Doctoral / PHD Programs in Cybersecurity

9 universities offer graduate PHD program in Cybersecurity

University of California-Berkeley logo
Ranked as:  #20 in Best National University
Tuition:  $29,347 per year
Total Cost:  $58,694 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  California
Acceptance:  17.48%

The Master of Information and Cybersecurity (MICS) is an online, part-time professional degree program that provides the technical skills and contextual knowledge students need to assume leadership positions in private sector technology companies as well as government and military organizations. The interdisciplinary program offers students mastery of core technical skills and fluency in the business, political, and legal context for cybersecurity, as well as managing cyber risk in the service of strategic decision making.

The core MICS curriculum includes cryptography, secure programming, systems security, and the ethical, legal, and economic framework of cybersecurity. In addition, students may select from a wide variety of electives covering topics such as privacy engineering, managing cyber risk, and usable security. MICS features a project-based approach to learning and encourages the pragmatic application of a variety of different tools and methods to solve complex problems.

Graduates of the program will be able to:.

Understand the ethical and legal requirements associated with cybersecurity and data privacy .

Prepare to lead, manage, and contribute to building cybersecurity solutions and.

The I School also offers a master in Information and Data Science (MIDS), a master in Information Management and Systems (MIMS), and a doctoral degree (PhD) program in Information Science.

˅ More Details
  • GRE Required:  Yes
  • Research Assistantships:  1754
  • Teaching Assistantships:  3621
  • Financial Aid: Register to view the details
Northeastern University logo
Ranked as:  #44 in Best National University
Tuition:  $55,452 per year
Total Cost:  $110,904 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  Massachusetts
Acceptance:  20.48%

Cybersecurity engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities.

In addition to focusing on using technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures.

Our program is affiliated with the International Secure Systems Lab, a collaboration between European and US researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues. We are also the lead institution in the ALERT Center, a multi-university land Security Center of Excellence involved in research, education, and technology related to threats from explosives.

Admitted PhD students are guaranteed full tuition scholarship and are supported with stipends or fellowships for the first five years of their program.

Northeastern University has been designated by the National Security Agency and the U.S. land Security as a Center of Academic Excellence in Information Assurance Cyber Defense, in IA Research, and in Cyber Operations.

Interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs and makes it unique in the Boston area.

Statement of purpose that should include career goals and expected outcomes and benefits from the program.

Degree earned or in progress at an U.S. institution.

Degree earned or in progress at an institution where English is the only medium of instruction.

Applicants must submit the online application and all required admission materials no later than the stated deadlines to be considered for admission. Admissions decisions are made on a rolling basis.

˅ More Details

Cybersecurity

  • GRE Required:  No
  • Research Assistantships:  784
  • Teaching Assistantships:  457
  • Financial Aid: Register to view the details
logo
Ranked as:  #127 in Best National University
Tuition:  $31,338 per year
Total Cost:  $62,676 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  New Jersey
Acceptance:  76.28%

Ph.D. Program Summary of Requirements Transfer of Credits Scholastic Standing Thesis Format Breadth Requirement Depth Requirement Dissertation Requirement Master Degree to Doctorate Degree Financial Aid Admission Requirements In-House Residence Doctoral Requirements Study Plans Learning Goals Ph.D. Alumni Course Load Computer Science Program Dissertation Committee Proposal Complaint Appeals Process PhD.

Activities outside the Department Research Centers Cooperative Program with Princeton University.

Intelligent Systems Artificial Intelligence Computational Biomedicine, Medical Imaging and Bioinformatics Computational Neuroscience Computer Animation, Graphics and Simulation Computer Vision Data Science and Social Networks Human-Computer Interaction Knowledge Representation Language Technologies Machine Learning Robotics.

The Department Employment details Industrial Affiliates Program.

Academic Integrity Policy Introduction Examinations Programming Assignments Sample BA Schedule Sample BS Schedule.

