Cybersecurity Guide

Research with impact: Find online cybersecurity PhD programs

In this guide

  • 2024 rankings
  • Steps to get an online PhD
  • Financial assistance
  • Career paths
  • School listings

The digital landscape is changing, and so is higher education. Online PhD programs in cybersecurity are not just trending, they’re revolutionizing the way we cultivate experts in the field.

Whether you’re a student eyeing advanced studies or an institution looking to expand your curriculum, discover why an online PhD in cybersecurity degree is becoming the go-to option for next-level learning and expertise.

Programs to make the public aware of the problem and attract bright young minds to the profession are becoming more widespread and are starting to have an effect.

With the ranks of willing candidates beginning to swell, certificate, training and education programs are in great demand. The number of available degree programs offered by colleges in particular is gaining momentum .

Bachelor’s degrees have become a near necessity for new cybersecurity professionals in recent years. And higher-level positions like chief information security officers (CISOs) often require a master’s degree . 

At present, though, the need for doctorate degrees in cybersecurity is becoming evident.

High-level management positions, higher-education faculty posts, and advanced research initiatives are all growing in demand much more quickly than the numbers of candidates to fill them.

Generally speaking, most doctoral candidates will fill the rapidly expanding and critical roles of educators, consultants, and researchers.

PhD’s (doctor of philosophy degrees) and DSc’s (doctor of science degrees) are designed for these roles.

PhD’s tend to focus on theory and research, while DSc’s study research and technical expertise. With more focus on technical knowledge, DSc’s sometimes continue working directly in practical applications within the field.

On the other hand, DPS’s (doctor of professional studies degrees) are almost entirely devoted to the highest levels of training in hands-on practical knowledge and skills instead of theory and research. 

All three types of doctoral programs are now available to those wishing to advance their careers to the pinnacle of the cybersecurity field.

However, PhD is by far the most commonly offered doctoral cybersecurity degree at present, followed by DSc’s and DPS’s.

The world has a critical need for infosec practitioners, but there is also an equally essential need to expand the capacity of our educational institutions to teach new practitioners.

We also are in dire need of advanced, innovative, strategic thinkers to conduct research in the science of cybersecurity.

Best online cybersecurity PhD programs for 2024

Capella university, capitol technology university, nova southeastern university, the george washington university, mississippi state university, marymount university.

These rankings were compiled from data accessed in November 2023 from Integrated Post-Secondary Education Data System (IPEDS) and College Navigator (both services National Center for Education Statistics). Tuition data was pulled from individual university websites and is current as of November 2023.

Obtaining an online cybersecurity PhD 

Six steps for choosing an online phd cybersecurity program.

So with all of these options available, as well as a growing number of colleges offering these programs, how can one best decide which direction is right for you? Here is a quick six-step process to help.

1. Self-appraisal : Those looking to expand their knowledge and background in cybersecurity with a PhD have already succeeded in attaining lesser degrees and certifications, and likely have several years of work experience as well.

That education, and exposure to practical applications provide an excellent overall view of the infosec world. All that experience will be critical in deciding exactly which direction to explore in the next phase of a career. The biggest decisions are of two types. 

  • Are online PhD programs the right way to go, or would real-time college be a better choice? 
  • Is a future in research, education or consulting the right path? Or is work in a real-world application a better fit? Picking the correct answer to both questions will take a good bit of introspective research. And the decisions shouldn’t be made without a thorough self-inspection.

2. Admission requirements : As with any college degree, each individual institution offering it will have its own views of what a desirable PhD candidate should look like.

All require at least a BS degree, some require an MS. But there are often loose specifications as to what discipline the degrees must be in, like STEM or computer science. Other demands may include a minimum GPA threshold, usually 3.0 or higher, and GRE test scores. 

Waivers are for the GRE tests are often granted for candidates with strong academic or professional backgrounds. The rest is normally just paperwork, like a personal goal statement, personal and work references, a current resume, and college transcripts.

The primary point here is to pay attention to the requirements of each school under consideration, and whether it will necessitate more time, classwork, certifications, etc. to comply with these demands.

3. Tuition and scholarships : Unless an early career left a PhD candidate with an abundance of cash, money will always be a concern.

Obviously, tuition is the first number to check. But don’t stop with that. There are almost always alternatives for financial assistance available from the school, private scholarship sources, and sometimes government agencies attempting to increase the cybersecurity workforce.

And, of course, government-sponsored and private education loans exist .                                                                                                                            

4. School reputation, course quality and availability : To get the most return out of an investment of time and money in education, it’s always best to choose from schools with the best reputation among cybersecurity professionals.

Specific courses and available concentrations vary from one school to another. Students must therefore make sure a particular school’s special course offerings match their needs and desires. 

5. Centers for Academic Excellence in Cyber Defense : US government intelligence agencies are perhaps the organizations most interested in developing the science and resources needed to conduct the most extensive, advanced and complete cybersecurity operations anywhere.

The National Security Agency ( NSA ) and the Department of Homeland Security ( DHS ) jointly sponsor a program to promote cybersecurity education called National Centers for Academic Excellence in Cyber Defense ( CAE-CD ). NSA conducts extensive reviews and audits of colleges offering cybersecurity college degrees and designates a select few with CAE approval .

Choosing an institution approved by the NSA provides a high level of certainty that the program offered is of the highest quality. It will also give graduates a leg up on securing a career with federal government intelligence agencies. NSA recently published a fact sheet showing 272 CAE-CD approved institutions across the country. 

6. Dissertation research options and faculty : A critical part of any masters or doctoral degree is the dissertation. The exact topic and focus do not need to be determined at the outset of entering the program.

However, it should be possible to know that faculty members and other available resources provide the greatest knowledge, technology and other means of support for the student’s specialty. 

What to look for in an online PhD cybersecurity program

For any given doctoral candidate, enrolling in an online program offering the best and most numerous courses within the cybersecurity specialty desired may be top on the list of criteria.

One should also research the infosec faculty members at the school to determine which and how many have expertise within that students focus.

If possible, a chance to meet these faculty members may be very illuminating. Requesting the opportunity to audit one or more classes will also provide invaluable insight into how courses are structured and how close a fit the tutorial style may be.

Opting to attend a PhD program with the best possible reputation among cybersecurity professionals will help open doors when it comes time to find a post-doctoral job. 

An institution that cultivates an innovative environment and offers the latest in technological capabilities will help maximize the educational experience. It will also be of great educational benefit to attend a college that fosters consultative communications among students and faculty.

Probably the easiest variables to determine are tuition costs and the availability of school offered financial assistance, especially scholarships, grants, other offsets to student expenses.

Online PhD cybersecurity program timeline

Typically, obtaining a doctorate in cybersecurity will require between three and seven years of dedication.

The specific timeline will depend upon the individual college and the level of testing and qualification required for each student to be accepted into a program.

Coursework can take up to three years, depending in part depending upon credits earned and transferred before entering the program. Once courses have been completed, the next step is to design a research project for the dissertation. 

With a well thought out idea in hand, have a chosen faculty mentor assist with fine-tuning the scope, and then approving the research outline.

The rest is extensive research and then writing the dissertation, while all along consulting with a faculty mentor. This phase can take two or more years, sometimes in excess of five years. 

The length of time devoted to completing a dissertation will depend in part on the amount of time the candidate is able to devote to the research required.

Once the dissertation is complete, student will schedule a board review and present their research to faculty members to attain the final award of their doctoral degree.

Online PhD cybersecurity tuition and scholarships

Don’t be scared off by tuition rates at any school.

Pick the best academic environments for the degree and specialty desired first, then see what can be done to mitigate the cost.

Tuition rates

The Cybersecurity Guide team recently took a look at the 14 programs in the US that offer an online cybersecurity PhD program in order to get a better sense of what tuition looks like at these programs. All figures below are based on out-of-state tuition rates.

$32,940 is the most affordable online PhD program and its available at the University of Cumberlands.

$56,004 is the average cost of the 14 online cybersecurity PhD programs.

