosophy degrees) and DSc’s (doctor of science degrees) are designed for these roles.

PhD’s tend to focus on theory and research, while DSc’s study research and technical expertise. With more focus on technical knowledge, DSc’s sometimes continue working directly in practical applications within the field.

On the other hand, DPS’s (doctor of professional studies degrees) are almost entirely devoted to the highest levels of training in hands-on practical knowledge and skills instead of theory and research. 

All three types of doctoral programs are now available to those wishing to advance their careers to the pinnacle of the cybersecurity field.

However, PhD is by far the most commonly offered doctoral cybersecurity degree at present, followed by DSc’s and DPS’s.

The world has a critical need for infosec practitioners, but there is also an equally essential need to expand the capacity of our educational institutions to teach new practitioners.

We also are in dire need of advanced, innovative, strategic thinkers to conduct research in the science of cybersecurity.

Best online cybersecurity PhD programs for 2024

Capella university, capitol technology university, nova southeastern university, the george washington university, mississippi state university, marymount university.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

Obtaining an online cybersecurity PhD 

Six steps for choosing an online phd cybersecurity program.

So with all of these options available, as well as a growing number of colleges offering these programs, how can one best decide which direction is right for you? Here is a quick six-step process to help.

1. Self-appraisal : Those looking to expand their knowledge and background in cybersecurity with a PhD have already succeeded in attaining lesser degrees and certifications, and likely have several years of work experience as well.

That education, and exposure to practical applications provide an excellent overall view of the infosec world. All that experience will be critical in deciding exactly which direction to explore in the next phase of a career. The biggest decisions are of two types. 

  • Are online PhD programs the right way to go, or would real-time college be a better choice? 
  • Is a future in research, education or consulting the right path? Or is work in a real-world application a better fit? Picking the correct answer to both questions will take a good bit of introspective research. And the decisions shouldn’t be made without a thorough self-inspection.

2. Admission requirements : As with any college degree, each individual institution offering it will have its own views of what a desirable PhD candidate should look like.

All require at least a BS degree, some require an MS. But there are often loose specifications as to what discipline the degrees must be in, like STEM or computer science. Other demands may include a minimum GPA threshold, usually 3.0 or higher, and GRE test scores. 

Waivers are for the GRE tests are often granted for candidates with strong academic or professional backgrounds. The rest is normally just paperwork, like a personal goal statement, personal and work references, a current resume, and college transcripts.

The primary point here is to pay attention to the requirements of each school under consideration, and whether it will necessitate more time, classwork, certifications, etc. to comply with these demands.

3. Tuition and scholarships : Unless an early career left a PhD candidate with an abundance of cash, money will always be a concern.

Obviously, tuition is the first number to check. But don’t stop with that. There are almost always alternatives for financial assistance available from the school, private scholarship sources, and sometimes government agencies attempting to increase the cybersecurity workforce.

And, of course, government-sponsored and private education loans exist .                                                                                                                            

4. School reputation, course quality and availability : To get the most return out of an investment of time and money in education, it’s always best to choose from schools with the best reputation among cybersecurity professionals.

Specific courses and available concentrations vary from one school to another. Students must therefore make sure a particular school’s special course offerings match their needs and desires. 

5. Centers for Academic Excellence in Cyber Defense : US government intelligence agencies are perhaps the organizations most interested in developing the science and resources needed to conduct the most extensive, advanced and complete cybersecurity operations anywhere.

The National Security Agency ( NSA ) and the Department of Homeland Security ( DHS ) jointly sponsor a program to promote cybersecurity education called National Centers for Academic Excellence in Cyber Defense ( CAE-CD ). NSA conducts extensive reviews and audits of colleges offering cybersecurity college degrees and designates a select few with CAE approval .

Choosing an institution approved by the NSA provides a high level of certainty that the program offered is of the highest quality. It will also give graduates a leg up on securing a career with federal government intelligence agencies. NSA recently published a fact sheet showing 272 CAE-CD approved institutions across the country. 

6. Dissertation research options and faculty : A critical part of any masters or doctoral degree is the dissertation. The exact topic and focus do not need to be determined at the outset of entering the program.

However, it should be possible to know that faculty members and other available resources provide the greatest knowledge, technology and other means of support for the student’s specialty. 

What to look for in an online PhD cybersecurity program

For any given doctoral candidate, enrolling in an online program offering the best and most numerous courses within the cybersecurity specialty desired may be top on the list of criteria.

One should also research the infosec faculty members at the school to determine which and how many have expertise within that students focus.

If possible, a chance to meet these faculty members may be very illuminating. Requesting the opportunity to audit one or more classes will also provide invaluable insight into how courses are structured and how close a fit the tutorial style may be.

Opting to attend a PhD program with the best possible reputation among cybersecurity professionals will help open doors when it comes time to find a post-doctoral job. 

An institution that cultivates an innovative environment and offers the latest in technological capabilities will help maximize the educational experience. It will also be of great educational benefit to attend a college that fosters consultative communications among students and faculty.

Probably the easiest variables to determine are tuition costs and the availability of school offered financial assistance, especially scholarships, grants, other offsets to student expenses.

Online PhD cybersecurity program timeline

Typically, obtaining a doctorate in cybersecurity will require between three and seven years of dedication.

The specific timeline will depend upon the individual college and the level of testing and qualification required for each student to be accepted into a program.

Coursework can take up to three years, depending in part depending upon credits earned and transferred before entering the program. Once courses have been completed, the next step is to design a research project for the dissertation. 

With a well thought out idea in hand, have a chosen faculty mentor assist with fine-tuning the scope, and then approving the research outline.

The rest is extensive research and then writing the dissertation, while all along consulting with a faculty mentor. This phase can take two or more years, sometimes in excess of five years. 

The length of time devoted to completing a dissertation will depend in part on the amount of time the candidate is able to devote to the research required.

Once the dissertation is complete, student will schedule a board review and present their research to faculty members to attain the final award of their doctoral degree.

Online PhD cybersecurity tuition and scholarships

Don’t be scared off by tuition rates at any school.

Pick the best academic environments for the degree and specialty desired first, then see what can be done to mitigate the cost.

Tuition rates

The Cybersecurity Guide team recently took a look at the 14 programs in the US that offer an online cybersecurity PhD program in order to get a better sense of what tuition looks like at these programs. All figures below are based on out-of-state tuition rates.

$32,940 is the most affordable online PhD program and its available at the University of Cumberlands.

$56,004 is the average cost of the 14 online cybersecurity PhD programs.

$85,248 is the highest tuition and is at the University of North Texas.

There are almost always several options to consider. Some schools have work-study options where students can take classes for a semester or two, then work in the industry for a time. This provides a balance of academics and practical experience, and also income to offset tuition costs.

Of course, those already working and going to school would not be able to utilize this option. 

Most frequently, scholarships, grants and fellowships will be the most accessible financial assistance vehicles.

At present, it seems most scholarships are being directed to undergraduate and graduate students, with less now available for PhD’s.

This is likely to change in coming years as demand for PhD’s is set to expand rapidly. The bulk of scholarships available for PhD candidates at present are provided through individual schools, corporate sponsors, of government agencies. 

Cybersecurity PhD career path

The very nature of doctor of philosophy degree programs means those who complete a PhD will be best suited to academic or theoretical applications of their cybersecurity expertise.

However, other times there are really interesting industry jobs available to PhD holders, especially in research-oriented companies. 

 Typically, these professionals will hold the highest of infosec management positions, such as CISO, information security director, information security manager, or the like.

But many will be destined for advanced investigative research into the cutting edge ideas and technologies being discussed and discovered in the cybersecurity world.

Others will opt for academic posts in higher education. And still others will be employed as consultants to large corporations and/or high leverage government agencies that often have not been able to hire enough cybersecurity employees to adequately satisfy their own needs, or just don’t possess the advanced capabilities that a PhD offers.

Frequently asked questions

An online PhD in cybersecurity is an advanced academic program that allows you to earn your doctorate remotely, focusing on research and expertise in cybersecurity.

Online programs offer flexibility, making it easier for working professionals to balance studies with other commitments. Plus, you can access top-tier faculty and resources from anywhere.

The duration varies but expect to spend 3-7 years, depending on the program and your pace of study.

Graduates often pursue roles in academia, research, or high-level positions in corporate cybersecurity departments.

Yes, most employers consider an online PhD in cybersecurity as valuable as an on-campus degree, provided it’s from an accredited institution.

While convenient, online programs may lack some networking opportunities and face-to-face interactions found in traditional settings.

School listings for online PhD in cybersecurity

As is any course of study, attending school through an online college affords maximum flexibility for students with demanding lives. Whether the limiting factor is work, family, health restrictions or other reasons, a flexible online doctoral program permits PhD candidates to work toward a goal on their own time. 

Below is a complete list of schools offering online PhD programs that features current and comprehensive information for an easy side-by-side comparison.

  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.

National University

  • Skills Gained: After finishing, students will know how to improve cybersecurity, set rules, find threats, and use tools to protect information.
  • Job Opportunities: Graduates can become Security Analysts, Systems Engineers, Cloud Security Experts, and more.
  • Quality Assurance: The course is recognized and approved by the Western Association of Schools and Colleges (WASC).
  • Recognition: Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense by the National Security Agency and Department of Defense.
  • Career Opportunities: The program prepares students for senior leadership roles, program development, or policy-making positions in federal agencies and the private sector.
  • Overview: Designed for individuals aiming to advance both scholarly research and their careers in the field of cybersecurity.

Colorado Technical University

  • Accreditation: CTU is recognized by the Higher Learning Commission.
  • Cost-Saving Options: There are ways to reduce fees, like military discounts, transferring credits, and scholarships.
  • Special Sessions: There's a mandatory in-person gathering called a symposium.

The University of Fairfax

  • Goals: This program is for those who want to lead, research, or make policies in cybersecurity.
  • Special Guide: They use a guide from a national institute to teach students the best ways to keep information safe online.
  • Help with Big Project: The university has a plan to help students with their final project.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

Marymount University, School of Technology and Innovation

  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.

The University of the Cumberlands

  • Jobs After Graduation: After getting a PhD in IT, students can find many job opportunities.Jobs in areas like cloud computing and cybersecurity will be in high demand.
  • Recognition: The university is known for its excellence in cybersecurity by major U.S. departments.
  • Benefits: Students can study online, so they don't have to leave their jobs. A PhD can also lead to better job chances and higher pay.