Computer and Network Systems Computer Architecture Computer Security Computer Systems (Operating Systems) Cyber-Physical Systems Databases and Information Systems High-Performance Computing Mobile Systems and Networks Networks and Distributed Systems Programming Languages And Compilers Software Engineering.

˅ More Details

Error Page

  • GRE Required:  Yes
  • Research Assistantships:  45
  • Teaching Assistantships:  28
  • Financial Aid: Register to view the details
we can find best-fit college

443 universities offer the Master's program in Cybersecurity.

Which one best suits your need?

Please select a program.
Select a program:
Please choose a course.
Please choose a specialization.
Please choose an option.
Have you taken the GRE?
GRE quantitative field is required. (Minimum: 80 | Maximum: 170)
GRE Verbal field is required. (Minimum: 80 | Maximum: 170)
GRE AWA field is required. (Minimum: 0 | Maximum: 6)
Please choose a type of university.
Type of University:
Education level completed:
Please choose a price interval.
$5000 $80000
Tuition sorting:
Please provide a First Name.
Please provide a Last Name.
Please provide a name.
Please provide your address.
Please, enter valid email address.
Please, enter valid phone.
Please, enter valid phone.
University of Alabama at Birmingham logo
Ranked as:  #137 in Best National University
Tuition:  $19,188 per year
Total Cost:  $38,376 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  Alabama
Acceptance:  80.6%

In January 2023, Fortune ranked UAB M.S. in Cyber Security as the No. 1 program in the country.

The National Science Foundation has recently (2023) provided UAB with a grant totaling US $4.6 million to train the next generation of cyber-security professionals with the state of the art knowledge and skills in applying machine learning and artificial intelligence to solve real world cyber-security problems.

The program also provides current employees in the public and private sectors an opportunity to obtain advanced-level, high-quality training in the core areas of computer forensics, information security management, and forensic accounting, to facilitate career advancement.

Frank Barefield, Jr. Criminal Justice (College of Arts and Sciences.).

Learn the Cybercorps: Scholarship for Service program.

BSN to DNP Pathway (DNP) for Nurse Practitioners.

Public Health and Doctor of Veterinary Medicine (MPH DVM).

˅ More Details
  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details
logo
Ranked as:  #51 in Best Regional University in West Coast
Tuition:  $25,774 per year
Total Cost:  $51,548 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  Colorado
Acceptance:  89.61%

Computer Science Electrical and Computer Engineering Mechanical and Aerospace EngineeringEngineering Online Graduate Programs.

The College of Engineering and Applied Science at UCCS offers a new Security specialty in the Ph.D. Security degree program, starting in Fall 2008. The nation-wide unique specialty offers the security curriculum for students to study and conduct multi-disciplinary research in areas of cyber security, physical security, and land security, which have become critical and increasingly urgent in today personal, business, and government operations.

The National Security Agency and the land Security have designated the University of Colorado, Colorado Springs as a National Center of Academic Excellence in Information Assurance Education (CAE IAE). This designation covers academic years 2014 through 2021. information our IA programs and activities can be accessed at the Center of Information Assurance and Security Technology (CIAST) at UCCS.

Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011.

CS6930 Advanced Topics in Web Security and Privacy.

Graduates of the PhD Sec program produce independent innovative computer science security research results.

Graduates of the PhD Sec program practice lifelong learning and keep themselves up to date with emerging computer science security knowledge.

Graduates of the PhD Sec program produce significant research results and contribute to Computer Science Journals and Conferences.

As this degree is housed in the Computer Science Department, knowledgeable background in the industry, or a closely related field is desired. This degree is on campus, attendance is required. Typically classes are offered Monday through Thursday for adult professionals after 4 p.m., however, classes may be scheduled at any time. The PhD committee will review all applicants for admission and will be looking for these specific classes:.

CS 2160 Computer Organization and Assembly Language Programming.

A student can be admitted as a regular degree student if the student satisfies the following conditions:.