$85,248 is the highest tuition and is at the University of North Texas.

There are almost always several options to consider. Some schools have work-study options where students can take classes for a semester or two, then work in the industry for a time. This provides a balance of academics and practical experience, and also income to offset tuition costs.

Of course, those already working and going to school would not be able to utilize this option. 

Most frequently, scholarships, grants and fellowships will be the most accessible financial assistance vehicles.

At present, it seems most scholarships are being directed to undergraduate and graduate students, with less now available for PhD’s.

This is likely to change in coming years as demand for PhD’s is set to expand rapidly. The bulk of scholarships available for PhD candidates at present are provided through individual schools, corporate sponsors, of government agencies. 

Cybersecurity PhD career path

The very nature of doctor of philosophy degree programs means those who complete a PhD will be best suited to academic or theoretical applications of their cybersecurity expertise.

However, other times there are really interesting industry jobs available to PhD holders, especially in research-oriented companies. 

 Typically, these professionals will hold the highest of infosec management positions, such as CISO, information security director, information security manager, or the like.

But many will be destined for advanced investigative research into the cutting edge ideas and technologies being discussed and discovered in the cybersecurity world.

Others will opt for academic posts in higher education. And still others will be employed as consultants to large corporations and/or high leverage government agencies that often have not been able to hire enough cybersecurity employees to adequately satisfy their own needs, or just don’t possess the advanced capabilities that a PhD offers.

Frequently asked questions

An online PhD in cybersecurity is an advanced academic program that allows you to earn your doctorate remotely, focusing on research and expertise in cybersecurity.

Online programs offer flexibility, making it easier for working professionals to balance studies with other commitments. Plus, you can access top-tier faculty and resources from anywhere.

The duration varies but expect to spend 3-7 years, depending on the program and your pace of study.

Graduates often pursue roles in academia, research, or high-level positions in corporate cybersecurity departments.

Yes, most employers consider an online PhD in cybersecurity as valuable as an on-campus degree, provided it’s from an accredited institution.

While convenient, online programs may lack some networking opportunities and face-to-face interactions found in traditional settings.

School listings for online PhD in cybersecurity

As is any course of study, attending school through an online college affords maximum flexibility for students with demanding lives. Whether the limiting factor is work, family, health restrictions or other reasons, a flexible online doctoral program permits PhD candidates to work toward a goal on their own time. 

Below is a complete list of schools offering online PhD programs that features current and comprehensive information for an easy side-by-side comparison.

  • Program's Aim: The Ph.D. program is tailored to produce scholars proficient in leading research initiatives, undertaking rigorous industrial research, or imparting high-level computer science education.
  • Entry Routes: The program welcomes both students holding a B.S. degree for direct admission and those with an M.S. degree.
  • Dissertation's Role: It stands as the pivotal component of the Ph.D. journey. Collaboration between the student, their dissertation director, and the guiding committee is essential.

Naval Postgraduate School

  • Program Essence: The Computer Science Ph.D. is a top-tier academic program in the U.S.
  • Admission Criteria: Open to military officers from the U.S. and abroad, U.S. governmental employees, and staff of foreign governments.
  • Curriculum: Designed to deepen knowledge in computing, with a focus on the needs of the U.S. Department of Defense.

National University

  • Skills Gained: After finishing, students will know how to improve cybersecurity, set rules, find threats, and use tools to protect information.
  • Job Opportunities: Graduates can become Security Analysts, Systems Engineers, Cloud Security Experts, and more.
  • Quality Assurance: The course is recognized and approved by the Western Association of Schools and Colleges (WASC).
  • Recognition: Capitol Technology University is designated as a National Center of Academic Excellence in Cyber Defense by the National Security Agency and Department of Defense.
  • Career Opportunities: The program prepares students for senior leadership roles, program development, or policy-making positions in federal agencies and the private sector.
  • Overview: Designed for individuals aiming to advance both scholarly research and their careers in the field of cybersecurity.

Colorado Technical University

  • Accreditation: CTU is recognized by the Higher Learning Commission.
  • Cost-Saving Options: There are ways to reduce fees, like military discounts, transferring credits, and scholarships.
  • Special Sessions: There's a mandatory in-person gathering called a symposium.

The University of Fairfax

  • Goals: This program is for those who want to lead, research, or make policies in cybersecurity.
  • Special Guide: They use a guide from a national institute to teach students the best ways to keep information safe online.
  • Help with Big Project: The university has a plan to help students with their final project.

Dakota State University

  • Program Goal: Train students to handle and prevent cyber threats.
  • Awards: The university has received top cybersecurity awards.
  • What You'll Learn: Research skills, cyber defense techniques, and ethical decision-making.

Marymount University, School of Technology and Innovation

  • Program Content: The course dives deep into modern cybersecurity topics, from new tech and artificial intelligence to specialized research areas.
  • Location Benefits: The university is near many cybersecurity companies and government agencies, giving students unique opportunities.
  • For Working People: It's crafted for professionals, allowing them to experience various cybersecurity roles, from tech firms to government.

The University of the Cumberlands

  • Jobs After Graduation: After getting a PhD in IT, students can find many job opportunities.Jobs in areas like cloud computing and cybersecurity will be in high demand.
  • Recognition: The university is known for its excellence in cybersecurity by major U.S. departments.
  • Benefits: Students can study online, so they don't have to leave their jobs. A PhD can also lead to better job chances and higher pay.

Nova Southeastern University, College of Computing & Engineering

  • Completion Time: Students have up to ten years from starting to finish their dissertation.
  • Program: Trains students for roles in academia, government, and business.
  • Multidisciplinary Approach: The program combines both technical and managerial aspects of cybersecurity, offering a comprehensive understanding of the field.
  • Capstone Project: Students create a big project to use their new skills in real-world situations.
  • Focus on Modern IT: The course teaches current IT topics like online security and managing projects.
  • Job Opportunities: After finishing, students can aim for high-level IT jobs in various sectors.

The University of Rhode Island

  • Research Focus: The Ph.D. program is centered around a big research project in Computer Science.
  • Qualifying Exams: Students take exams on core topics, but some might get exemptions if they're already skilled in certain areas.
  • Equal Opportunity: The University of Rhode Island is committed to the principles of affirmative action and is an equal opportunity employer.

University of North Texas

  • Team Effort: The program is a collaboration between various UNT departments for a well-rounded view of cybersecurity.
  • Goals: The course aims to develop critical thinkers who are passionate about the role of information in our lives and can work across different fields.
  • Skills Gained: Students will learn about research, teaching methods, decision-making, leadership, and analyzing data.

Walden University

  • Why Walden: The program offers one-on-one mentoring, helpful tools, real-world IT scenarios, and chances to network.
  • Jobs After Graduation: The IT field is growing. With a DIT, you can become a college teacher, computer scientist, or a top IT manager.
  • Skills Gained: You'll learn to evaluate IT methods, create IT systems, lead IT teams, communicate tech ideas, and do original research.
  • Goals: Boost organizations' ability to handle cyber threats and lead organizations in enhancing cybersecurity.
  • Classes: Held on Saturdays in a fast-paced format.
  • Structure: 24 hours of courses and 24 hours of research, including a major project (praxis) on cybersecurity.

10 Best PhD in Cyber Security Online [2024 Guide]

Want to be on the frontier of research, policy formation, strategic innovation, or consulting in the exploding field of information assurance and cyber security? A PhD Cyber Security online program may help you attain this goal.

PhD in Cyber Security Online

If you already have a bachelors or masters in computer science along with computer engineering and other IT-related industry certifications and work experience, you’re likely qualified to apply.

Editorial Listing ShortCode:

If you don’t meet these criteria, but love cutting edge technology research, investigation, and policy advocacy, you might want to consider mapping out a plan now in order to qualify for entering a cyber security doctoral program.

Universities Offering Online PhD in Cyber Security Degree Programs

Methodology: The following school list is in alphabetical order. To be included, a college or university must be regionally accredited and offer degree programs online or in a hybrid format.