Nova Southeastern University, College of Computing & Engineering

  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.
  • Capstone Project: Students create a big project to use their new skills in real-world situations.
  • Focus on Modern IT: The course teaches current IT topics like online security and managing projects.
  • Job Opportunities: After finishing, students can aim for high-level IT jobs in various sectors.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

Walden University

  • Why Walden: The program offers one-on-one mentoring, helpful tools, real-world IT scenarios, and chances to network.
  • Jobs After Graduation: The IT field is growing. With a DIT, you can become a college teacher, computer scientist, or a top IT manager.
  • Skills Gained: You'll learn to evaluate IT methods, create IT systems, lead IT teams, communicate tech ideas, and do original research.
  • Goals: Boost organizations' ability to handle cyber threats and lead organizations in enhancing cybersecurity.
  • Classes: Held on Saturdays in a fast-paced format.
  • Structure: 24 hours of courses and 24 hours of research, including a major project (praxis) on cybersecurity.
  • Data Breaches

Ph.D. in Cybersecurity in the United States: A Comprehensive Guide For 2024

  • December 26, 2023
  • by Kevin James

Phd in cybersecurity in usa

The number of potential programs open to students interested in seeking a Ph.D. in cybersecurity is one predictor of the industry’s growth and development.

When the range of skill sets for cybersecurity practitioners evolves and expands, so do the different types of doctorate programs.

Moving outside the realm of computer science, cybersecurity experts are now receiving education in fields such as law, politics, management, and planning, among many others.

This guide is intended to provide prospective cybersecurity Ph.D. students with a comprehensive analysis of a doctorate in cybersecurity programs accessible.

It would also go through some things to think about while looking for the best Ph.D. curriculum, such as course standards and tuition costs.

Until recently, cybersecurity Ph.D. programs , like other cutting-edge technology areas, were often testing grounds for specialty positions in advanced studies, mostly for government departments (such as the CIA, NSA, and FBI), or closely adjacent research organizations or entities.

Table of Contents

Can You Have a Ph.D. in Cybersecurity?

Of course, you can!

A Ph.D. in Cybersecurity gives applicants a solid base in computer science when concentrating on advanced research in information technology security.

Data collection, program exploitation, reverse engineering, and malicious code analysis are among the techniques studied in this course.

Programming, network management, stable operating systems, software engineering, and software architecture can all be included in the class.

Students learn how to spot cybercrime and safeguard sensitive data stored on devices and servers.

Ph.D. in Cyber Security graduates are specialized in analysis methodology and develop a greater knowledge of cybersecurity issues.

Students develop their problem-solving and decision-making capabilities when they focus on different cybercrimes.

They become familiar with ideas and proficient in the skills used to tackle technical and intelligence applications.

The cost of a Ph.D. is determined by the institution’s rules, the country of study, and the duration of the degree. Learn more by calling the university’s admissions office and requesting more details, including curriculum costs.

Ph.D. in Cybersecurity graduates are specialized in analysis methodology and develop a greater knowledge of cybersecurity issues.

The cost of a Ph.D. is determined by the institution’s rules, the country of study, and the duration of the degree.

Learn more by calling the university’s admissions office and requesting more details, including curriculum costs.

Is a Ph.D. Much Harder Than a Masters?

In all honesty , yes!

It is rare to see a doctoral degree with the official designation of Ph.D. in Cybersecurity. Although many initiatives focused on cybersecurity, it is uncommon to see a program with a cybersecurity major.

Any cybersecurity and internet security programs are part of another major, such as a Master’s of Computer Science or a cybersecurity concentration.

Ph.D. in Information Assurance, Ph.D. in Information Security and a doctorate in Computer Science with a Security Focus.

The cybersecurity Ph.D. program is a research-based doctoral program that requires candidates to specialize in areas such as cyberinfrastructure, human-centered computing, and embedded devices, to mention a couple.

The Ph.D. program lasts between five and seven years. Two years are spent taking graduate courses and qualifying exams.

In comparison, the remaining three to five years are spent doing independent studies for a mandatory dissertation, which is a scientific, systematic account of the student’s work.

Cybersecurity is an interesting field for computer-savvy people who like a challenge. It is also an interesting area because there are so many career options and opportunities for advancement.

A doctorate in Cybersecurity opens doors to lucrative and rewarding jobs at the highest levels.

Is a Ph.D. in Cyber Security Worth It?

Many students interested in the fascinating world of cybersecurity wonder if a Ph.D. would benefit them if they chose this profession as a profession.

Although doctoral degrees are not necessarily needed to work in cybersecurity, getting a Ph.D. would only boost a resume and place the applicant in a position to compete for jobs that are not open to those with lesser degrees.

Cybercrime has become a serious problem in recent years, and cybersecurity experts are in high demand. Here is a rundown of what a Ph.D. in Cybersecurity means and the types of employment accessible.

Although a Ph.D. is not needed for most cybersecurity positions , it can be advantageous. The more schooling a student gets, the more job chances he or she would have after graduation.

The Ph.D. in Cybersecurity curriculum, on the other hand, is typically designed for students who choose to work in research-based positions such as college professors, business analysts, or policy advisors.

The doctoral degree program can be a complex and costly undertaking.

Students may invest more years in education, but the benefits are usually well worth it in the end.

Students learn useful business skills such as giving speeches, writing reports, working “in the box,” and how to overcome difficult problems.

Cyber and information technology are study-intensive areas, and doctoral students learn how to do successful research.

Overall, doctoral degree program graduates get decent jobs and make more money. There seems to be a near-constant scarcity of highly trained cybersecurity experts.

What Can You Do With a Ph.D. in Cybersecurity?

Suppose you are thinking of getting a doctorate in data security. In that case, you probably do not need to be reminded of the importance of information security and the problems that computer security and information assurance practitioners face.

Data breaches and cyber threats occur regularly, threatening government agencies, corporate organizations, and private lives. All indications suggest that the situation will worsen before it improves.

All have also started to be digitized: confidential documents, professional and business purchases, entertainment, correspondence – the list goes on.

Was a theoretical prospect, the Internet of Things has come for the long run, which means that by 2025, there will be 27+ billion linked “things.”

Anything from your vehicle to your house, which means 27 billion more possible vulnerabilities for cybersecurity professionals.

To put it another way, the future needs highly trained, expert data security experts. Obtaining a doctorate is one way to fulfill the challenge.

How long does it take to get a Ph.D. in cybersecurity?

A full-time cybersecurity study program in the United States runs for 3 or 4 years. The first year is normally probationary, and it is used to write a thesis proposal outlining your research degree.

The remaining time will be used to conduct research, write and apply your paper, and prepare for the Viva. Part-time cybersecurity programs could last 6 to 7 years. A full-time MPhil in cybersecurity usually lasts 1 to 2 years.

The first year is used to help your supervisor to find potential cybersecurity training that will aid in your research study, in addition to developing your thesis proposal.

It could take the form of online Ph.D. cybersecurity training courses, online doctorate seminars, or placement programs to provide you with an understanding of the computer security market and real-world implementations in your chosen area.

What is the quickest Ph.D. Cybersecurity Degree to get?

Doctor in Philosophy (Ph.D.) programs are offered in several subject areas. The best projects are usually supported by excellent grants, cutting-edge research laboratories, and an abundance of intellectual services.

We advise you to request information from each school for more clarity when choosing one of the shorter graduate programs or the simplest Ph.D. programs.

The easiest is not necessarily the shortest, and the quickest is not always the easiest.

The Most Convenient Ph.D. Programs, Both Online and On-Campus

To be sure, no Ph.D. route to Cybersecurity is “easy,” but there are some that are built to be easier than others.

Typically, education, humanities, and social sciences are regarded as the most specific disciplines to obtain a degree.

With this in mind, our ranking of the easiest Ph.D. programs covers schools and programs with substantially shortened residency requirements, accelerated classes, credit exchanges, and integrated dissertation colloquia.

The schools in the rankings below have earned accreditation from at least one of the six regional accrediting organizations.

All deliver at least one virtual Ph.D. United States News. The World Report and Forbes Magazine rankings were also used to coordinate online Ph.D. programs.

Cost /Tuition fee for procuring a Ph.D. in Cybersecurity

Obtaining a Ph.D. requires a significant commitment of both time and resources. Cybersecurity Ph.D. students are balancing the expense of being specialists in the field against the possible return of getting fascinating and possibly lucrative job prospects.

The majority of conventional, on-campus doctoral programs cost between $1,350 and $2,090 per credit hour. Degree standards are typically completed in 60-75 hours, so the expense of a doctoral degree can easily exceed six figures.

The positive thing is that by the time students reach the Ph.D. level, they have a wide range of financing opportunities, including certain doctoral programs entirely sponsored by the university or academic department.

Additionally, financing is available in research grants and other types of scholarships for students involved in conducting cybersecurity studies.

The CyberCorps: Scholarships for Service program is one example. Ph.D. candidates pursuing cybersecurity are eligible for a $34,500 per year grant, as well as a $6,500 career stipend to attend workshops, in return for committing to work for a federal department in the cybersecurity space during the Ph.D. program.

Fully Funded Ph.D. in Cyber Security in the US

Cybersecurity is one of those programs in which many people are interested nowadays. Many of you might be looking for a fully-funded Ph.D. in cyber security in the United States of America.

So let me tell you one most important things about a Ph.D. in the United States of America.

Funding is always guaranteed there, now always, but most of the time. So don’t worry about funding. However, students are always encouraged to seek external funding, like through private institutes.

A stipend is given to the student twice a year. Although it’s not a large amount of money, it is intended to cover the minimum basic living costs needed during the study period.

Many universities offer students a basic income because, in the United States of America, students don’t have enough time to do a part-time job while studying.

But don’t forget to apply to the program early because universities prefer giving total funding to those students who apply quite early. Universities are quite strict about the requirements of stipends.

If you miss the early application deadline, there are few chances that you will get any funding for your program.

If you expect that your Ph.D. program will take longer than the standard four to five years, you should consider external funding options to cover the remaining years until you complete your program.

Following are the ways to get funding for your Ph.D. program in the United States of America:

You might be curious to know about the methods by which you can get full-fledged funding for your program.

Many of you might consider working part-time, but it will be challenging to work after dedicating 40 hours to your studies. So here are the ways that will help you:

  • Scholarships

Full funding for your Ph.D. in cybersecurity can cover fees, living costs and other expenses during your student life.

Private universities will give more funding than public universities, although these also have higher fees.

You can also search for some of the Ph.D. funding available using the official tool provided by Education USA.