The student holds a bachelor degree or a master degree in any of the branches of science, technology, engineering and mathematics (STEM), land security, or closely related field from a college or university of recognized standing. Depending on the PhD track, program candidates may be required to the complete prerequisite courses in STEM and or land security policy. A student who is admitted without a master degree may earn that degree as a part of the Ph.D. studies.

The student has at least a 3.3 grade point average (on a scale of 4.0) in the bachelor or master degree program attempted. Graduate students in the University land Defense Certificate program must complete the certificate with a 3.3 GPA or better prior to starting Security PhD studies.

U.S. resident applicants that have not graduated from a program of recognized standing, must take the Graduate Record Examination (GRE) with a minimum score of 148 (new grading scale) on the quantitative portion.

Applicants with any foreign post-secondary course work should also submit a course-by-course evaluation by a NACES member.

Applications received later than these dates or incomplete by these dates may be considered for the following semester. It is the student responsibility to follow up to make sure all materials are received on time.

A TOEFL score of 80 of higher, an ILETS of 6.5 or higher, or a Duolingo exam score of 115 will be required for proof of English Proficiency. If the student has completed a degree in the US, this requirement may be waived.

These transcripts must include all courses and grades, must be issued in the original language, and be accompanied by certified English translations when applicable. This service is provided at no cost for UCCS applicants. details will be communicated to you via email after we received your completed application.

Applicants will be evaluated on the strength of their academic background and experiences. After completing the noted provisional requirements, the provisional student will be considered for regular admission. If admission is denied at this time, the student will be dismissed from the program. Recommendation for change from provisional status to regular degree status will be based on grades received in all courses taken during provisional status. Credit earned while in provisional status will count towards the Ph.D. if and when the student moves from provisional to regular status.

International Students: Fall Start March 1st Spring Start October 1st.

For scholarship consideration, we encourage you to apply by March 1st. If you are an international student who will need a visa, we recommend you complete the application process by March 1st to give enough time for application review and visa processing.

In addition, the student must have demonstrated the ability to work independently and make original contributions to the field. No single prescribed set of courses can be established that, when completed, guarantee the student has attained this high level. Rather, the degree is conferred after the student has satisfied both a course work and an independent study requirement under the supervision of a committee.

The program is research oriented with a strong self learning component. They will provide opportunities for students to apply what they learn in the self paced courses and to learn coordinate and cooperate in cyber war and land defense scenarios. Students have to come to the workshop at least once a year to report their research progress in the past year and the plan for the following year.

A total of 60 credit hours is required for the degree. In all cases, 30 semester hours of dissertation credits are required. All PhD students will be required to take CS 6000, Intro to Computer Science Research. Beyond the traditional learning component, the students in the program will be required to have at least three months of operational security experience (as internship, training, etc.), as determined by the PESC. This requirement can be substituted with a peer-reviewed publication or by passing CISSP certificate examination.

Many security related research projects are conducted at the following:.

˅ More Details
  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details
logo
Tuition:  $11,786 per year
Total Cost:  $23,572 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  Maryland
Acceptance:  84.36%

Earn a doctorate degree in Cyber Leadership, help lead innovation in an in-demand industry.

The Doctor of Philosophy (PhD) in Cyber Leadership provides students with the opportunity to conduct extensive and sustained original research at the highest level in the field of Cyber Leadership. Cyber Leadership is the branch of computer science and cybersecurity that focuses on the development of the planning, management and implementation of the leadership needed for the system to work efficiently. As a result, Cyber Leadership is an interdisciplinary field that now includes a wide range of disciplines such as computers, cybersecurity, management, strategy, and logistics.

Cyber Leadership is one of the most rapidly growing fields, permeating all sectors of our lives as the Internet of Things (IoT) becomes integral to life, work, national security. As such, there is a need for innovative researchers and practitioners who desire to elevate their skills to the highest level and contribute to the body of knowledge in Cyber Leadership.