1. Capella University

Capella University, which is an NSA / DHS designated National Center of Academic Excellence in Information Assurance / Cyber Defense, offers an information assurance and cybersecurity concentration for students in its Ph.D. in Information Technology program. The degree requires 90 total quarter credits, and there are multiple ways to save on tuition.

  • PhD in Information Technology – Information Assurance and Cybersecurity

Capella University is accredited by the Higher Learning Commission.

2. Capitol Technology University

The Doctor of Science in Cybersecurity program from Capitol Technology University is designed to teach students how to conduct research in matters of cyber defense, to create innovative and creative solutions to cybersecurity problems, and to be qualified enough to make final decisions about solutions. Students can choose electives to better streamline their paths.

  • Doctorate in Cybersecurity

Capitol Technology University  is accredited by the Commission on Higher Education of the Middles States Association of Colleges and Schools.

3. Colorado Technical University

Students at Colorado Technical University can earn their Doctor of Computer Science in Cybersecurity and Information Assurance at an NSA / DHS designated CAE-IA/CD. The program can be completed in three years, and students work with advisors to build schedules that work best for them.

  • Doctor of Computer Science – Cybersecurity and Information Assurance

Colorado Technical University is accredited by the Higher Learning Commission.

4. Dakota State University

At Dakota State University, students can earn their Ph.D. in Cyber Operations while growing their professional connections with various businesses and government agencies. The program features multiple computer science courses with a heavy emphasis on cybersecurity. In addition to rigorous online coursework, students will also undertake three, on-site research seminars.

  • PhD in Cyber Operations

Dakota State University is accredited by the Higher Learning Commission.

5. Marymount University

Marymount University’s Doctor of Science in Cybersecurity program places a premium on such topics as technology, data science, policy, leadership, management, ethics, and teaching. Students are placed in real-time, real-world situations and must assess and combat threats to digital networks. Extensive research will also be conducted in the cybersecurity field.

  • Doctor of Science – Cybersecurity

Marymount University is accredited by the Southern Association of Colleges and Schools Commission on Colleges.

6. National University

National University offers a PhD in Technology and Innovation Management with a Cybersecurity specialization that is designed to prepare students to become leaders in the field of cybersecurity. Graduates may pursue careers in private and government organizations.

The program requires the completion of 20 courses for a total of 60 credit hours and can typically be finished in 50 months.

  • PhD in Technology and Innovation Management – Cybersecurity

National University is accredited by the WASC Senior College and University Commission.

7. New Jersey City University

Students enrolled in New Jersey City University’s Doctor Of Science in Civil Security Leadership, Management & Policy program explore three distinct areas of digital security: national security, corporate security, and information assurance and cybersecurity. The program accepts between 15 to 20 doctoral candidates each year and usually takes about three years to complete.

  • Doctor of Science in Civil Security, Leadership, Management and Policy

New Jersey City University is accredited by the Middle States Commission on Higher Education.

8. Nova Southeastern University

Nova Southeastern University’s Ph.D. in Cybersecurity Management requires a total of 67 credit hours. It’s designed for working professionals who need flexible college schedules. It’s a research-based degree that aims to prepare graduates for leadership jobs in cybersecurity or university teaching positions. Equal emphasis is placed on cybersecurity skills and management training.

  • PhD in Cybersecurity Management

NSU  is accredited by the Southern Association of Colleges and Schools Commission on Colleges.

9. University of the Cumberlands

University of the Cumberlands offers students a Ph.D. in Information Technology program entirely online. Students are expected to tackle topics such as technology for the global economy, information governance, data science, emerging threats to IT, and enterprise risk management. These courses are designed to teach students how to improve connectivity, identify cyber threats, and more.

  • PhD in Information Technology Online

The University of the Cumberlands  is accredited by the Southern Association of Colleges and Schools Commission on Colleges.

10. University of Rhode Island

Students interested in cybersecurity at the University of Rhode Island can enroll in the Ph.D. in Computer Science program. Much of the degree can be completed online, but there will be occasions when visiting the campus will be required. Students can choose to focus their electives in the cybersecurity field.

  • PhD in Computer Science

The  University of Rhode Island  is accredited by the New England Commission of Higher Education.

PhD in Cyber Security Online Programs

Computer and Information Systems Managers i=meeting for a project

Getting a PhD can be very exciting. It can help put you on the cutting edge of innovation and policy research, allowing you to apply deep theoretical knowledge to emerging industry challenges, as well as ethical and legal policy debates on a national or global scale.

When you’ve completed a PhD in Information Security online, the jobs you’re ready for may not be as highly defined as they were when you got your bachelor’s or master’s degree.

This is because your area of individual specialization combined with your advanced theoretical insights should mean you actually have a unique expert profile. A PhD in Cyber Security can help open doors to exciting career paths, depending on your academic concentration:

  • Teaching opportunities at colleges and universities
  • Policy work
  • Engineering research,
  • Cyber operations leadership

The best cyber security doctorate program for you will depend in part on the kind of courses offered and the kind of expertise you want to develop.

In general, those looking into a cybersecurity PhD will want to consider if they’re more interested in technical and engineering research type applications, or prefer a career path that involves teaching, quantitative research, policy work, high-level consulting, or governance work.

Keep in mind that PhD institutions will also vary in sector orientation as well.

Some will be more focused on engineering research, others may specialize in strategic cyber operations (for corporations, government, or national security), and others might be affiliated with law or business administration programs and focusing on legal and ethical aspects of information assurance, on corporate leadership, or on regulatory or policy reform.

Finally, as a PhD candidate you’ll need to consider the kind of concentration that best fits your deepest intellectual interests, professional aptitudes, and career aspirations.

Cyber Security Careers & Salaries

phd cyber security online

Once you’ve earned a masters and PhD degree in information technology (or related field), you should see an increase in income with work opportunities in many sectors, including higher education, government, private industry, defense, and advanced software engineering research.

The Bureau of Labor Statistics provides a glimpse at the kinds of salaries that you may earn with advanced cyber security skills.

Some of the careers listed here may be accessible with a bachelor’s degree in computer science or computer engineering, but the highest paid jobs listed typically require a masters or doctorate degree like a cyber security masters degree online or a cyber security doctorate.

If you move into advanced research, teaching, consulting, or engineering roles after completing your PhD in Cybersecurity, you may, over time, develop various streams of income.

Such income sources might include consulting fees or retainers, intellectual property rights, traditional work salaries, speaking honorariums, salaries, as well as stipends related to teaching or institutional research collaborations.

Likewise, you may find yourself earning a top salary in a high-level research, consulting, policy, or operational role in industry or government, or you may find your way to a tenured position in higher education.

We expect you feel some excitement seeing what you can earn with advanced degrees in this field—keep in mind that you might also one day be shaping leading policies and innovations in cyber security for years to come!

Choosing an Online PhD in Cyber Security

PhD in Cyber Security student studying in his office

We recommend doing enough research to feel confident that the school and program you select are fully accredited, have professors with solid academic and industry credentials, and, most importantly perhaps, that the courses offered are aligned with the areas of concentration that most interest you.

As you compare programs it’s also a good idea to ask yourself what kind of real-world industry experiences and expertise characterize the leading faculty at the school. Remember, PhD programs are unique in the way that students and professors collaborate closely, almost like academic colleagues!

Whether it’s a department colloquium, a research panel event, a call out to visiting scholars, or getting advice from faculty members on your dissertation prospectus…in a doctoral program, the intellectual topics, debates, and conversations you’re engaged in will be informed in large measure by the industry orientation and experiences of the department faculty.

Web Developer working in his office

Engineers, military operations personnel, lawyers and social policy wonks, those in business administration circles…these kinds of people can all be part of the larger cyber security universe but quite distinct in the research and applications they focus on and care about.

Finally, when looking at online options, you’ll see that some programs offer a PhD in Cybersecurity, others offer a PhD in Information Security, or even a Doctorate of Information Assurance (DIA).