  • Assistantships

It’s common for US universities to offer assistantships to graduate students. This is a direct form of funding.

Common types of Assistantships are:

  • Graduate teaching assistantships
  • Research Assistantships
  • Administrative assistantships
  • Fellowships.
  • National Science Foundation

You can also get full funding for your cybersecurity program via the National Science Foundation. It is a long-established federal grant scheme that provides the opportunity for a fully-funded Ph.D. in cybersecurity and other programs.

But to get funding in this manner, you should be an American citizen.

This offers the following benefit:

  • An annual stipend of $34,000.
  • $12,000 allowance for tuition fees is paid directly to the university.
  • Federal loans for grad. Students

If you are an American national, you can access a federal loan from the government to finance your Ph.D. studies.

There are two types of loans you can consider about:

  • Direct Unsubsidized loans
  • Direct PLUS loans

These scholarships are provided to each Ph.D. program, so these all things are applicable to the cybersecurity program. If you have any questions regarding the scholarship, feel free to ask in the comment box.

Eligibility Criteria

The outstanding intellectual potential is shown by a first-class honors degree, a Master’s degree with distinction, or an equal Grade Point Average (GPA). Check out our complete entry criteria for more details.

Benefits Provided

The program is a fully-funded Ph.D. scholarship with a stipend of $3,225 per year to cover living expenses. This studentship is only available to US citizens.

Why are Institutions Offering Fully Funded Scholarships?

Cyber-attacks, including consumer identity leakage and malware attacks, are becoming an increasingly prevalent threat to organizations.

It is well acknowledged in data defense that the issue is not when an organization would be hacked, but rather when.

It is evidenced by the fact that all the world’s biggest and most technologically advanced organizations, such as Google and Facebook, have experienced significant cybersecurity breaches.

The involvement of individual workers within the organization who, by action or inaction, can unwittingly encourage cyber-attacks is an aspect of many cyber-attacks.

While psychological and behavioral sciences research is highly applicable to these topics, there is an interdisciplinary disparity between this evidence base and its relevance to cybersecurity challenges .

Cybersecurity Ph.D. Scholarships For 2024

Cybersecurity scholarships are essentially “free money” for universities. You should not have to return the funds, as you will, for a loan.

The majority of these grants are for students who choose to pursue cybersecurity. Or college majors that are connected to it.

Homeland defense, forensics, emergency management, and intelligence are only a few examples. Some only have funding for tuition and fees. Others can include a summer internship and a deal to retain you when you graduate.

How To Apply For a Scholarship in Cybersecurity Ph.D. Programs

You must be eligible to apply for a data security scholarship. This requirement is normally fulfilled by enrolling in cybersecurity degree programs .

And, if you qualify, you fill out an application. Being a US citizen or permanent resident is a common requirement. You will also be required to demonstrate your status as a current student enrolled in an accredited institution.

Academic excellence and an engagement in national security are also essential to providers. As a result, you also send transcripts demonstrating that you have a certain GPA. Often, SAT/ACT scores must be within an acceptable range.

Often people make choices based on their financial situation, which means you’ll need to have your family income tax records or fill out a FAFSA. Aside from that, many providers wish to learn about you and your objectives.

To do so, you will be required to write an essay on a prompted topic, include references, and include a current CV.

Online cybersecurity Ph.D. programs are growing in popularity, both as a degree choice for students and a feasible option for schools looking to educate more specialists in the sector.

Programs to raise public awareness of the issue and draw talented young minds to the discipline are becoming more common and are beginning to impact.

Certificate, preparation, and curriculum services are in high demand as the pool of qualified applicants grows. Several degree programs offered by colleges and universities, in particular, are increasing.

In recent years, bachelor’s degrees have been almost mandatory for new cybersecurity practitioners. Higher-level posts, such as chief information security officers (CISOs), often necessitate a master’s degree.

At the moment, though, there is a growing demand for doctorate degrees in cybersecurity. High-level executive positions, higher-education faculty jobs, and advanced research programs are all in greater need than there are applicants to fill them.

Online Ph.D. in Cyber Security

Although most doctoral degree programs last two or three years, we discovered one university that offers a 12-month online doctoral program in Cybersecurity:

BREYER STATE UNIVERSITY Online Doctoral Programs for One Year – ethereal accelerated doctorate in grief therapy. This online program is by far the most accessible on our list, with tuition starting at merely $3,550.

When new 1-year virtual doctoral programs become available, they will be added to this list. This list was most recently revised on April 1, 2019.

In general, most doctoral candidates will work in the increasingly evolving and vital fields of education, consulting, and science. For these positions, Ph.D.s (doctor of philosophy degrees) and DScs (doctor of science degrees) are designed.

Ph.D.s study philosophy and science, while DScs study research and scientific skills. With a greater emphasis on technological expertise, DScs can continue to work directly in field applications.

On the other hand, the DPS degrees are almost enticingly dedicated to the highest stages of instruction in hands-on practical experience and skills rather than philosophy and science.

Doctoral programs of all three types are now open to those seeking to progress their careers to the top of the cybersecurity sector.

However, at this moment, the Ph.D. is by far the most widely offered doctoral cybersecurity degree, followed by DScs and DPSs.

There is a critical need for information security experts in the world. Still, there is also an essential need to increase the ability of our educational institutions to train new practitioners.

We will urgently need advanced, creative, and strategic thinkers to perform cybersecurity research.

List of Ph.D. in Cyber Security Colleges in the United States

A list of cybersecurity Ph.D. programs is shown below. The listing is intended to function as a high-level index, providing enough specific details to allow for fast side-by-side comparisons.

Specific information on what and school needs (such as a GRE score or previous academic work), as well as the number of credits needed, projected expenses, and a guide to the curriculum, should be available.

How much does a Ph.D. Holder in Cyber Security Make in the United States?

The cybersecurity job market is booming, but a significant talent gap persists. The unfilled cybersecurity positions range from 3.5 million globally to 750,000 in the U.S. alone. This gap is expected to widen through 2025.

Moving from the IT field to cyber protection can be as simple as obtaining a business credential for those who already work in IT and have a bachelor’s degree.

Individuals employed in R&D receive an average annual salary of $113,199. At the same time, information technology analysts earn about $98,600, and computer science professors earn more than $160,500.

Ph.D. in Cybersecurity: Career Outlook!

Graduates of cybersecurity doctoral degree programs are eligible for positions that pay well and have a high rate of development.

According to the prediction of the US Bureau of Labor Statistics, employment growth for information security analysts is estimated to be 32% between 2019 and 2029. Computer science professors are still doing well in terms of career development.

There is still a scarcity of trained cybersecurity specialists, especially at the doctorate level. Earning a Ph.D. in Cybersecurity may be a very good choice.

Concluding Note

One new trend in the cybersecurity sector is that cybersecurity professionals must be well-versed in a wide range of emerging threats.

According to the latest news about cybersecurity breaches, there are a host of new threat mechanisms and prospects for cybercrime and related concerns.

Historically, cybercrime demanded resources and a degree of complexity that necessitated advanced preparation or abilities.

However, because of the internet’s pervasiveness, cybercrime is becoming more popular.

As a result, studying in a cybersecurity Ph.D. program allows students to become experts in one aspect of a rising and multi-layered sector.

Trying to forecast what potential cybersecurity threats could look like and then developing tools and systems to defend against such threats is an intriguing aspect of the cybersecurity sector.

However, conventional research-oriented cybersecurity positions remain in high demand in universities and elsewhere. This trend is expected to continue.

Kevin James

Kevin James

I'm Kevin James, and I'm passionate about writing on Security and cybersecurity topics. Here, I'd like to share a bit more about myself. I hold a Bachelor of Science in Cybersecurity from Utica College, New York, which has been the foundation of my career in cybersecurity. As a writer, I have the privilege of sharing my insights and knowledge on a wide range of cybersecurity topics. You'll find my articles here at Cybersecurityforme.com, covering the latest trends, threats, and solutions in the field.

Related Posts

cybersecurity bootcamp for beginners complete guide

5 Best Cybersecurity Bootcamps for Beginners in 2024

  • January 15, 2024
  • 27 min read

The world of cybersecurity is complicated. New cybersecurity technologies are being developed every day, and they all need to be… 

cybersecurity law degree courses in the united states

Cybersecurity Law Degrees in the United States: A Complete Guide (2024)

  • 23 min read

Cybersecurity is one of the fastest-growing occupations in the United States, and it appears to be growing at a breakneck… 

best cybersecurity bachelors degree programs in the united states

Best Cybersecurity Bachelor’s Degree Programs in the United States for 2024

  • January 4, 2024
  • 24 min read

A bachelor’s program in cybersecurity teaches students how to detect computer system vulnerabilities, recognize digital theft, and avoid or restore… 

The Gradcafe

  • Majors & Careers
  • Online Grad School
  • Preparing For Grad School
  • Student Life

Top 10 Best Programs for a PhD in Cyber Security

Lisa Marlin

Technology is becoming more and more integrated with our daily lives — with it comes threats from hackers that make your information vulnerable. Indeed, cybersecurity threats  are expected to grow even more in the next few years, making cybersecurity professionals sought-after in the hiring market. Already have an extensive computer science  background? Why not take it to the next level with a PhD in cyber security?

A doctorate degree in cyber security gives you a valuable qualification and in-depth knowledge of cybersecurity challenges. Not only will you be equipped to help organizations protect their crucial information, but you’ll also be qualified to develop strategies for better data security and even teach the subject in university.

Ready to unlock unlimited career potential in the cybersecurity space? Let’s jump into our top programs for cybersecurity PhD programs, including common requirements and costs and future career potential.

Table of Contents

Best Programs for a PhD in Cyber Security

Arizona state university, ira a. fulton schools of engineering.

Ph.D. Computer Science (Cybersecurity)

Arizona State University logo

Arizona State University is certified as a National Center of Academic Excellence for Information Assurance Research and Education (CAEIAE). Its doctorate of cyber security program helps students master key theories and algorithms to apply to a modern computer science realm.

  • Courses:  Data and information systems , information assurance and security, applied Cryptography, and advanced computer network security.
  • Credits:  84
  • Delivery: On-campus
  • Tuition :  $11,720 per year
  • Financial aid:  Scholarships, grants, and loans.
  • Acceptance rate: 88.4%
  • Location:  Phoenix, Arizona

Capitol Technology University

Doctorate (DSc) in Cybersecurity

Capitol University logo

Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense. The school’s doctorate in cybersecurity program is a low-residency online program and was the first of its kind  in the USA.