The Center for Cybersecurity Research and Analysis serves as the university hub for training, research, analysis, and programming in all things cybersecurity. Learn to defeat simulated cyberattacks, land an internship where you can put your skills to work and prepare for the workforce, publish a scholarly article addressing an existing challenge in the field, and much .

Program is 100% online, with no on-campus classes or residencies required, allowing you the flexibility needed to balance your studies and career.

Cybersecurity may be completed with a minimum of 60 credit hours, but may require additional credit hours, depending on the time required to complete the dissertation publication research. Students who are not prepared to defend after completion of the 60 credits will be required to enroll in RSC-899, a one-credit, eight-week continuation course.

CSL 810 Cybersecurity Leadership Research Methodologies (Prerequisite: CSL-800).

CSL-900 Cybersecurity Leadership Doctoral Writing I (Prerequisite: none).

CSL-910 Cybersecurity Leadership Doctoral Writing II (Prerequisite: CSL-900).

CSL-920 Cybersecurity Leadership Doctoral Writing III (Prerequisite: CSL910).

CSL-930 Cybersecurity Leadership Doctoral Writing IV (Prerequisite: CSL-920).

Students will integrate and synthesize alternate, divergent, or contradictory perspectives or ideas fully within the field of Cyber Leadership.

Students will demonstrate advanced knowledge and competencies in Cyber Leadership.

Students will analyze theories, tools, and frameworks used in Cyber Leadership.

Students will execute a plan to complete a significant piece of scholarly work in Cyber Leadership.

Students will evaluate the legal, social, economic, environmental, and ethical impact of actions within Cyber Leadership and demonstrate advanced skill in integrating the results into the leadership decision-making process.

Students will develop skill to implement cyber systems and plans needed for advanced global protection.

Students will critique human skills and practices for selecting teams that work in cyber areas.

Graduates will integrate the theoretical basis and practical applications of Cyber Leadership into their professional work.

Graduates will demonstrate the highest mastery of Cyber Leadership.

Graduates will contribute to the body of knowledge in the study of Cyber Leadership.

Graduates will be at the forefront of planning cyber personnel and systems.

The following rates are in effect for the 2024-2025 academic year, beginning in Fall 2024 and continuing through Summer 2025:.

The per-credit charge for doctorate courses is $950. This is the same for in-state and out-of-state students.

Active duty military receive a $100 per credit hour tuition discount for doctorate level coursework.

Find additional information for 2024-2025 doctorate tuition and fees.

˅ More Details
  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details
logo
Tuition:  $18,095 per year
Total Cost:  $36,190 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  California
Acceptance:  -

National and Northcentral have merged, and this program is now offered by NU.

The Cybersecurity doctorate is designed to prepare researchers with technology strategies that are applicable to leading positions in both the private and public sectors. Our program offers four specializations that allow you to tailor your studies and research to match your interest in a specific area of cybersecurity.

The PhD program requires a minimum of 60 credits. Additional credit hours may be allowed as needed to complete the dissertation research. If granted, additional courses will be added to the student degree program in alignment with the SAP and Academic Maximum Time to Completion policies. Students who do not complete their program in accordance with these policies may be dismissed.

The PhD in Cybersecurity requires eight foundation core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours.

Students select one pair of research methods and directed research courses based on their own research proposal.

The PhD in Cybersecurity requires the following courses for every specialization:.

In this course, students are prepared for an understanding of networks and related theory to support computer science, cybersecurity, and technology management needs. Students will learn network concepts, as well as designing networks for reliability, availability, confidentiality, and network monitoring. Content will include high-level design of networks, evaluation of service providers, and strategies to prepare an organization for future communication needs (such as multi-cloud, satellite, 5G 6G, and quantum data communications, plus related security techniques). Students will learn network design, planning, the role of network data communication devices, global access, and safe third-party data exchange.

This course will consolidate a foundation of concepts relating to security and cybersecurity, enabling the successful examination of greater detail and complexity in later courses. You will examine the full range from governance through compliance with laws, through people risks, to technology. You will study the need to protect organizations from future exposures and apply critical thinking and synthesis to motivate the resources needed to defend an organization.