You may also see online cybersecurity programs leading to a Doctor of Science (DSc) instead of a PhD, or programs offering an online Doctor of Information Technology (DIT).

Since these degree titles are somewhat interchangeable, we suggest you always look behind the degree title at course offerings, course concentrations, industry or sector affiliations, and career orientations in the programs you’re most interested in.

PhD in Cyber Security Curriculum & Courses

Database Administrator working in data center

Your professors will be teaching some important course content no doubt, but in your online PhD cyber security program, they’ll also serve the critical role of research mentors to you and your fellow PhD candidates.

Likewise, taking courses is only one part of your academic commitment alongside engaging in original research and dissertation writing. Course offerings will differ based on programs, but here’s a broad sample of what kinds of courses you can expect:

  • Technology Policy and Strategy Administration : Students get a deep dive into theoretical and practical frameworks for decision making in the area of IT policy and strategic management of IT assets.
  • Advanced Reverse Engineering Methods : Students learn and apply advanced research engineering methods in real-life scenarios and demonstrate mastery of reverse engineering skills for cyber security applications.
  • Cryptography and Information Assurance Protocols : Learn about the science of coding and decoding and the kinds of keys, controls, and protocols used in conjunction with cryptography and information assurance methods.
  • Advanced Methods in Risk Assessment and Control : Learn about theoretical frameworks defining best practices in industry-specific cyber security risk management.
  • Cyber Operations Strategy & Advanced Forensics : Learn about research methods and practical skills for operating in adversarial cyber operations or cyber threat scenarios.
  • Topics in Contemporary IT Policy, Law, and Ethics : Learn about the most compelling topics, controversies, and theoretical underpinnings defining legal and ethical data privacy and protection frameworks.
  • Information Assurance Consulting : Students research and study frameworks for providing senior-level consulting services in information security.
  • Advanced Cybersecurity Engineering and Research : Students develop knowledge of contemporary trends at the intersection of cybersecurity software architecture development and related software engineering research.
  • Databases and Information Safeguards : This course gives students insights into the methods and theories guiding contemporary practices and innovations in database uses and architectures with a focus on information security and data management ethics.
  • Qualitative and Quantitative Research Methods : Students learn professional research standards and data presentation and modeling skills to apply to their dissertation research methodology.

As you can see, getting a PhD in Information Security online means building on your existing knowledge in computer science in order to engage in the highest levels of investigation, development, teaching, research, and consulting.

Admissions Requirements

Admissions to a Cybersecurity PhD program will in most if not all cases require you to have a bachelor’s or master’s degree in computer science or computer engineering or a related field. Some programs will require GRE or GMAT scores, but in some cases, waivers are available, or the university will make this requirement optional.

Most programs will expect applicants to have not only prior college degrees, but also significant work experience and, in some cases, industry certifications in prerequisite technology skills.

Accreditation

PhD in Cyber Security Online Accreditation

Getting a doctorate degree is a big deal. You probably want to ensure your faculty have compelling academic and industry credentials. This includes making sure you select a fully accredited program and school as well. Also, many PhD programs only recognize course credits and degrees from accredited colleges and universities, including those earned through programs like an MBA in Cybersecurity online .

The Council for Higher Education Accreditation (CHEA) is a good resource for learning more about accreditation standards and identifying accredited schools.

Due to the growing national interest in expanding the cyber security workforce, you may also find new consortiums seeking to help you navigate online cyber security degree programs , such as the government-sponsored National Centers of Academic Excellence (NCAE).

Financial Aid and Scholarships

Financial aid for PhD in Cyber Security Online students

If you have the kind of interest and motivation that makes getting a PhD sound exciting, we encourage you not to let tuition costs stop you, especially in fields like cyber security that have strong projected job growth.

Usually, financial aid options will be available to you if you’re a qualified PhD program candidate but need financial help.

And, you never know what kinds of financial assistance programs you may be eligible to tap into when you start applying for an online cyber security doctorate, especially since government, industry, and higher education leaders are presently building training pipelines to fill growing job demand in this critical field.

If you’re interested in financial aid, we suggest you stick with fully accredited programs and check with admissions counselors about school or government-sponsored scholarship.

Your employer may also offer some form of tuition assistance. If you do plan to apply for school loans or scholarships, it’s always a good idea to complete the federal financial aid application ( FAFSA ) ahead of time.

What Can You Do With a PhD in Cyber Security?

Software Developer working in his office

With a PhD in cyber security you should find that you’re in a great position to compete for well-paid jobs in the cyber security field.

An online cyber security doctorate degree can help you obtain the theoretical knowledge and sophisticated research skills needed to work in higher education teaching positions, prestigious consulting careers, or senior engineering research roles.

According to the Bureau of Labor Statistics, high-level information security research jobs are forecast to grow 15% on average in the coming decade, while the larger cyber security job market is forecast for a whopping 31% rate of growth.

How Much Does a PhD in Cyber Security Program Cost?

Software Developers working on a project together

You should expect to find tuition costs ranging from as low as $500 per credit hour up to $1,200 and above, with most programs requiring between 30 and 40 credit hours of coursework.

Keep in mind time costs too, as it’s hard to predict exactly how many years you’ll need to complete your dissertation, anywhere between 15 months and 2 or 3 years, or more. As you compare programs and costs, keep in mind what’s being offered too.

Consider how important direct faculty support for your dissertation work is to you and what kind of research resources a school offers. When your goal is a doctorate degree, it’s even more important to consider these factors alongside cost.

How Long Does it Take to Get a PhD in Cyber Security Online?

PhD in Cyber Security student studying online at home

Getting a PhD in Cyber Security online will usually take 3 to 5 years, depending on the program and pace at which you complete your dissertation research and writing.

Assume you’ll need 2 to 3 years to complete the course work and another year or two, at least, to finish your dissertation. Keep in mind that dissertation work may extend beyond two years, depending on your own work habits and research interests.

How long it takes to get a PhD depends largely on your schedule and program. A number of online programs have options for students who want an accelerated study timeline. Keep this in mind as you compare online cyber security PhD options.

Are There Any Affordable Online PhD in Cyber Security Programs?

Yes, there are affordable programs. With the fast-growing attention on cyber security threats and the need for qualified information security professionals across industries and roles, you’ll find a wide range of schools and programs to choose from, with a wide range of tuition costs.

You should find the more affordable programs offering per credit tuition rates between $450 and $600.

Is a PhD in Cyber Security Program Worth it?

Cyber Security Analyst working in a government facility

Yes, a doctorate in cyber security online is worth it for many students. The Bureau of Labor Statistics is projecting 11% job growth in computer and information technology occupations over the next 10 years. Common careers in this field include computer and information research specialist or network engineer working in cyber security, computer engineering, and information assurance jobs.

With your cybersecurity doctorate, you may also qualify to work as a college teacher or as a high-level consultant, or policy advocate. What’s really key to remember is that whatever your individual path, you’ll be among a first wave of experts giving direction to a still very young and fast-growing profession!

Getting Your PhD in Cyber Security Degree Online

PhD in Cyber Security student researching online

It’s true that getting an online PhD in Information Security takes time and money. But, remember, if this is the right path for you, you’ll likely be excited about pursuing an advanced degree and see it as the chance of a lifetime, not an expense.

Indeed, if your dream is to build a career in cyber security leadership applying big-picture theoretical and analytical thinking in advocacy, research, teaching, consulting, or computer engineering roles, we think it’s likely you’ll agree an investment like this is hard to quantify!

phd cyber security online

The Gradcafe

  • Majors & Careers
  • Online Grad School
  • Preparing For Grad School
  • Student Life

Top 10 Best PhD in Cybersecurity Online Programs

Lisa Marlin

The news these days is full of reports of cyberattacks resulting in massive financial and reputation losses for companies of all sizes. Therefore, it’s not surprising that there’s a high demand for experts to manage these threats and keep organizations’ information secure.

A PhD cybersecurity online degree can equip you with the necessary skills and expertise to manage these challenges and more.