  • Courses : Situation awareness analysis & action plan processes, information assurance strategic management, information assurance implementation
  • Credits : 54-66
  • Duration : 3 years (8 semesters)
  • Delivery : Online (low residency)
  • Tuition : $933 per credit
  • Financial aid: Loans, Grants, scholarships, work-study
  • Acceptance rate:  84.4%
  • Location : Laurel, MD

Northcentral University, School of Technology

Doctor of Philosophy in Cybersecurity (PhD-CY)

Northcentral University logo

Northcentral University is a regionally accredited university that offers many educational programs for students all over the world with one-on-one mentorship. Its PhD cybersecurity degree has a special emphasis on global security issues and covers international laws and multicultural elements.

  • Courses : Global cybersecurity demand, securing globally distributed infrastructure & support, and governance, audit, compliance & risk
  • Credits : 60
  • Duration : 40-44 months
  • Delivery : Online
  • Tuition : $1,094 per credit
  • Financial aid : Grants, loans, veteran benefits, and third-party scholarships.
  • Acceptance rate : 93%
  • Location : San Diego, CA & Scottsdale, Arizona

University of Colorado – Colorado Springs, College of Engineering and Applied Science

Ph.D. in Security

University of Colorado Springs logo

University of Colorado, Colorado Springs has partnerships with several defense departments, semiconductor manufacturers, and other prominent institutions, thanks to its strategic location. Though students must conduct the majority of the coursework for this doctorate degree in cyber security on-campus, a provision permits some online courses.

  • Courses : System administration & security, applied cryptography, and advanced system security design.
  • Delivery : On-campus
  • Tuition : $918.83 per credit
  • Financial aid : Scholarships, student employment, and loans.
  • Acceptance rate:  89.6%
  • Location : Colorado Springs, Colorado

Northeastern University

Cybersecurity, Ph.D.

Northeastern University logo

Northeastern University promotes a co-operative education philosophy with a blend of classroom learning and professional experience. This cybersecurity PhD program offers the opportunity to conduct research in specialized facilities and labs, including the Cybersecurity & Privacy Institute and International Secure Systems Lab.

  • Courses : Software vulnerabilities & security, computer hardware security, and machine learning in cybersecurity & privacy.
  • Credits : 48
  • Tuition : $1,532 per credit hour
  • Financial aid:  Scholarships, fellowships, assistantships, and company sponsorships.
  • Acceptance rate : 20.5%
  • Location : Boston, Massachusetts

Dakota State University

Cybersecurity, DSc

Dakota State University logo

Dakota State University is known for its specialization in computer education-related programs. Its doctorate in cyber security is delivered through a combination of various distance education methods and a handful of on-campus seminars. You can apply for the program even if you don’t have a master’s degree, but you’ll need to complete an additional 27 credits.

  • Courses : Full scope security testing, cyber security research, and security software engineering.
  • Credits : 61
  • Duration : 3 years
  • Delivery : Online (plus on-campus seminars)
  • Tuition : $210.80 per credit hour
  • Financial aid:  Grants, work-study, and loans.
  • Acceptance rate: 83%
  • Location:  Madison, SD

Purdue University, The Center for Education and Research in Information Assurance and Security (CERIAS)

Interdisciplinary Ph.D. Program in Information Security

Purdue University logo

Purdue University was ranked in the top 10  most innovative universities in 2022 by the US News & World Report. This interdisciplinary cybersecurity PhD program covers ethical, political, and philosophical courses, to provide insight into technology policy issues and information ethics.

  • Courses include:  Information security, advanced network security, and modern ethical theories.
  • Credits: 60
  • Delivery:  On-campus
  • Tuition:  Refer tuition calculator
  • Financial aid:  Fellowships, teaching assistantships, and research assistantships.
  • Acceptance rate: 67.2%
  • Location:  West Lafayette, IN

Nova Southeastern University, College of Computing and Engineering

Ph.D. in Cybersecurity Management

Nova Southeastern University

NSU is considered one of the National Centers of Academic Excellence (NCAE) in cybersecurity. To qualify for this school’s PhD program in cybersecurity, you’ll need to have either a bachelor’s or master’s degree in the field. The school also offers a direct BS to PhD pathway.

  • Courses : Fundamentals of cybersecurity, information security governance, and human-computer interaction.
  • Credits : 51 minimum
  • Delivery : Hybrid
  • Tuition : $1,282 per credit hour
  • Financial aid:  Fellowships, scholarships
  • Acceptance rate:  76.2%
  • Location : Fort Lauderdale, Florida

St Thomas University

Doctor of Business Administration in Cyber Security Management

St, Thomas University logo

St. Thomas University is a non-profit Catholic university that emphasizes global and cultural diversity. Its doctorate of cybersecurity program lets you choose one of three research options: traditional dissertation, action research, and article dissertation.

  • Courses : Cyberlaw, policy & security, cyber security risk management, and information ethics.
  • Duration : 1.5 years plus dissertation
  • Delivery : On-campus, online, and hybrid options
  • Tuition : $1,029 per credit hour
  • Financial aid:  Scholarships, grants, loans, and work-study.
  • Acceptance rate: 59.6%
  • Location : Miami Gardens, FL

George Mason University, Volgenau School of Engineering

Information Technology Ph.D. (Information Security and Assurance (ISA) Concentration)

George Mason University logo

George Mason University is a public research university with an emphasis on sustainability that was ranked the most diverse university  in Virginia by the US News & World Report 2018. Its PhD program in Information Technology offers a concentration in Information Security Assurance (ISA) covering cybersecurity subjects.

  • Courses : Secure software development, security protocol analysis, and security experimentation.
  • Credits : 72 minimum
  • Tuition : $663 per credit
  • Financial aid : Grants, work-study, and loans.
  • Acceptance rate:  89.2%
  • Location : Fairfax, Virginia

What are the Prerequisites for a PhD in Cybersecurity?

Most PhD programs in cybersecurity require a master’s in computer science or a related field. Other specific requirements vary depending on the program, but you’ll typically need to submit the following in your application:

  • Personal Statement  and/or research proposal
  • Academic resume
  • Letters of recommendation

Check individual requirements for each school you’re considering well in advance of the application cut-off date. These programs can be competitive, so give yourself plenty of time to put together the strongest application you can!

Preparing for a Cybersecurity Doctorate Program

The best cybersecurity doctorate programs can be intensive and competitive. Therefore, it’s a good idea to prepare before the program even starts – this can give you the edge you need to excel in the program!

Of course, your previous studies provide the foundation for your doctorate. An internship in the field can also help you to build useful skills and knowledge, especially when it comes to the latest trends  Likewise, participating in cybersecurity competitions or getting a cybersecurity certification can be highly advantageous.

However, the best thing you can do to prepare for a cybersecurity doctoral program is to build your network  in the sector. Join professional organizations and mingle with industry folks to gain insights into the field. You can also use social media platforms like LinkedIn and Twitter to enhance your networks.

Related Reading:  Best Master’s in Cybersecurity Programs

Why Get a Doctorate in Cybersecurity?

A doctorate in cybersecurity allows you to develop high-level skills and knowledge on preventing and analyzing security breaches, as well as formulating strategies to manage them. It is a valuable qualification that will qualify you for top jobs at some of the best organizations, with attractive remuneration.

When choosing the best cybersecurity PhD program for you, consider the school’s reputation and its accreditation. Also, look at the courses offered, as cybersecurity involves various specializations. You should also consider your budget in the context of each program’s tuition, fees, and financial aid offered.

Finally, where is the program located? Is it offered on-campus, offline, or in a hybrid program? These factors will affect your ability to balance your study with work and personal commitments.

Jobs and Salary Prospects for Doctors of Cybersecurity

Some of the common roles and median annual salaries  for graduates with a PhD in cybersecurity include:

  • Cybersecurity Engineer – $125,816
  • Information Security Manager – $96,406
  • Chief Information Security Officer (CISO) –  $124,405
  • Security Architect –  $111,433
  • Security Director  – $105,907

Key Takeaways

You may not find as many options for a PhD in cyber security as other fields. After all, it’s a specialized program. However, you’ll find a few solid top cybersecurity PhD programs that give you the opportunity to learn from top research institutions and faculty.

If you’ve found this round-up of the best PhDs in cybersecurity helpful, take a look at our guides to the best online Master’s in Computer Science  and online PhD Computer Science programs .

PhDs in Cybersecurity FAQs

What is the average cost of a phd in cybersecurity.

Costs vary depending on the school, program length, and delivery (on-campus or online). Usually, a PhD in cybersecurity can be anywhere between $30,000 to $100,000.

Is a PhD in Cybersecurity Worth it?

A PhD in cybersecurity is valuable because it will qualify you for some of the most in-demand and well-paid jobs available today. According to the BLS , jobs for information security professionals are estimated to grow by 33% over the next decade, significantly more than the national average.

Can You Get a PhD in Cybersecurity?

A PhD in cybersecurity is a specialized degree, but today, many universities offer it. Several programs are delivered on-campus, online, or in hybrid formats.

How Long is a PhD in Cybersecurity?

A PhD in cybersecurity can take from 3-7 years to complete. This will depend on the program, as well as individual factors such as whether you choose to study part-time or full-time.

What Can You Do with a PhD in Cybersecurity?

A PhD in cybersecurity will equip you to work for leading organizations as a CISO (Chief Information Security Officer), information security manager, or security architect. You’ll also be qualified to conduct research or work as a professor in cybersecurity or a related field.

How Many Credits are Required for a PhD in Cybersecurity?

You’ll typically need 60 credits to complete a cybersecurity PhD. However, this varies depending on the specific program or university.

What Kinds of Exams are Required During a PhD Program?

Unlike most undergraduate programs, a PhD degree relies heavily on coursework and, in particular, a main dissertation or thesis. However, you’ll still have to complete some exams.

Usually, there are three kinds of exams:

  • A qualifying exam  that occurs earlier in the program.
  • A preliminary exam  that proves the candidate’s readiness to start the dissertation/research.
  • The  final exam  for the candidate to defend their dissertation/research work.

How Do You Choose a PhD in Cyber Security Program?

You should consider faculty experience, networking opportunities, available funding, accreditation, and alumni statistics before choosing a PhD in cyber security program.

Lisa Marlin

Lisa Marlin

Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.