Cybersecurity has the primary objective of averting losses and restoring proper operations should there be a loss. During this course you will study the foundations of risk and the opportunities to reduce cybersecurity losses for organizations. Risk assessment abilities and research options form the base of cyber defenses and determine the need for subsequent resources. The course continues with measuring risk and events leading to the identification of potential incidents and solutions. Learning contingencies consider the needs of the organization, maintaining operations, and preparing for the best recovery should there be a loss.

Tracking and responding to cyber events requires massive databases integrating content from all devices at every location. In this course you will learn techniques to capture and display relevant data and leverage automation to reduce losses. Data manipulation, automated sense-making, appropriate fast reactions, machine learning, data analysis, and presentation are rapidly developing cybersecurity techniques. You will also leverage required capabilities for the defense of the organization, respond to enhanced threat complexity and capabilities, and address the need to counter data poisoning by threat actors.

Risk management is the foundation of defending organizations from information security, cyber threats, compliance, audit, and privacy exposures. To address risk and assurance, this course builds an integrated approach solution leading to the prioritization of resources for an organization. You will extend your knowledge and skills for global protection within and beyond the perimeter. This course positions the importance of risk management within a cybersecurity program and its role within Enterprise Risk Management (ERM). You will also assess theories and practices concerning risk management, compose a risk strategy, and leverage maturity models to improve the protection of organizations.

This course serves as an extensive exploration of statistics for the technology leader. Included in the course, is an advanced examination of statistical analyses commonly used for information systems and technology research. During this course, you will use different statistical tools to enhance your advanced analytical skills. These statistical analysis skills are required to plan, conduct, and interpret quantitative data to inform enterprise decisions. You will also learn to illustrate and produce technical output reports.

Global integration and broad alliances between criminal elements and nation-states frequently lead to rapidly changing and significant threats to all nations, organizations, and citizens. During this course, you will study current and predictable threats, target critical infrastructure, and determine risks implied in new technology. You will also learn to recognize the risks originating from cybercriminals, terrorism, hacktivism, and nation-state, and other significant threat actors. You will devise and work to get funding for viable strategies to defend critical infrastructures, organizations, and the citizens of the nation.

This course provides a survey of the different methods used to conduct technology-based research. During this course, you will learn the research principles and methodologies that guide scientific inquiry in order to develop an understanding of the effects of research on individuals and organizations. Specifically, you will study the scientific research lifecycle, data collection methods, and research design methodology. You will finish the course by selecting a research design methodology to support your research interests through the remainder of your program.

The results of technical research are frequently used to support informed management decisions. This course provides technology leaders and professionals with the skills needed to design and conduct quantitative research studies to support specific types of data. During this advanced course in research, you will explore and apply different types of quantitative research methods and statistical techniques. You will also explore instrumentation, data collection, and data analysis tools and techniques to create aligned, ethical, and substantive research designs.

A quantitative research design includes objective analysis using experimental, quasi-experimental, and related techniques. Technical quantitative research involves statistical analysis of data collected from a larger number of participants to determine an outcome that can be applied to a general population. During this course, you will work through the scientific research process and apply your knowledge of quantitative research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.

The results of qualitative research are frequently used to support informed management decisions. This course provides technology leaders with an in-depth introduction to qualitative methods for studying human behavior, including grounded theory, narrative analysis, and case studies. During this advanced course in research, you will apply qualitative research methods to an information technology-based study. You will also deepen your research knowledge and skills by conducting interviews, collecting and coding data, producing ethical data conclusions, and creating objective research reports.

A qualitative approach to research of a technical nature integrates theoretical, conceptual, and empirical constructs with common practices and experience to gain an understanding of performance and functionality, develop an applied and testable model for improvement, or provide insights into problems to develop new ideas. During this course, you will work through the scientific research process and apply your knowledge of qualitative research design to develop a technical research proposal to support your research interests through the remainder of your program.