Table of Contents

Best PhD in Cybersecurity Online Programs

Capitol technology university.

Doctorate (DSc) in Cybersecurity

Capitol Technology University logo

Capitol Tech University is a leader in STEM-designated programs in Washington DC which Forbes named  the second-best  city for STEM education. This doctorate in cyber security online program offers comprehensive education on the subject without treating it as a standalone discipline, but instead looking at how it impacts organizational decision-making.

  • Courses include: Applied research in information assurance, information assurance strategic management, and healthcare information security.
  • Credits: 54-66
  • Duration: 3 years
  • Tuition: $933 per credit
  • Financial aid: Scholarships, grants, work-study, veteran benefits, and loans.
  • Acceptance rate: 84.4%
  • Location: Laurel, Maryland

Colorado Technical University

Doctor of Computer Science – Cybersecurity and Information Assurance

Colorado Technical University logo

Colorado Technical University offers many online programs online, promoting education for working professionals, military personnel, and retirees. The institution believes in mentoring relationships and accessible education through multiple channels, including mobile devices and social media. This is one of the most flexible cybersecurity PhD programs online that allows you to tailor your study schedule around your other commitments and offers multiple start dates every year. The dissertation is integrated into the program and you can complete your studies in three years.

  • Courses include: Foundations of digital systems security, security management, and enterprise security architecture.
  • Credits: 100
  • Tuition: Refer tuition page
  • Financial aid: Scholarships, grants, military benefits, and loans.
  • Acceptance rate: 100%
  • Location: Colorado Springs, Colorado

The University of Fairfax

Doctorate of Information Assurance

The University of Fairfax logo

The University of Fairfax strives to extend learner-centered education through distance means to working professionals on various subjects, including cybersecurity. You can choose to pursue this online PhD in cyber security program in a hybrid format, where part of the program is delivered face to face through an on-campus residency.

  • Courses include: Information security systems and organizational awareness, business and security risk analysis, and cybersecurity insurance.
  • Credits: 62
  • Tuition: $55,490
  • Financial aid: Grants, scholarships, fellowships, and military & veteran benefits.
  • Location: Salem, Virginia

Dakota State University

Doctor of Philosophy in Cyber Defense (PhDCD)

Dakota State University logo

Dakota State University has been named one of the best colleges in South Dakota  and offers affordable education to working professionals, especially in fields like cybersecurity. This PhD in cyber security online program focuses on cyber ethics, including integrating ethical frameworks with cybersecurity decision-making. Although mostly online, the program has a minimal annual residency of three to four days to attend seminars. You can also choose to complete it fully on-campus if you prefer.

  • Courses include: Managing security risks, security metrics, and computer         forensics.
  • Credits: 72
  • Tuition: $333.25
  • Financial aid: Scholarships, grants, student employment, veteran benefits, and loans.
  • Acceptance rate: 83.6%
  • Location: Madison, South Dakota

New Jersey City University, College of Professional Studies

Civil Security—Leadership, Management and Policy (CSLMP), D.Sc.

NJCU Logo

New Jersey City University started as the country’s first teachers’ training school. Today, it offers a number of programs across a wide range of fields to a diverse student population. This doctorate centers around civil security and so is not technically an online PhD cyber security program. However, information assurance/cyber security is one of the integral parts of the curriculum, so it could equip you for a career in the field.

  • Courses include: Current issues in civil security leadership, management, and policy, emergency operations & management, and data analysis for civil security leadership, management, and policy.
  • Credits: 48
  • Tuition: $797.70 per credit
  • Financial aid: Grants, scholarships, employer tuition assistance, and veteran benefits.
  • Acceptance rate: 96.3%
  • Location: Jersey City, New Jersey

Marymount University, School of Technology and Innovation

Cybersecurity (D.Sc.)

The School of Technology and Innovation at Marymount University

The School of Technology and Innovation at Marymount University strives to fill the critical global technology workforce shortage by offering programs and training in advanced technological disciplines, including data sciences, cybersecurity, and cloud computing. This cybersecurity PhD online program aims to equip students to address present and future cybersecurity issues through innovation, as well as advanced tools like Artificial Intelligence.

  • Courses include: Cyber threat intelligence, managing cybersecurity risk, and malware analysis.
  • Credits: 72 (post-bachelor’s), 36 (post-master’s)
  • Tuition: $1,190 per credit
  • Financial aid: Scholarships, grants, assistantships, student employment, and loans.
  • Acceptance rate: 85.3%
  • Location: Arlington, Virginia

The University of the Cumberlands

Online PhD in Information Technology

The University of the Cumberlands logo

The University of the Cumberlands is a well-known, military-friendly university and ranks among the top ten  such private schools that offer doctorate degrees. This online cybersecurity PhD program empowers students to dig deep into the industry’s IT and cybersecurity challenges, with high-level knowledge of evolving cyber threats, as well as tools like analytics and Machine Learning.

  • Courses include: Security architecture & design, information governance,        and legal regulations, compliance, and investigation.
  • Credits: 60
  • Tuition: $500 per credit
  • Financial aid: Scholarships, grants, work-study, and loans.
  • Acceptance rate: 81.4%
  • Location: Williamsburg, Kentucky

Nova Southeastern University, College of Computing & Engineering

PhD in Cybersecurity Management

Nova Southeastern University logo

Nova Southeastern University strives to offer the latest cybersecurity education with a continually-evolving curriculum that meets the changing needs of the industry and ranks among the top fifteen  schools for a number of online cybersecurity graduate programs. This program allows students to develop a deep level of cybersecurity knowledge, with an ethical approach to the discipline. Instead of getting this cybersecurity PhD online, students can also choose the on-campus option at the Fort Lauderdale/Davie Campus.

  • Courses include: Information security governance, ethics in computing, and information system auditing.
  • Credits: 51 (MS to PhD), 66 (BS to PhD)
  • Financial aid: Scholarships, grants, loans, and veteran benefits.
  • Acceptance rate: 76.2%
  • Location: Fort Lauderdale, Florida

Capella University

Doctor of Information Technology  (DIT)

Capella University logo

Capella University was founded in 1993 and is well-known for its flex-path online programs that allow working professionals to design their own schedule according to their needs. This online doctorate in information technology is essentially the equivalent of a PhD cyber security online degree, with a strong focus on cybersecurity and information assurance.

  • Courses include: Assurance controls and compliance management, system and         application security advances, and advanced risk management systems and research.
  • Credits: 70
  • Tuition: $750 per credit
  • Financial aid: Scholarships, grants, military discounts, and work-study.
  • Location: Minneapolis, Minnesota

What Do You Need to Get an Online PhD in Cybersecurity?

To be accepted into an online PhD in cybersecurity program, you’ll typically need to have an MS or BS qualification in computer science or another STEM field. For more competitive programs, you may need to have a GPA of 3.0 or more.

Once admitted to an online PhD in cybersecurity, you’ll usually need to enroll in core and elective courses in cybersecurity and related subjects. For most programs, you’ll need to successfully complete coursework, exams, and a final dissertation to earn your doctorate.

Jobs and Salaries for Doctors of Cybersecurity

A PhD in Cybersecurity can help you to land one of the many well-paid jobs available in cybersecurity and information systems and network administration.

Some of the most common roles for doctors of cybersecurity (with the annual median salary for each) are:

  • Director, Cybersecurity ( $173,868 )
  • Security Analyst ( $70,554 )
  • Penetration Tester ( $88,715 )
  • IT Director ( $122,742 )
  • System Administrator ( $63,089 )
  • Security Auditor ( $84,039 )

Average Cost of a PhD Cybersecurity Online Degree

The tuition for online PhD cybersecurity degrees can vary widely based on various factors, including whether you choose a public or private university, and if you are a resident of the state or an out-of-state student. Tuition can also vary based on things like the university’s reputation, faculty, and facilities.

In general, you can expect the tuition for doctorate cybersecurity online programs to be in the range of $20,000 to $100,000 in total.