  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ BA vs BS: What You Need to Know [2024 Guide]
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ The 19 Best MBA Scholarships to Apply for [2024-2025]
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 25 Best Gifts for Law Students for 2024

Best Master’s in Cybersecurity Programs in 2024

Thegradcafe and jobbio join forces to connect top talent with great companies, related posts.

Fewer employers list education requirements in job postings.

  • 73% of job seekers believe a degree is needed for a well-paying role–but is it?

There are more jobs than talent in these cities.

Tech Talent Crunch: Cities with More Jobs Than Workers

The Most Under-Rated Career Advancement Tip for 2024

The Most Under-Rated Career Advancement Tip for 2024

Top 5 Best Psychology PhD Programs in 2024

Top 5 Best Psychology PhD Programs in 2024

Good News For Early Careers: Skills-Based Hiring is Surging

Good News For Early Careers: Skills-Based Hiring is Surging

These Are The Best States To Start Your Tech Career

These Are The Best States To Start Your Tech Career

TheGradCafe and Jobbio join forces to connect top talent with great companies

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • Is a Master’s Degree Worth It? [2024 Guide]
  • Graduate Certificate vs Degree: What’s the Difference? [2024 Guide]
  • ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • What is a Good GRE Score?

The Gradcafe

© 2024 TheGradCafe.com All rights reserved

  • Partner With Us
  • Results Search
  • Submit Your Results
  • Write For Us

phd cybersecurity

  • Ph.D. Program

Information Security is a multi-disciplinary interest group of faculty and students who work together across department lines. Students can join by applying to the Computer Science Department . All of our students receive support, including an annual stipend, in the form of external and internal competitive fellowships, research fellowships, or teaching fellowships. As a PhD candidate, you will share in the excitement of discovery as you collaborate with our faculty on cutting edge research . You also will acquire strong, independent research skills and begin to develop your own skills and reputation as a member of the research community.

You will find the work here challenging and personally rewarding. Students who complete our PhD program are well-prepared for careers in academia, research, government and industry. Please visit our Graduate Admissions Information page for application requirements, deadlines, and other important information.

Prospective Ph.D. students should review our publications and related security papers and contact us at [email protected] .

Research Areas

  • Health and Medical Security
  • Cryptography & Privacy
  • Graduate Studies at ISI
  • MSSI Course Distribution
  • Capstone Project
  • Dual-Degree Opportunities
  • Cybercorps: Scholarship for Service Program
  • Part-Time and Online Programs (Engineering for Professionals)

Johns Hopkins University | Whiting School of Engineering

Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

  • Majors & Degrees

Popular searches

  • Commencement
  • Academic Calendar
  • Tuition and Fees
  • Online Programs
  • Karl E. Mundt Library
  • Scholarships

smiling woman

Is DSU the right fit for you?

Even the best brochures and postcards (and yes, even websites) can only tell you so much about a college. The only surefire way to know if DSU is right for you is to see for yourself.

Cyber Defense Doctor of Philosophy (PhDCD)

Defend the elite.

Unsolicited threats pose a dangerous risk to government agencies and organizations alike. They, too, are vulnerable to hackers, malware, and data breaches. Equip your business or agency with the ultimate security protection –  you. 

With a doctorate in Cyber Defense, you can learn what it means to be a leader on the edge of innovation. 

Defend the elite and address growing cyber threats. Practice risk management strategies. Harbor knowledge in research methodology and practice. Validate authenticity and confidentiality. Design and implement security policies and provisions. Conduct recovery plans for your future IT infrastructure. Work and learn from faculty who are experts in their field. 

The program is provided entirely through online learning. There is an annual residency requirement of three on-site research seminars. Seminars will be held on the Madison, South Dakota campus (students may petition to participate in the residency requirement from a distance). A great way to finish your degree while holding a professional career.

  • VIEW COURSES
  • Timelines & Requirements
  • Tuition & Fees
  • Request Program Info

The Beacom College of Computer and Cyber Sciences

Arica Kulm ’18 MS Cyber Defense ’20 PhD Cyber Defense

Cyber defense is a career, not just a job

Arica Kulm was looking for a career, not just a job. After finishing her master’s in Cyber Defense, she decided to continue on as one of the first students in the PhD in Cyber Defense program. This gives her the knowledge base for a meaningful, interesting career in a field that is in great demand worldwide.

Student Spotlight

Explore the defensive line

DSU’s curriculum addresses the important technical aspects of cyber defense, and includes important leadership, ethics, and management concepts. This degree complements our PhD in Cyber Operations and fits tightly with our strategic priorities and initiatives. Our graduates obtain careers in private industries, government agencies, the military, and academia. We have a recognized excellence in cyber security, education, and research that is central to our mission. We currently hold four prestigious Centers of Academic Excellence Designations from the National Security Agency and Department of Homeland Security, including the most technical for Cyber Operations and the most prestigious as a Cyber Defense Consultative Regional Resource Center, one of four university-based centers in the nation.

Cyber Operations Masters of Science

Learning Outcomes

Upon completion of the Ph.D. degree in Cyber Defense, students will be able to:

  • Apply scientific research methodologies.
  •  Advance the field of cyber defense.
  • Apply ethical frameworks to security decisions.

Kyle Cronin

Kyle Cronin

Associate Professor, Coordinator for Ph.D. in Cyber Defense

Tyler  Flaagan

Tyler Flaagan

Assistant Professor

Chris Olson

Chris Olson

Associate Professor / Coordinator for MS in Cyber Defense

Related Programs

professor teaching class

Marymount University

  • Staff & Faculty
  • Current Students
  • Parents & Family
  • Visitors & Community
  • Corporate Partnerships
  • Support Marymount
  • Marymount Shuttles
  • Student Counseling Services
  • News & Events
  • Campus Safety
  • Faculty & Staff Directory
  • My Marymount
  • Registrar’s Office
  • Library & Learning Services
  • Campus Ministry
  • Human Resources
  • Office of the President
  • Marymount at a Glance
  • Points of Pride
  • Our Mission, Vision, & Plan
  • Capital Location
  • Our History
  • The Rixey History
  • Our Inclusive Community
  • Marymount’s Economic Impact
  • Involvement & Service
  • Distinguished Speakers
  • Map and Directions
  • Visit Marymount
  • Admitted Students
  • Undergraduate Students
  • Graduate Students
  • Online Students
  • Non Degree Students
  • Summer Programs
  • Early College Programs
  • Scholarships & Aid
  • Early Learning Academy
  • New Student Scholarships
  • How to Apply
  • Types of Aid
  • Graduate Student Aid
  • Military & Veteran Services
  • Financial Aid FAQs
  • Tuition & Fees
  • Satisfactory Academic Progress Standards
  • Office of the Provost
  • Academic Calendar
  • Majors & Programs
  • Online Programs
  • Services & Resources
  • College of Business, Innovation, Leadership, and Technology
  • College of Health and Education
  • College of Sciences and Humanities
  • Access, Belonging, Inclusion, Diversity, and Equity Hub
  • Marymount Global
  • Center for Optimal Aging
  • Saints’ Service Network
  • Faculty Research and Experts
  • Commencement
  • Student Affairs Administration
  • New Student Orientation
  • Dining Services
  • International Student & Scholar Services
  • Student Activities and Events
  • Student Accounts
  • Commuter Students
  • Student Health and Well-being
  • Community Standards and Title IX
  • Ministry, Activities & Leadership
  • Careers, Internships & Employment
  • Auxiliary Services
  • Campus Safety & Emergency Management
  • Student Government Association
  • Student Success and Well-being

Cybersecurity (D.Sc.)

Banner image

Academics College of BILT – Business, Innovation, Leadership and Technology School of Technology and Innovation School of Technology and Innovation Graduate Programs Cybersecurity (D.Sc.)

D.Sc. Cybersecurity Program Overview

Marymount University’s doctorate program in Cybersecurity prepares highly qualified individuals for elite careers in cybersecurity, with unique knowledge and skill sets to manage increasingly complex networks and information systems to protect the nation’s digital infrastructure and our national security.

The D.Sc. in Cybersecurity program teaches candidates higher-order thinking and diversity of thought surrounding current and future cybersecurity issues, such as exploration of new technology, the role of artificial intelligence, and research to develop expertise in an area of cybersecurity of their choice.

  • Most strategic location

While available online and in person, Marymount’s Cybersecurity doctorate program takes advantage of the University’s strategic location. The national capital region is near more cybersecurity firms and related employment opportunities than anywhere else in the U.S. Here, you can find the Dept. of Homeland Security, Dept. of Defense, National Security Agency, Central Intelligence Agency, and National Science Foundation, as well as major companies such as Amazon Web Services, Capital One, Northrup Grumman, L-3, CACI, and more. Our faculty are also experts who are active in the federal government and corporate security, with experience you can’t easily find anywhere else.

Designed primarily for working professionals, the program offers a unique opportunity to work in different cybersecurity environments — from Google and Facebook to the Dept. of Defense, Dept. of Commerce, and so many others. You will learn by collaborating with a diverse set of experienced professionals and developing insights into the many real-world applications of cybersecurity.

  • Advanced cybersecurity t raining

Marymount’s Cybersecurity doctoral program goes beyond basic network security, recognizing an evolving field that is at the intersection of technology, management, ethics, leadership, human behavior, policy, and data science. We are a designated National Center of Academic Excellence for Cyber Defense Education (CAE/CDE) by the National Security Agency and the Dept. of Homeland Security, a distinction in the cybersecurity domain held by only select universities in the country. Marymount is also a recipient of the CyberCorps Scholarship for Service grant from the National Science Foundation, allowing us to offer scholarships to Cybersecurity students in turn for the same length of service in government cybersecurity positions.

  • Focus on applied research

Our goal is to share the expertise of cybersecurity professionals with students who will become the future leaders and educators in the field. We accomplish this through scholarly inquiry involving real-world situations as well as extensive research into the technological, societal, ethical, and policy domains of cybersecurity.

Program Features

Answer

  • 72 credits for post-bachelor’s degree applicants; 36 credits for post-master’s degree applicants
  • $1,275 per credit
  • Courses offered in person, online, and through a hybrid format

Admission Requirements

  • Graduate application
  • Official transcripts of all postsecondary education
  • Professional résumé
  • 1-page statement describing research-focused coursework, papers, and projects completed, and possible research interests for final dissertation
  • 2 writing samples from either an academic paper or professional work report (approx. 4-6 pages) pertaining to the IT or cybersecurity field
  • Grade of B- in a college-level statistics course is required prior to 800-level coursework
  • Interview is required for qualified applicants

International Students: For university coursework completed outside the U.S., a course-by-course transcript evaluation is required from a  NACES  member evaluation agency such as  World Education Services  or  Educational Credentials Evaluators .