The results of technical research are frequently used to develop new products and services. This course provides technology leaders and professionals with the skills needed to design and conduct constructive research studies based on theory. During this advanced course in research, you will examine the methods and measurements used to design constructive research studies to develop sound technical solutions or prototypes. You will also explore software and security testing tools and user acceptance testing methods in order to create aligned, ethical, and substantive research designs.

Technical constructive research focuses on models, frameworks, tools, and software used by industry to improve value creation. A constructive approach to research of a technical nature integrates theoretical and empirical constructs with common practices and experience to develop an applied and testable model to improve the fields of computer science and information technology. During this course, you will work through the scientific research process and apply your knowledge of constructive research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.

The Pre-Candidacy Prospectus course is intended to ensure students have mastered knowledge of their discipline within cybersecurity prior to doctoral candidacy status and are able to demonstrate the ability to design empirical research as an investigator before moving on to the dissertation research coursework. During this course, you will demonstrate the ability to synthesize empirical, peer-reviewed research to prepare for the dissertation sequence of courses. This course should be completed only after the completion of all foundation, specialization, and research courses.

Students in this course will be required to complete Chapter 1 of their dissertation proposal including a review of literature with substantiating evidence of the problem, the research purpose and questions, the intended methodological design and approach, and the significance of the study. A completed, committee approved (against the minimum rubric standards) Chapter 1 is required to pass this course successfully. Students who do not receive approval of Chapter 1 to minimum standards will be able to take up to three supplementary 8-week courses to finalize and gain approval of Chapter 1.

Students in this course will be required to work on completing Chapters 1-3 of their dissertation proposal and receive committee approval for the Dissertation Proposal (DP) in order to pass the class. Chapter 2 consists of the literature review. Chapter 3 covers the research methodology method and design and to includes population, sample, measurement instruments, data collection and analysis, limitations, and ethical considerations. In this course, a completed, committee-approved Chapters 2 and 3 are required and, by the end of the course, a final approved dissertation proposal (against the minimum rubric standards). Students who do not receive approval of the dissertation proposal will be able to take up to three supplementary 8-week courses to finalize and gain approval of these requirements.

Students in this course will be required to prepare, submit, and obtain approval of their IRB application, collect data, and submit a final study closure form to the IRB. Students still in data collection at the end of the 12-week course will be able to take up to three supplementary 8-week courses to complete data collection and file an IRB study closure form.

In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.

The Doctor of Philosophy in Cybersecurity (PhD-CY), General and Technology specialization degree builds on the core computing principles and cybersecurity best practices, frameworks, and models. The degree provides a broad adding governance and strategic views to compliment forensic, software development cloud, and systems certification content. Students use firsthand experience, explore advanced topics, learn the latest and anticipated concepts, consider the evolution of risks and mitigation, learn advanced threat detection, and propose their own research. The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors.

15 Credit Hours Total. Each course is 3 semester credits and runs 8 weeks.

The Doctor of Philosophy in Cybersecurity (PhD-CY), Global Policy and Operations specialization builds on the core program general principles, best practices, frameworks, and models. The specialization adds specific global solutions through an integrated strategy and leadership capabilities to establish global operations.

The focus is on solving challenges of multi-time zone, multi-continent, and a range of laws, languages, and cultures. Specific considerations include diverse technologies, challenging support structures, and cyber target domains. The complication of widely distributed infrastructure, diverse political influences, and complex chains form part of the predictive strategy and the creation of operational excellence.

The Doctor of Philosophy in Cybersecurity (PhD-CY), Governance, Risk, and Compliance specialization combines the four knowledge areas to complete research or synthesize cybersecurity solutions for enterprises subject to national exposures and global threats. The combined resolution of risk, compliance, audit, and privacy will enable graduates to create enhanced solutions while limiting the need for resources.