Besides tuition, you may also have other expenses, such as study materials and technology fees.

However, on-campus living expenses can be saved for online programs. Scholarships and grants can reduce expenses to a significant extent.

How Long Does It Take to Get an Online PhD in Cybersecurity?

Most universities allow you to complete your online cybersecurity PhD degree in around three to seven years. However, this timeline may push out if you take more time to complete your dissertation. Some universities say you need to complete the program within a certain number of years. For example, for NSU Florida, you need to earn your doctorate within ten years .

Why You Should Get a Doctorate in Cybersecurity

Cybersecurity professionals are in extremely high demand and a qualification in this area can promise you a lucrative career. A doctorate in cybersecurity can equip you with advanced theoretical and practical knowledge, qualifying you for a range of senior positions in cybersecurity management, education, and research. According to the BLS , information security analyst jobs are predicted to grow by a whopping 35% between 2021 and 2031.

What Skills Do You Get from Doing an Online PhD in Cybersecurity?

An online PhD in cybersecurity can equip you with many transferable skills, including:

  • Advanced research skills
  • Strong foundational theoretical knowledge
  • IT forensic skills
  • Analytical skills
  • Problem-solving skills
  • Management & leadership skills
  • Communication skills

How to Choose an Online PhD in Cybersecurity

Although it is ultimately a personal decision, here are some key factors to keep in mind when choosing an online PhD in Cybersecurity:

  • School’s reputation : First and foremost, look for a school that has a good reputation and the appropriate accreditations.
  • Specializations : You should also make sure the program you choose offers courses in the fields you wish to specialize in.
  • Tuition and scholarships: It’s essential that the tuition fits your budget, or that the school offers good scholarships and financial aid options.
  • Faculty and research facilities:  It’s also important to research the school’s faculty, their reputation, and their areas of specialty.

Accreditation for Online PhD Programs in Cybersecurity

The best online PhD programs in cybersecurity have accreditations that ensure that it meets certain standards. Accreditations ensure you will receive high standards of education and that your qualification will be valuable and highly regarded within the industry.

Final Thoughts

The job outlook within the cybersecurity industry is extremely strong, with the sector expected to witness rapid growth over the next ten years, and a PhD cybersecurity  online degree can prepare you for a career in the field.

Having said that, cyber threats are ever-evolving and so it’s important to commit to ongoing education even as an established professional, to keep up to date with the latest changes, trends, and threats.

For more on the best courses in this field and related field, take a look at the best master’s in cybersecurity programs , the top online PhDs in Computer Science , and the best online PhD programs .

Lisa Marlin

Lisa Marlin

Lisa is a full-time writer specializing in career advice, further education, and personal development. She works from all over the world, and when not writing you'll find her hiking, practicing yoga, or enjoying a glass of Malbec.

  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ 12 Best Laptops for Computer Science Students
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ ACBSP Vs AACSB: Which Business Program Accreditations is Better?
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ BA vs BS: What You Need to Know [2024 Guide]
  • Lisa Marlin https://blog.thegradcafe.com/author/lisa-marlin/ The 19 Best MBA Scholarships to Apply for [2024-2025]

Best MacBook for College in 2024: Top 5 Picks

Best online mba in florida: top 7 choices [2024 review], related posts.

Here's how to earn consideration from the big tech players as a new grad.

  • Applying to Big Tech This Year? Here’s How to Ace It.

Fewer employers list education requirements in job postings.

  • 73% of job seekers believe a degree is needed for a well-paying role–but is it?

There are more jobs than talent in these cities.

Tech Talent Crunch: Cities with More Jobs Than Workers

The Most Under-Rated Career Advancement Tip for 2024

The Most Under-Rated Career Advancement Tip for 2024

Top 5 Best Psychology PhD Programs in 2024

Top 5 Best Psychology PhD Programs in 2024

Good News For Early Careers: Skills-Based Hiring is Surging

Good News For Early Careers: Skills-Based Hiring is Surging

Best Online MBA in Florida

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • Breaking Records: Yale Sees Most Selective Grad Admissions Season Yet
  • 12 Best Laptops for Computer Science Students
  • Is a Master’s Degree Worth It? [2024 Guide]

The Gradcafe

© 2023 TheGradCafe.com All rights reserved

  • Partner With Us
  • Results Search
  • Submit Your Results
  • Write For Us
  • Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

Find Your School

Best Online Doctoral Programs in Cybersecurity

The Best Online Doctoral Degree Programs in Cyber Security

The best online doctoral degrees in cyber security.

2018 csd badges 05

Methodology

Best Online Doctorates in Cyber Security Ranking Methodology

Our metrics have been honed from years of experience in higher education journalism and research, and seek to provide a balance between the traditional academic prestige of an institution with a cyber security program, and other concerns that particularly non-traditional or working students may express. Namely, that affordability and support in online learning environments is crucial for successful outcomes for non-traditional, working, and adult students.

We start the process of any academic ranking by surveying every available cyber security degree program within the purview of the ranking. All information used in our ranking process is double checked, and comes from the Integrated Postsecondary Education Data Systems (provided by the US Department of Education) or the schools themselves.

In line with our categories of excellence covered on our rankings page, our ranking methodology for our doctoral cyber security degree programs is as follow:

  • Is the program an NSA / Department of Homeland Security designated program? (50%)
  • The percentage of instructors who are research faculty (50%)
  • Tuition per credit hour for the program (50%)
  • The availability of doctoral grants, research assistant roles, and the ability to teach classes for doctoral candidates(50%)
  • The percentage of graduate students taking some online courses (100%)

1.) Dakota State University

dakota state

Dakota State University is a public state university with a main campus located in Madison, South Dakota. Home to some 3,000 students, the university goes by the motto “technically, we’re better” to highlight their focus on business and technology courses of study. The university offers a vigorous and wide ranging set of offerings online as well, with 54% of undergraduates and 88% of graduate students at least taking some courses online. The university has been heralded as one of the top comprehensive cyber security schools and one of only a handful of schools we know of that offer cyber security programming at the associates through doctoral levels (all available online as well). Dakota State University is also the only university to be featured in all of cyber security rankings. Of hundreds of universities, Dakota State University ranks for their top associates , bachelors , Masters, and doctoral degrees.

Dakota State University’s fully online D.Sc. in Cyber Security places first in our ranking due to excelling in all categories surveyed: affordability, academic quality, and student satisfaction. The degree is meant for students with a strong background in computer science, whether that is a bachelors with a masters in another discipline or a masters in computer science. Students without all of the prerequisite computer science knowledge may still be accepted, however, contingent upon taking up to 12 graduate credit hours of foundational computer science work to catch them up. Dakota State University’s cyber security programs are some of the most well connected in the United States, with ties to the NSA, the CIA, Navy SPAWAR, Department of Homeland Security, Johns Hopkins University’s Applied Physics Lab, Army INSCOM, Carnegie Mellon’s Software Engineering Institute and MIT’s Lincoln Labs. Unsurprisingly, the program holds the coveted NSA/CAE designation, the highest accreditation for cyber security and information assurance programs. DSU is also known for their talented cyber defense team, who often come in close to the top at national competitions.

  • Tuition per credit hour: $388
  • NSA/CAE Designated Program: Yes

2.) Capitol Technology University

Capitol Technology University is a private, not-for-profit, non-sectarian university located northeast of Washington, D.C. between Baltimore and Washington. The university has a long lineage of technical training, originating as a radio engineering institute for servicemembers in the early 20th century. In line with its lineage, Capitol Technology University is regularly lauded as a particularly “military friendly school.” The university is also known for its innovative online offerings. 71% of undergraduates at the university are enrolled in at least some distance education, while 95% of graduate students take only online offerings. The university has been noted by US News as a top online engineering school at the undergraduate and graduate levels.