Students for whom English is a second language must submit a recent official score of 96 from TOEFL, 6.5 from IELTS, or 58 from the PTE academic exam, or documentation of program completion at 1 of Marymount University’s language partners. For complete information about International Admissions Guidelines and language partner programs, visit our  International Graduate Students page .

For more information, please contact:    Sean Buchanan   [email protected] 703-526-6899

Program Curriculum Snapshot

IT 727: Managing Cybersecurity Risk

In general, the digital assets of modern-day organizations are susceptible to numerous threats and potential vulnerabilities — but there’s not always enough money and resources to protect them. This course covers all aspects of managing cyberattack risk and covers the foundations of developing cyber defense strategies for any organization. Also covered is the strategic decision-making process, including formal methodologies, of which assets to defend and why.

IT 757: Cyber Threat Intelligence

This course covers the cyber threat intelligence landscape, including tactical, operational, and strategic dimensions. It includes open-source, social media, and mobile app intelligence gathering techniques. Investigational strategies such as counterintelligence methods and attribution are also discussed.

IT 777: Malware Analysis

This is an advanced hands-on class that explores the roles of malware analysis, cybersecurity defenses, developing policies to handle malware, and performing dynamic and static analysis to recognize existing and potential malware. Students learn how and when to use analysis techniques to mitigate risks associated with malware.

IT 800: Beginning Applied Research in Cybersecurity

This course prepares doctoral students for the applied research process in the cybersecurity field. Students review APA guidelines and look at special requirements for academic writing. They start thinking of issues in the field that could benefit from additional research and then develop these ideas into potential dissertation topics. Students also analyze past work and consider ethical issues that might occur during their cybersecurity research.

Career and Salary Possibilities

Through the D.Sc. Cybersecurity program, we offer work opportunities and other experiential learning practicums, including a variety of paid research and teaching assignments through the CyberTeach program and publications of group research projects completed with other D.Sc. in Cybersecurity students. In addition, the Center for Career Development has experts to help with résumés, LinkedIn, and interviewing.  

The median annual salary for Computer and Information Systems Managers in 2021 was $199,010, according to the U.S. Bureau of Labor Statistics. During the next decade, the career outlook for cybersecurity professionals is expected to grow 33%, far above the national average.

More information on careers in cybersecurity can be found at cyberseek.org .

Meet Our Faculty

Welcome to the  School of Technology and Innovation  within Marymount University’s  College of Business, Innovation, Leadership, and Technology (BILT) .

Today, technology is a major part of all of our lives and our School is here to educate the next generation of technology gurus in whatever that technology brings. We are extremely proud of our progressive technology programs and the quality of our students who are entering the challenging workplaces of today and tomorrow.

The School of Technology and Innovation focuses on preparing individuals to take part in the global critical technology workforce shortage. Our programs, whether they are at the undergraduate, masters, or doctoral levels, prepare students for roles in digital transformation, cybersecurity, data science, cloud computing, and the constantly growing field of technology applications.

We are particularly proud of our diversity, equity, and inclusion initiatives as we help significant numbers of minorities, women, veterans, and the neurodiverse succeed in the technology field.

Please explore our website to learn more about our programs and our faculty, staff, students, and alumni.

Dr. Diane Murphy

Click here to view our Faculty

Your Questions Answered

Send your information to one of our specialists and we will contact you to have all your questions answered about this program:

Contact an Admissions Advisor

Schedule an appointment with one of our dedicated admissions advisors today to get more information about our programs, the application process and our student support structure..

logo

(703) 522-5600

Privacy Policy - Terms of Use

  • Contact CONTACT MARYMOUNT
  • Directions MAPS & DIRECTIONS
  • Careers CAREERS AT MARYMOUNT
  • Student Jobs JOBS ON CAMPUS (MU STUDENT)
  • Our Mission, Vision & Plan
  • Maps & Directions

phd cybersecurity

Cybersecurity

Program finder image

Graduate Program

Students enrolled in the Master of Liberal Arts program in Cybersecurity will build a strong foundation in security, privacy, and cryptography. They will acquire knowledge and skills to plan, manage, and maintain the security of an organization’s cloud infrastructure and applications.

UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications open

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .

Fees and funding

Fees for this course.

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Choose your programme

Please read the Application Guidance before proceeding with your application.

Year of entry: 2024-2025

Got questions get in touch.

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE programmes
  • Primary PGCE programmes
  • Secondary PGCE programmes
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation
  • Funding your Master's

Webster University Newsroom Logo

  • Find Your Webster Location
  • Find Your Program
  • Request Info
  • Search webster.edu
  • Search All Webster Campuses
  • United States
  • International
  • Little Rock Air Force Base
  • Colorado Springs

District of Columbia

  • Joint Base Anacostia-Bolling
  • Fort Eisenhower
  • Scott Air Force Base
  • Southwestern Illinois College
  • Joint Base Andrews NAF
  • Fort Leonard Wood
  • Main Campus, Webster Groves

North Carolina

  • Camp Lejeune Marine Corps Base
  • Fort Liberty (formerly Fort Bragg)

South Carolina

  • Fort Jackson
  • Myrtle Beach
  • Fort Sam Houston
  • Lackland Air Force Base
  • Randolph Air Force Base
  • San Antonio
  • Hill Air Force Base
  • Fort Belvoir
  • Shanghai University of Finance and Economics
  • University of Electronic Science and Technology of China

Netherlands

Switzerland, undergraduate.

  • Computer Science
  • Film, Television and Video Studies
  • International Relations
  • Cybersecurity Operations
  • MBA with Emphasis in Analytics
  • Doctor of Nurse Anesthesia Practice

Webster University Online

  • Data Analytics
  • Doctor of Education
  • MHA Health Administration

Certificates

  • Applied Behavior Analysis
  • Cybersecurity
  • Digital Marketing Management
  • Paralegal Studies

Webster Adds Multiple Cybersecurity and Analytics Majors in San Antonio

April 15, 2024

  • academic affairs
  • enrollment management
  • extended campus
  • george herbert walker school of business and technology

Webster University

  • MS in Cybersecurity with an Emphasis in Artificial Intelligence;
  • MS in Cybersecurity with an Emphasis in Data Analytics;
  • MS in Data Analytics;
  • MS in Marketing with an Emphasis in Analytics;
  • MS in Business Analytics;
  • MBA with an Emphasis in Analytics.

Webster was one of the first universities in the Midwest to add a cybersecurity program and did so in 2013 at the request of the United States Air Force, which had a high need for officers with cybersecurity training. In 2019, Webster University was named as the first private nonprofit university in Missouri to receive accreditation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) for Webster's Bachelor of Science in Computer Science with an Emphasis in Cybersecurity program. The accreditation was awarded through the National Center of Academic Excellence in Cyber Defense, which is jointly sponsored by the DHS and NSA.     In 2022, Webster University’s Cybersecurity program was recognized as offering one of the most innovative instructional methods among cybersecurity programs in the United States by the National CyberWatch Center.    Webster’s analytics programs have recently been expanded, as current employment trends show that the number of careers in business requiring analytics skillsets will increase by more than 10% over the next decade, which represents more than 1 million new jobs per year.      To learn more about Webster University’s Cybersecurity and Data Analytics programs, visit the George Herber Walker School of Business & Technology page . 

Related News

Several new graduate programs will be available at Webster University’s San Antonio Metro campus starting in the fall of 2024. Programs in cybersecurity...

Webster University and Jefferson College Create a Pathway for Students to Earn a Bachelor’s Degree in Biology

Webster University and Jefferson College signed an agreement on April 15 to make it easier for students in Jefferson College’s Associate of Science...

Webster University School of Education Supporting Inclusive Education Efforts in Kazakhstan

April 10, 2024

Stephanie Mahfood, interim dean of the School of Education, and the faculty and staff in the School of Education hosted a delegation of 30 education...

You're viewing this site as a domestic an international student

You're a domestic student if you are:

  • a citizen of Australia or New Zealand,
  • an Australian permanent resident, or
  • a holder of an Australian permanent humanitarian visa.

You're an international student if you are:

  • intending to study on a student visa,
  • not a citizen of Australia or New Zealand,
  • not an Australian permanent resident, or
  • a temporary resident (visa status) of Australia.

We have the answers to your postgraduate questions.

07 3346 9872

+61 7 3346 9872

 Send an enquiry

Email us, and we’ll get back to you as soon as possible.

Enquire now

Find an agent

Find a UQ agent near you.

How to apply

It’s easy, but there are a few things to consider.

Learn how to apply

Ready to apply?

Start today. Save for later if you need to.

Start application

Brochure cover for postgrad ready in 6 months.

Graduate Diploma in Cyber Security

Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future.

This one year postgraduate program aims to create specialists with a deep understanding of cyber security’s impact on every aspect of modern life, and to empower cyber security leaders for a resilient, more productive digital future.

You'll undertake advanced level courses covering a range of key topics. You'll learn about the major cyber security challenges facing the world and a range of responses, including technical, policy, organisational, governance and geopolitical.

You'll gain integrated learning experience and advance your professional network by working with a cohort with diverse backgrounds from technology, business, mathematics and humanities, unique to UQ.

As a result, you'll be equipped to look at the field from a different angle, ask bigger questions, and find new and exciting ways to tackle real and emerging cyber security threats.

An inter-disciplinary approach

It’s estimated that Australia will need an additional 18,000 cyber security professionals by 2026, so in partnership with industry experts, UQ has developed the first program to genuinely address the interdisciplinary nature of this field, while meeting the need for deep technical specialisation in core areas.

Program highlights

  • Study specialised topics such as cryptography, cyber criminology, cyber defence and leadership.
  • Gain integrated learning experience and advance your professional network.
  • Undertake an industry or research-based project to improve your workforce readiness.
  • Acquire a global perspective on cyber security and information security fundamentals.

1 in Queensland for computer science and information systems

QS World University Rankings 2024

Fields of study

Tailor your studies to suit your goals. This program offers these options:

  • Cryptography
  • Cyber Criminology
  • Cyber Defence

See all fields of study

How you'll learn

Your learning experiences are designed to best suit the learning outcomes of the courses you choose.