The Doctor of Philosophy in Cybersecurity (PhD-CY), Secure Cloud Computing specialization builds on best practices, frameworks and models to synthesize unique solutions that optimize organization outcomes. The specialization investigates current and anticipated needs and solutions emphasizing the cloud computing. Learning and research adds practical and strategic insights to enable reduced risks for cloud computing and multi-cloud cybersecurity solutions.

The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors where advanced or complex cloud computing is important. Competencies include complex secure data communications, identity management, and access controls.

Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.

Facilitate the protection of critical information resources from current and future loss.

The most demanding jobs in the field of cybersecurity require experienced professionals with advanced, industry-current knowledge and skills to develop security standards and best practices for their organization. the BLS also states the median annual wage for IS analysts was $102,600 in May 2021, with the highest 10 percent earning than $165,920.

Employers of senior-level cybersecurity professionals are spread across every industry, including: professional, scientific and technical services, finance and insurance, manufacturing, information services, healthcare, and administrative support services.

Positions may require additional experience, training, and other factors beyond successfully completing this degree program. Depending on where you reside, many positions may also require state licensure, and it is the responsibility of the student to ensure that all licensure requirements are met. Any data provided on this page is for informational purposes only and does not guarantee that completion of any degree program will achieve the underlying occupation or commensurate salary.

SOURCE: Emsi Labor Analyst Report. DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth. Current and prospective students should use this data with other available economic data to inform their educational decisions.

Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.

Our course structure is built to make earning your degree accessible and achievable by offering a rigorous, yet flexible program that works with your schedule.

We know your life may not happen on a 9-5 schedule, so we offer courses online.

A PhD dissertation is a scholarly documentation of research that makes an original contribution to the field of study. This process requires care in choosing a topic, documenting its importance, planning the methodology, and conducting the research. These activities lead smoothly into the writing and oral presentation of the dissertation.

A doctoral candidate must be continuously enrolled throughout the series of dissertation courses. Dissertation courses are automatically scheduled and accepted without a break in scheduling to ensure that students remain in continuous enrollment throughout the dissertation course sequence. If additional time is required to complete any of the dissertation courses, students must re-enroll and pay the tuition for that course. Continuous enrollment will only be permitted when students demonstrate progress toward completing dissertation requirements. The Dissertation Committee determines progress.

National University is dedicated to assisting students in the achievement of their academic aspirations and helping them become valuable contributors to their community and profession. To accomplish this, we now offer a dissertation completion pathway for students who have successfully completed their doctoral coursework and achieved doctoral candidacy at a previous institution but were unable to complete their dissertation.

Our Dissertation Completion Pathway (DCP) offers a unique opportunity for students to complete their doctorate in one of the doctoral programs offered at NU (excluding the PhD in MFT, DMFT, DNP, and DHA).

Or ABD students a structured approach for completing their dissertation and help them achieve their academic goals in obtaining their doctorate. This pathway provides a student-centered, high touch, and structured pathway that recognizes past academic coursework while providing the student with the preparation and guidance to earn their doctoral degree.

National University allows 7 years to complete all doctoral programs of 60 credits or less. The median time to completion for this program is 44 months.

Time to completion varies depending upon the pace in which a student completes courses and the number of transfer credits accepted.

The highest degree for cybersecurity is typically a Doctor of Philosophy (PhD) in Cybersecurity or a related field. This degree typically requires several years of advanced coursework and research, and is designed for individuals who want to pursue careers in cybersecurity research, academia, or leadership positions.

Whether a PhD in cybersecurity is worth it depends on your career goals and personal interests. If you want to pursue a career in cybersecurity research or academia, a PhD can be a valuable asset that can lead to job opportunities and higher salaries.

According to payscale.com, the average base salary for someone with a PhD in Cybersecurity is around $172,000 per year in the United States.

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state country.

Program availability varies by state. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, regist

˅ More Details

Doctor of Philosophy in Cybersecurity (PhD-CY)

  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details
logo
Tuition:  $15,480 per year
Total Cost:  $30,960 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  California
Acceptance:  89.36%

Return to Doctor of Philosophy Degree in Technology Management (PhD-TM).