The fully online doctor of science in Cybersecurity (DSc) offered by Capitol Technology University is geared towards fully employed students working in cyber security fields. The program, as with many doctoral programs in cyber security, aims to create future information assurance and cyber security leaders. The university’s physical location is a perfect fit for those wishing to get into policy work as well. Capitol Technology University partners with a wide range of local, state-level, regional, and national organizations, and is located within an hour of the largest concentration of cyber security jobs in the United States (Washington, D.C.). As is probably expected from one of the oldest online doctoral programs in cyber security, Capitol Technology University’s cyber security programming has been designated a Center of Academic Excellence-Cyber Defense (CAE-CD) since 2003.

  • Tuition per credit hour: $867

3.) Capella University

capella

Capella University is a private, for-profit university with a main office located in Minneapolis, Minnesota. Home to some 36,000 students, the university is known for its vast online offerings. Accordingly, 100% of learners attending Capella (at the associates through doctoral levels) are online learners. The university has been heralded as an innovative solution for non-traditional students looking to both work full time and obtain graduate degrees. The widespread use of prior learning assessment crediting allows qualified students to focus on what they already don’t know, and recieve credit for subjects they have already mastered on the job or in previous school environments.

The fully online PhD in Information Assurance Security program offered by Capella excels at flexibility and offering support to students holding down fully time jobs while seeking their doctorate. The program focuses on both advanced technical skills as well as research and has been designated a National Center of Academic Excellence in Information Assurance/Cyber Defense through the year 2021. Flexibility-enhancing components of the program include a wide range of start dates yearly (which is uncommon at the doctoral level), as well as the ability to start on your dissertation from the start of the program. This offering builds credit-bearing research seminars around the topics you would like to research for your dissertation. Tuition is capped at $5,000 per semester, with students able to pay less if they take less than a full load. Furthermore, servicemembers receieve a 10% discount on all program costs.

  • Tuition per credit hour: $925

4.) Colorado Technical University

ctu

Colorado Technical University is a private, for-profit technical university with a main campus located in Colorado Springs, Colorado. The university is home to some 28,000 students at the associates through doctoral level of study. Online education is central to Colorado Technical University’s offerings, with 65% of undergraduates and 52% of graduate level students taking at least some distance courses. As one might expect, the university primarily offers programming in business and technical disciplines, for which it often ranks highly in rankings of online schools. Furthermore, Colorado Technical University is regularly ranked as one of the top schools for servicemembers and veterans due to a number of support services, flexibility, and a special tuition rate.

The fully online Doctor of Computer Science – Cybersecurity and Information Assurance degree offered by Colorado Technical University aims to prepare the next generation of senior level leadership, consulting, and teachers within cyber security disciplines. Unsurprisingly, the university’s cyber security programs hold the lauded status of being a National Center of Academic Excellence in Information Assurance/Cybersecurity through the year 2021. Unlike many doctoral programs, students may elect to choose multiple start dates a year, and may take advantage of work and life experience credits to accelerate their time until degree. The progression of CTU’s program begins with a year of foundations, followed by a year of advancing research methods and understanding in a focus area, followed by a year or more to complete 6 research based classes (for your dissertation) as well as courses on leadership.

  • Tuition per credit hour: $598

5.) University of Fairfax

fairfax e1500416053421

The University of Fairfax is a private,non-profit, fully online university with main offices located in Vienna, Virginia. The university is quite young, being founded in 2002 with the aim of providing quality instruction in information assurance and systems. Pursuant to US regulations, the school was enabled to operate for up to 10 years while in the process of seeking an initial accreditation. The University of Fairfax was granted accreditation by the Distance Education Accrediting Commission (a national accreditor) in 2012. The university’s location close to the hub of most cyber security jobs in the United State is a great boon to its students, who may also participate in bootcamps aimed at helping students to prepare for lucrative professional certifications in cyber security .

The fully online Doctorate in Information Assurance offered by the University of Fairfax pushes students to develop novel solutions to a cyber security problem of interest and to present solutions through empirical research into the topic. The objective of the program is to help provide the nation with the next generation of thought leaders, policy makers, and top consultants in cyber security. The completion time of the degree is between 3 and 5 years, and courses are taken in both synchronous and asynchronous manner (often a boon to flexibility for students). 57 credit hours of foundational pre-dissertation work are required in the program, with 5 dissertation hours (at least) required afterwards. This is actually a slightly lower number than a number of other programs, and may be seen as a way to accelerate time until degree for worthy students.

  • Tuition per credit hour: $895

6.) North Central University

north central e1500416222541

Northcentral University (not to be confused with North Central University, a private religious college) is a private, for-profit, virtual college with a corporate headquarters located in San Diego, CA. Home to some 10,000+ students, the university is known for its wide range of professional and practical degree offerings, primarily in counseling, education, business, and technology. The university is one of only a handful in the nation that are 100% online, and has been lauded for its online course presentation and support services by the likes of US News and other online degree ranking entities for years. Northcentral University is regionally accredited by the Western Association of Schools and Colleges.

The fully online PhD in computer in information security offers a number of high quality enhancements seldom found online. Students in the program may choose start dates on a weekly basis, only engage with faculty with doctorates in their field, and have no scheduled lecture hours. This leads to unrivaled flexibility and the ability to balance working through the several years of a PhD with work and home commitments. While the programs primary focus are is on computer and information security, the program is technically a doctorate in business administration, which frames lines of inquiry into information assurance from a business and management perspective. Though individual time-until-degree times may vary, the program requires an estimated 45 months to complete makin it one of the quicker programs on our list.

  • Tuition per credit hour: $1197
  • NSA/CAE Designated Program: No

phd cyber security online

Explore your training options in 10 minutes Get Started

  • Graduate Stories
  • Partner Spotlights
  • Bootcamp Prep
  • Bootcamp Admissions
  • University Bootcamps
  • Coding Tools
  • Software Engineering
  • Web Development
  • Data Science
  • Tech Guides
  • Tech Resources
  • Career Advice
  • Online Learning
  • Internships
  • Apprenticeships
  • Tech Salaries
  • Associate Degree
  • Bachelor's Degree
  • Master's Degree
  • University Admissions
  • Best Schools
  • Certifications
  • Bootcamp Financing
  • Higher Ed Financing
  • Scholarships
  • Financial Aid
  • Best Coding Bootcamps
  • Best Online Bootcamps
  • Best Web Design Bootcamps
  • Best Data Science Bootcamps
  • Best Technology Sales Bootcamps
  • Best Data Analytics Bootcamps
  • Best Cybersecurity Bootcamps
  • Best Digital Marketing Bootcamps
  • Los Angeles
  • San Francisco
  • Browse All Locations
  • Digital Marketing
  • Machine Learning
  • See All Subjects
  • Bootcamps 101
  • Full-Stack Development
  • Career Changes
  • View all Career Discussions
  • Mobile App Development
  • Cybersecurity
  • Product Management
  • UX/UI Design
  • What is a Coding Bootcamp?
  • Are Coding Bootcamps Worth It?
  • How to Choose a Coding Bootcamp
  • Best Online Coding Bootcamps and Courses
  • Best Free Bootcamps and Coding Training
  • Coding Bootcamp vs. Community College
  • Coding Bootcamp vs. Self-Learning
  • Bootcamps vs. Certifications: Compared
  • What Is a Coding Bootcamp Job Guarantee?
  • How to Pay for Coding Bootcamp
  • Ultimate Guide to Coding Bootcamp Loans
  • Best Coding Bootcamp Scholarships and Grants
  • Education Stipends for Coding Bootcamps
  • Get Your Coding Bootcamp Sponsored by Your Employer
  • GI Bill and Coding Bootcamps
  • Tech Intevriews
  • Our Enterprise Solution
  • Connect With Us
  • Publication
  • Reskill America
  • Partner With Us

Career Karma

  • Resource Center
  • Bachelor’s Degree
  • Master’s Degree

Best Online Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salary

To earn the best online PhD in Cyber Security, a student must first demonstrate their academic skills in a master’s program or an advanced bachelor’s degree in cyber security . If you already have that degree, and want to know what the best online PhD in Cyber Security is, then this article is for you.