  • Work placements
  • Laboratory work

What you'll study

At UQ, degrees are called 'programs' and subjects are called 'courses'. Here's a sample of the courses you could study in this program:

  • Fundamentals of Cyber Security
  • Information Security Essentials
  • Cyber Security Governance, Policy, Ethics and Law
  • Cyber Criminology and Global Security

See courses and program structure

Career possibilities

Postgraduate study can take you anywhere. Depending on which field you choose, here are some of the careers you could be on your way to:

  • Cyber risk and governance consultant
  • Penetration tester
  • Cyber security analyst
  • IT security specialist
  • Cyber security designer
  • Risk and compliance analyst
  • Cloud infrastructure engineer
  • Incident response manager
  • Cyber security policy officer
  • Domain security architect

Graduate salary

Computing & information systems (postgraduate)

compared.edu.au

Next steps after graduation

  • The Australian Cyber Security Market is predicted to triple in size by 2026.
  • Cyber security specialist was the   #2 emerging job of 2020. (LinkedIn 2020 Emerging Jobs Report)

ryan-ko-master-cyber-security

Benefit from close industry ties and a breadth and depth of learning that no other cyber security university course in Australia offers. Students will spend a large portion of their studies on the job, embedded in industry and gaining experience in applying their new knowledge to tackle real and emerging cyber security threats.

mike-holm-master-cyber-security-2

There is a lack of professionals available that meet industry need for both depth and breadth of cyber security knowledge, problem solving and at least some DevOps skills. Experience and specific skills can be acquired on the job, however, job applicants with a solid knowledge of cyber security are naturally at an advantage.

corey-schou-master-of-cyber-security

Viewing cyber security in the interdisciplinary way UQ is will give it life – it’s relevant, it’s hitting areas of high demand and it helps to develop a worldwide community of highly trained and trusted professionals who can rapidly respond to new threats and problems.

Career pulse graphic illustration showing 3 students with binoculars.

UQ Career Pulse

DNA strand graphic.

Discover Postgraduate Bioinformatics

Smiling girl amongst collage of dog, violin and wind turbine

4 August - 18 August

UQ Open Day

UQ Master of Laws graduate Theresa Shaw stands smiling in a light-filled atrium

What’s it like to study a postgraduate law degree at UQ?

7-minute read

Annabelle Khoo Bachelor of Laws (Honours) student sitting in the library with a laptop smiling at the camera

4 reasons to study a law degree at UQ

Extracurricular activities for law students

Extracurricular activities and opportunities for law students

5-minute read

Entry requirements

To be eligible for entry, you'll need:

  • a bachelor's degree (or equivalent) in a relevant discipline (see below), or
  • a graduate certificate or graduate diploma or master's degree in a relevant discipline (see below).
  • 5 years of supervisory or management experience, such as managing a team or people, client accounts or major projects, resource planning, or direct responsibility for financial delegations.

Relevant disciplines for previous qualifications

Relevant Disciplines depend on the field of study you intend to choose.

  • For the Cyber Defence field of study, relevant disciplines include computer science, information technology, computer engineering, mechatronics, electrical and electronic engineering, mathematics or software engineering.
  • For the Cyber Criminology field of study, relevant disciplines include sociology, criminology, criminal justice and crime science.
  • For the Cryptography field of study, relevant disciplines include mathematics, statistics, computer science, physics, actuarial science and information technology.
  • For the Leadership field of study, relevant disciplines include commerce, management, business, accounting, information technology, computer science and leadership. 

GPA equivalent

Select where you studied and your qualification to see the GPA equivalent you need to be considered for this program.

Use the GPA equivalent as a guide. When you apply, we’ll calculate your GPA using the UQ grading scale. Any failing grades will be included. Entry requirements are subject to change.

Equivalent subjects

Related programs.

Depending on your previous qualifications and current goals, you might want to consider one of these related programs:

  • Master of Cyber Security
  • Graduate Certificate in Cyber Security

English language requirements

IELTS overall 6.5; reading 6; writing 6; speaking 6; listening 6. For other English Language Proficiency Tests and Scores approved for UQ

TOEFL iBT (including Paper Edition) - Overall 87, listening 19, reading 19, writing 21 and speaking 19.

PTE Academic - Overall Score of 64 and 60 in all sub bands.

BE - A minimum overall grade of 4 plus a minimum grade of C in all macro skills.

CES - Overall 176 and 169 in all sub bands.

OET is not accepted.

There are other ways to meet the English language requirements. For some programs, additional conditions apply.

Learn how to meet the English language requirements

Student visas

International students who are accepted into full-time study in the Graduate Diploma in Cyber Security are eligible to apply for an Australian student visa (subclass 500).

There are a number of requirements you must satisfy before a visa is granted, including the Genuine Student (GS) requirement.

Learn more about student visas

Driven and taught by some of the brightest researchers in the industry, you’ll apply theory to real-world systems, as well as undertake internships or research projects with leading Australian companies and government agencies.

You'll learn how to:

  • conceptualise, design, and build secure IT systems
  • expertly review and evaluate cyber security information.

What motivates cyber criminals? How can we better prevent victimisation? The more we interrogate these types of questions, the better we can manage and get ahead of cyber threats.

Whether you’re looking to upskill or re-stream into the cyber industry, you’ll gain the skills and knowledge to make your mark in analysis, intelligence, law enforcement, security, or research roles.

In this field of study, you'll learn how to:

  • focus on the human side of cyber crime and cyber security, and employ human-centred analysis to cyber crime and cyber security problems, and
  • examine the motivations, methods, behaviours, and beliefs underpinning cyber crime offending, victimisation, and responses.

Learn what it takes to protect systems, data, organisations and people against a variety of cyber-attacks.

A number of our courses are taught by world-renowned AusCERT experts. And as many of our staff have research connections all around the world – from Singapore, Japan and Taiwan, to NZ, Switzerland, Germany and the USA – we can set you up with opportunities to collaborate with leading minds.

  • Conceptualise, design, and build secure IT systems.
  • Identify, analyse, and prevent cyber threats to an organisation.

In an industry like cyber security, rapid change is inevitable. And as we continue to find new ways to defend, adapt to and get ahead of threats, the need for strong and innovative leadership is essential.

By studying the strengths and weakness of different leadership styles, you’ll gain a better understanding of how to implement projects, engage and inspire technical teams, and ultimately, create safer environments.

  • Provide leadership and advocacy to conduct effective cyber security.
  • Investigate, review, and evaluate cyber events and cyber crimes.

Fees and Scholarships

Indicative annual fee.

Approximate yearly cost of tuition (16 units). Your fees will vary according to your selected courses and study load. Fees are reviewed each year and may increase.

Fee information for 2025 is not yet available. Fee information displayed is for 2024.

Learn more about postgraduate fees

Approximate yearly cost of full-time tuition (16 units). Your fees will vary according to your study load. Fees are reviewed each year and may increase.

AUD $53,760

Government assistance, financial aid.

As an international student, you might be eligible for financial aid – either from your home country, or from the Australian Government.

Learn more about financial aid

Domestic places in the Graduate Diploma in Cyber Security are Commonwealth Supported. This means the cost of your education is shared between you and the Australian Government.

Instead of tuition fees, Commonwealth Supported students pay what are called student contribution amounts.

HECS-HELP is an Australian Government loan scheme to assist eligible students with the cost of their student contribution amounts.

Learn more about HECS-HELP

Centrelink support

The Australian Government offers a number of income-support payments to eligible Australian university students.

Learn about Centrelink payments for students

Scholarships

You may be eligible for more than 100 scholarships, including:

Applying online

All international applications should be submitted to UQ. If you prefer, you can use an  approved UQ agent in your country .

The program code for the Graduate Diploma in Cyber Security is  5255 .

Find out more about applying for postgraduate coursework study

All domestic applications should be submitted to UQ.

The program code for the Graduate Diploma in Cyber Security is 5255 .

Important dates

The closing date for this program is:

  • To commence study in semester 2 - May 31 of the year of commencement.
  • To commence study in semester 1 - November 30 of the previous year.

To learn more about UQ dates, including semester start dates, view the Academic Calendar .

  • To commence study in Semester 1 - January 31 of the year of commencement.
  • To commence study in Semester 2 - June 30 of the year of commencement.

Aboriginal and Torres Strait Islander applicants

For support with applying – or if you have any questions about university life – get in touch with our Aboriginal and Torres Strait Islander Studies Unit.

Contact the ATSIS Unit

Explore other programs

Graduate diploma in computer science, express yourself. and your interest..

They say choosing a degree is hard, which is why we've made it easy. Register your interest and we'll send you everything you need to know about applying to UQ.

Sign up for updates

We will use your information to keep you informed about UQ programs, news, events and scholarships. By submitting this form, you consent to the terms of UQ's Marketing consent and privacy notice .

  • Search UNH.edu
  • Search UNH Manchester

Commonly Searched Items:

  • Academic Calendar
  • Programs of Study
  • Graduate Programs
  • Academic Advising
  • Academic Services
  • Course Schedule
  • Millyard Scholars Program
  • Registration Office
  • Departments
  • Non-Degree Students
  • Student Services
  • UNH First Step
  • How to Apply
  • First-Year Students
  • Transfer Students
  • International Students
  • Graduate Students
  • Military & Veteran Students
  • Financial Aid
  • Tuition & Costs
  • Scholarships
  • Campus Tours & Events
  • Accepted Students
  • Career and Professional Success
  • Internships
  • Career Peers
  • Career Technology
  • For Employers
  • Wildcat Way to Professional Success
  • Biotechnology Innovation Center
  • NASA STEM on Station
  • Undergraduate Research
  • Winter Symposium
  • About Our City
  • Assistant Dean of Student Success
  • Campus Safety
  • Clubs & Organizations
  • Commencement
  • Current Students
  • Diversity & Inclusion
  • Housing & Dining
  • Student Engagement
  • Student Government
  • Wildcats at the YMCA
  • Directions & Parking
  • Faculty & Staff Resources
  • Event Calendar
  • STEM Discovery Lab
  • Manchester CREATES
  • STEM-MoBILE

5 Reasons to Attend a Graduate School Fair

students at unh manchester

If you’re considering graduate school, an open house is the perfect place to learn about degree programs, meet program representatives, faculty, and explore campus. Here are our top 5 reasons to join us for UNH Graduate Programs Fair on Tuesday, April 30. 