The risks associated with possible data theft and other malicious interventions have become ever greater. In this program, you will be encouraged to think outside of the box as an innovation leader who stays one step ahead of those dedicated to breaching security. Our PhD Cybersecurity specialization will prepare you for a variety of technology leadership roles in both government and private organizations. Upon graduation, you will be well prepared to anticipate and mitigate risks in managing and deploying data-intensive systems.

NU offers weekly course starts, no scheduled lecture hours, no group assignments, weekly assignments, and the ability to schedule courses around your personal and professional obligations.

No matter the degree level you pursue, you can rest assured that you will be mentored by doctors in your field of study.

Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale.

Manage legal, ethical, and security risks in technology-based systems.

Finish their doctoral degree.

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state country.

Program availability varies by state. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and or licensing authority.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

I confirm that the information provided on this form is accurate and complete. I also understand that certain degree programs may not be available in all states. Message and data rates may apply. Message frequency may vary.

I understand that consent is not a condition to purchase any goods, services or property, and that I may withdraw my consent at any time by sending an email to [email protected] I understand that if I am submitting my personal data from outside of the United States, I am consenting to the transfer of my personal data to, and its storage in, the United States, and I understand that my personal data will be subject to processing in accordance with U.S. laws, unless stated otherwise in our privacy policy.

˅ More Details

Online PhD in Cybersecurity

  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details
logo
Tuition:  $15,704 per year
Total Cost:  $31,408 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  Texas
Acceptance:  92.5%

Prepares graduates to strengthen the security of business, industry, or government organizations.

At SHSU Online, we understand that your degree needs to work for you. it signifies your accomplishment and expertise to the world.

You earn a degree from SHSU by accumulating course credit hours.

You earn course credit hours by completing in-person courses and or online courses, or through transferred credits from another institution.

Even if you earn all of your course credit hours online. Your degree will be the same regardless of how you earn your credit hours.

Sam Houston State University is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award bachelors, masters and doctoral degrees.

˅ More Details

Masters of Science in Information Assurance and Security

  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details
logo
Tuition:  $21,174 per year
Total Cost:  $42,348 * This tuition data is based on IPEDS. For the latest tuition amount, refer to the respective college websites.
State:  Georgia
Acceptance:  83.11%

There is no better choice for graduate education than Kennesaw State University.

KSU offers 180+ bachelor master doctoral degrees and programs.

See for yourself why KSU is the ideal choice. Our in-person campus tours are designed specifically for students and their families. Led by a tour guide, the campus tour highlights academic programs, housing, dining and admissions.

˅ More Details

Graduate Admissions

  • GRE Required:  Register to view the details
  • Research Assistantships:  Register to view the details
  • Teaching Assistantships:  Register to view the details
  • Financial Aid: Register to view the details

What kind of scholarships are available for Graduate Programs in Cybersecurity?

We have 155 scholarships awarding up to $1,270,915 for Masters program in for Cybersecurity, targeting diverse candidates and not restricted to state or school-based programs.

Scholarship nameAmountCredibility
ASNT Fellowship Award$20,000High
Google Lime Scholarship$5,000High
The Innovator’s Grant$3,600High
GeneTex Scholarship Program$2,000High
GMiS STEM Scholarships$500High

Find scholarships and financial aid for Cybersecurity graduate programs

$500 $20000

How can I compare the Cybersecurity Graduate Programs?

Compare the GRE score requirements, admission details, credit requirements and tuition for the Master's Program, from 443 universities offering Graduate PHD/Doctoral Programs in Cybersecurity. Compare Graduate PHD/Doctoral Programs in Cybersecurity

How will you rate the search results?

 0.0 rating, based on 0 reviews

Your review has been sent

Select rating
Your review must be at least 10 characters long
Your review must be not longer than 2000 characters