  • Meet the experts. Find the right graduate program for you by chatting with faculty about their expertise, curriculum and degree outcomes. 
  • Build your network. You’ll have the opportunity to make connections with graduate admissions staff and program coordinators —which could give you a leg up in the application process. You may also meet faculty, peers and alumni. 
  • Find your fit. Flexibility is super important for working professionals and full-time students alike. This Fair allows you to explore all learning options available to you, from online to hybrid, face-to-face and part-time.  Also current UNH undergraduate students can learn more about the Accelerated Master’s degree options.  
  • Check out campus. New to UNH? Take a campus tour to get a feel for the culture, classrooms, labs and meeting spaces. UNH’s Manchester campus is conveniently located in the heart of the city’s historic millyard. 
  • Discover resources for success. Learn about academic advising, career services and options for affordability. 

Join us for the  UNH Graduate Programs  at the Manchester campus on Tuesday, April 30 from 11 a.m. to 1:30 p.m. to learn about the opportunities for graduate study in Manchester and online. Enjoy light refreshments and workshops about putting together a graduate application, writing a personal statement and funding your graduate education.

  • Campus News
  • UNH Graduate School
  • Biotechnology: Industrial and Biomedical Sciences
  • Information Technology
  • Cybersecurity Engineering

UNH Manchester

  • Advising Appointments
  • Advising Forms
  • Foundations of Success Track
  • Frequently Asked Questions
  • Graduate Student Advising
  • New Student Advising Guide
  • New Student Registration Guide
  • Peer and Professional Tutoring
  • Become a Peer Tutor
  • Math Assessment
  • ESOL Programs
  • Student Accessibility Services
  • Study Abroad
  • Student Wellness
  • Course Delivery Modality Glossary
  • Grade Rules
  • Honors Convocation
  • January Term
  • Summer Session
  • Transcripts
  • Check the Status of Your Application
  • Great Bay Community College Pathways
  • Manchester Community College Pathways
  • NHTI Community College Pathways
  • Nashua Community College Pathways
  • Northern Essex Community College
  • White Mountains Community College
  • Previously Enrolled Students
  • Military & Veteran Services
  • Apply for Aid
  • Loan Requirements
  • New England Regional Student Program
  • Undergraduate Research Conference
  • Funding Your Research
  • Safety and Storm Closing
  • Peer Leaders
  • Leadership Opportunities
  • Rent Our Space
  • Business Office
  • CAE Faculty Resources
  • Event Resources
  • Academic Alerts
  • Employee Orientation
  • Marketing & Communications
  • Center for Community Engagement and Experiential Learning
  • College Advisory Board
  • STEM Programs for Youth
  • STEM Programs and Resources for Teachers
  • Tech for Teachers Institute
  • Request Information

IMAGES

  1. IEEE SA

    phd cybersecurity

  2. Inauguration of the PhD in Cybersecurity

    phd cybersecurity

  3. 10 Best PhD Cyber Security Online Programs [2024 Guide]

    phd cybersecurity

  4. Program Overview for Ph.D. in Cybersecurity Management

    phd cybersecurity

  5. International PhD Position in Cybersecurity for Systems in Sweden

    phd cybersecurity

  6. PhD in Cyber Security Programs 2023+

    phd cybersecurity

VIDEO

  1. Msc,PhD cybersecurity Scholarship: Application, Study & Work Life Balance

  2. Cybersecurity scholarship program

  3. Creating a cybersecurity bootcamp for high school teachers

  4. MSc Cyber Security, Admissions Webinar with special guest: Dr Fauzia Idrees

  5. How Data Security is Similar to Physical Security #cybersecurity #physicalsecurity

  6. Demystifying the NIST Cybersecurity Framework: What's New in Version 2?

COMMENTS

  1. List of Cybersecurity PhD Programs

    Learn about the benefits, trends, and options of pursuing a PhD in cybersecurity. Compare the best cybersecurity PhD programs based on industry demand, tuition, delivery method, and CAE designation.

  2. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management. Cybersecurity Ph.D. programs allow students and ...

  3. Cybersecurity, PhD Degree

    A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity program that combines a strong technical foundation with a security policy and social sciences perspective. Learn how to advance the state of the art of security in systems networks and the internet in industry, academia, and government with faculty from Northeastern's Khoury College of Computer Sciences, Department of Electrical and Computer Engineering, and College of Social Sciences and Humanities.

  4. Doctoral Degrees in Cybersecurity

    Cybersecurity doctorates offer two programs — the Ph.D. (doctor of philosophy degree) or the D.Sc. (doctor of science degree). The Ph.D. focuses on research and theory while the D.Sc. emphasizes application and action. Students who earn a Ph.D. generally want to add to the body of research or teach at the postsecondary level.

  5. Cybersecurity

    Learn how to advance the reliability and security of cyberspace as a researcher, faculty member, or policy advisor with a PhD in cybersecurity from Northeastern University. The program engages faculties from diverse backgrounds and interests, and is affiliated with the International Secure Systems Lab and the ALERT Center.

  6. Doctor of Philosophy in Cybersecurity (PhD-CY)

    The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours. *Students select one pair of research methods and directed research courses based on their own research proposal.

  7. Cybersecurity, PhD

    Cybersecurity, PhD. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet in industry, academia, and ...

  8. Computer Science (Cybersecurity), PhD

    The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance. The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including ...

  9. PhD in Cybersecurity

    The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design ...

  10. Cybersecurity

    Doctor of Philosophy (PhD) in Cybersecurity. A research-based, interdisciplinary PhD in cybersecurity spans theory and systems, from hardware to software security, from cryptography to policy, and from malware to wireless security. It seeks to prepare graduates to advance the state of the art of security in systems, networks, and the internet ...

  11. Doctoral Degrees in Cybersecurity

    What To Expect From a Doctorate in Cybersecurity Program. Because cybersecurity is a subfield of computer science, these cybersecurity doctoral programs focus on advanced topics such as information assurance, research methodologies, professional ethics, and leadership.Program lengths vary, but learners usually finish their cybersecurity doctorate in 3-7 years, with an average load of 60 credits.

  12. PhD in Computer Science

    PhD in Computer Science. The Tandon School of Engineering offers a PhD in Computer Science. Cybersecurity is a particular research strength of the program. Learn more and apply to the PhD in Computer Science through the Tandon School of Engineering.

  13. Ph.D. in Cybersecurity Management

    A graduate with a Ph.D. in Cybersecurity Management will have the ability to: acquire advanced knowledge and deeper understanding of the field of information assurance; communicate professionally and ethically about information assurance research issues; identify, analyze, and synthesize scholarly literature related to the field of information ...

  14. List of Online Cybersecurity PhD Degree Program Options

    All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.

  15. Ph.D. In Cybersecurity In The United States: A Comprehensive Guide For

    The cybersecurity Ph.D. program is a research-based doctoral program that requires candidates to specialize in areas such as cyberinfrastructure, human-centered computing, and embedded devices, to mention a couple. The Ph.D. program lasts between five and seven years.

  16. Online PhD in Cybersecurity

    PhD in Cybersecurity Program Outcomes. Formulate solutions to cybersecurity problems. Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale. Manage legal, ethical, and security risks in technology-based systems. Explain concepts and arguments associated with cybersecurity.

  17. Top 10 Best Programs for a PhD in Cyber Security

    Jobs and Salary Prospects for Doctors of Cybersecurity. Some of the common roles and median annual salaries for graduates with a PhD in cybersecurity include: Cybersecurity Engineer - $125,816. Information Security Manager - $96,406. Chief Information Security Officer (CISO) - $124,405. Security Architect - $111,433.

  18. Ph.D. Program

    Ph.D. Program. Information Security is a multi-disciplinary interest group of faculty and students who work together across department lines. Students can join by applying to the Computer Science Department. All of our students receive support, including an annual stipend, in the form of external and internal competitive fellowships, research ...

  19. Cyber Defense Doctor of Philosophy (PhDCD)

    This degree complements our PhD in Cyber Operations and fits tightly with our strategic priorities and initiatives. Our graduates obtain careers in private industries, government agencies, the military, and academia. We have a recognized excellence in cyber security, education, and research that is central to our mission.

  20. Cybersecurity (D.Sc.)

    The D.Sc. in Cybersecurity program teaches candidates higher-order thinking and diversity of thought surrounding current and future cybersecurity issues, such as exploration of new technology, the role of artificial intelligence, and research to develop expertise in an area of cybersecurity of their choice. While available online and in person ...

  21. Cybersecurity

    Harvard Graduate School of Design Harvard Graduate School of Education Harvard John A. Paulson School of Engineering and Applied Sciences ... Students enrolled in the Master of Liberal Arts program in Cybersecurity will build a strong foundation in security, privacy, and cryptography. They will acquire knowledge and skills to plan, manage, and ...

  22. Cybersecurity

    Our graduate education in cybersecurity gives you the opportunity to watch and participate remotely in the same graduate-level courses that are offered to full-time Stanford students. These courses will enhance your technical skills so you can progress in your current industry, break into your desired field, or prepare for advanced study. ...

  23. Cybersecurity MPhil/PhD

    Cybersecurity MPhil/PhD. London, Bloomsbury. It has long been recognised that cybersecurity is a 'wicked problem' - one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

  24. Webster Adds Multiple Cybersecurity and Analytics Majors in San Antonio

    Programs in cybersecurity and data analytics will be offered to students in Texas. The programs have previously been offered at Webster's main campus in St. Louis but were recently approved by the State of Texas. "San Antonio is known to be a hub for cybersecurity and data analytics. A military town that also houses NSA and the FBI.

  25. Graduate Diploma in Cyber Security

    Graduate Diploma in Cyber Security. Cyber Security. Become a leader in cyber security, equipped with new and exciting ways to meet the security challenges of the future. This one year postgraduate program aims to create specialists with a deep understanding of cyber security's impact on every aspect of modern life, and to empower cyber ...

  26. Administration officials discuss cybersecurity threats affecting

    Two Administration officials April 14 discussed how the federal government is working with hospitals and other parts of the health care sector to defend against cyber threats and mitigate cyberattacks. Anne Neuberger, deputy assistant to the president and deputy national security advisor for cyber ...

  27. Best Online Ph.D. In Management Of 2024

    Per-credit tuition rates for the 10 qualifying Ph.D. programs in our guide range from. $450 to $1,575. Over the course of a typical 60-credit Ph.D. program, this translates to between $27,000 and ...

  28. 5 Reasons to Attend a Graduate School Fair

    Biotechnology: Industrial and Biomedical Sciences. Information Technology. Cybersecurity Engineering. If you're considering graduate school, a grad fair is the perfect place to learn about degree programs, meet program representatives, faculty and explore campus. Here are our top 5 reasons to join us for UNH Graduate Programs Fair on Tuesday ...