This guide to the top online PhD in Cyber Security programs discusses the best schools where you can get a cyber security PhD online, how to successfully enroll in these programs and complete your degree, and the highest-paying cyber security jobs PhD graduates can get.

Find your bootcamp match

Can you get a phd in cyber security online.

You can absolutely get a PhD in Cyber Security online. Many PhD programs require a residency component in order to fulfill dissertation requirements and complete any teaching hours that are mandatory for certain degrees.

Thankfully, several schools offer students a chance to complete their doctorate entirely online with no residency requirements, while some offer limited residency requirements and online classes throughout most of the year.

Is an Online PhD Respected?

Yes, an online PhD is just as respected as any other degree. Doctoral programs, by nature, are extended post-graduate programs that take years to complete. In the past, students would work on these programs part time and submit their work via mail or attend cyber security courses on a more varied schedule than traditional classes.

The only difference between now and then is how students submit their work and access course textbooks and resources. Hence, online degrees are respected as much as traditional ones by employers in the tech industry.

What Is the Best Online PhD Program in Cyber Security?

The best online PhD program in cyber security is Arizona State University’s Computer Science (cyber security) PhD program. This program is 100 percent online and has no residency requirements.

Moreover, the program can be completed in as little as three years and can take as long as 10 years. It is designed to match students’ needs no matter how long they want to spend earning their PhD.

Why Arizona State University Has the Best Online PhD Program in Cyber Security

Besides being 100 percent online with no residency requirements, Arizona State University is the best choice because of its focus on research, dissertation preparation, and understanding of cutting-edge trends in cyber security.

This program is extremely flexible, robust, and convenient, and its online nature allows it to be one of the more affordable options on the list at less than $12,000 per academic year.

Best Online Master’s Degrees

[query_class_embed] online-*subject-masters-degrees

Online PhD in Cyber Security Admission Requirements

The admission requirements for an online PhD in Cyber Security include submitting essays, having previous academic success, providing letters of recommendation, and meeting certain GPA requirements.

To ensure your successful admission into the program, be prepared to have at least two letters of recommendation, a cumulative GPA above 3.0, a Bachelor’s Degree in Cyber Security or a related field like computer science, have at least a B grade in all computer science and related classes, and submit a resume with three to five years of relevant professional experience.

  • Cumulative GPA above 3.0 or higher
  • A B grade in all computer science or related classes
  • At least two letters of recommendation
  • Three to five years of relevant work experience required with a resume
  • An essay or letter of intent
  • A bachelor’s degree in cyber security or related field like computer science

Best Online PhDs in Cyber Security: Top Degree Program Details

Best online phds in cyber security: top university programs to get a phd in cyber security online.

The best online PhDs in Cyber Security are from accredited, reputable institutions. Some of the schools that offer these programs can be found in the list below and include Colorado Technical University, Marymount University, and Nova Southeastern University. Below you’ll find a description of several PhD programs, their accreditation status, tuition rate, and admissions requirements that contribute to the ranking of these top schools.

Arizona State University is one of the most well-known online universities and allows students to pursue a doctoral program wherever they are. Arizona State University is fully online and forgoes the traditional residency requirements that many online doctoral programs still have.

Computer Science (Cybersecurity), PhD

Arizona State University’s Computer Science (Cybersecurity) PhD is a fully online cyber security program that focuses on three key areas: gaining knowledge, testing knowledge, and the creation and defense of a dissertation. The program lasts between three and 10 years and is designed for students to complete on their schedule.

Computer Science (Cybersecurity), PhD Overview

  • Accreditation: Higher Learning Commission (HLC)
  • Program Length: 3.5 to 10  years
  • Acceptance Rate: Not specified
  • Tuition and Fees: Graduate tuition of $11,720 per semester and a $70 application fee

Computer Science (Cybersecurity), PhD Admission Requirements

  • Official transcripts with a GPA of 3.5 minimum
  • Three letters of recommendation, a personal statement of purpose, and a resume or any previous educational certifications must be submitted
  • GRE scores are optional but recommended
  • Completion of the following core courses within the past two years with a 3.0 minimum GPA: CSE 230 Computer Organization and Assembly Language Programming, CSE 310 Data Structures and Algorithms, CSE 330 Operating Systems, and CSE 340 Principles of Programming Languages or CSE 355 Introduction to Theoretical Computer Science

Located in Washington DC, Capitol Technology University offers prospective students an exciting opportunity to learn in a hybrid format. Due to its hybrid nature, Capitol Technology University is a great option for students pursuing a more limited residency component while focusing on the majority of their doctorates online.

Doctorate (DSc) in Cybersecurity

Consisting of between 54 and 66 total credits, Capitol Technology University’s Doctorate (DSc) in Cybersecurity is a great option for those who want to stretch their research muscles. With a focus on research and a minimal residency requirement, Capitol Technology University gives students the more traditional PhD experience while maintaining a mostly online curriculum.

Doctorate (DSc) in Cybersecurity Overview

  • Accreditation: Middle States Commission on Higher Education (MSCHE)
  • Program Length: 3 to 4 years
  • Tuition and Fees: $933 cost per credit charge and a $100 application fee

Doctorate (DSc) in Cybersecurity Admission Requirements

  • A master’s degree in a relevant field such as computer science, cyber crime, or systems engineering
  • A resume (Microsoft Word or PDF format) that showcases at least five years of related work experience in technology or cyber security
  • An essay on how you would add to or advance the field of information assurance and cyber security professionally
  • Online application 
  • Sealed transcripts from all previous post-secondary institutions attended
  • Two letters of recommendation
  • $100 application fee
  • If selected, you will participate in an admissions interview

Founded in 1965, Colorado Technical University has helped online students since the online school opened in 1995. With a focus on research and ensuring doctorate students achieve a well-rounded education, Colorado Technical University is an excellent choice for a flexible doctorate program.

Online Doctorate in Cybersecurity: Doctor of Computer Science - Cybersecurity and Information Assurance

Colorado Technical University’s online cyber security doctorate consists of a whopping 100 total credit hours, making it one of the most robust doctorate programs. 

Out of the 100 credit hours, the program focuses on three key areas: doctoral research and dissertation preparation, current knowledge in cyber security and computer science , and 40 credit hours dedicated to a student’s specific specialization.

  • Program Length: 3 years
  • Acceptance Rate: Not listed for doctoral students
  • Tuition and Fees: $598 cost per credit charge

Online Doctorate in Cybersecurity: Doctor of Computer Science - Cybersecurity and Information Assurance Admission Requirements

  • Contact the schooL and speak to an advisor
  • Complete an online application
  • Submit all official transcripts to the office of graduate admissions
  • Ask admissions for the entrance essay requirements
  • Schedule and attend an interview with a representative from the doctoral admission department

With over 3,000 students attending, Dakota State University is a small school with big ambition. From its founding in the 1880s as a school for teachers, it has now become one of the most technologically forward schools in the Midwest. Dakota State University is a great option for students who want a more one-on-one approach to their doctorate.

Doctor of Philosophy in Cyber Defense (PHDCD)

This degree is a career-focused doctoral degree focused on preparing students for the threats facing cyber security and defense. Dakota State University has three separate residency requirements for each year of the program. These requirements are a great way to connect with other doctoral students and faculty while attending this mostly online program.

Doctor of Philosophy in Cyber Defense (PHDCD) Overview

  • Acceptance Rate: None listed
  • Tuition and Fees: Graduate resident tuition is $333.25 per credit hour; non-resident graduate tuition is $503.20 per credit hour; $35 application fee

Doctor of Philosophy in Cyber Defense (PHDCD) Admission Requirements

  • Bachelor’s degree from a regionally accredited institution in a related field
  • GPA of at least 3.0 on all computer science courses
  • High or acceptable GRE scores from within the last five years
  • Cumulative GPA of 3.25 or higher on the accredited bachelor program
  • Grade above 3.0 or B in all graduate work and at least nine hours of graduate projects completed
  • Must have graduated in the last fifteen years or sooner

For over 130 years, George Washington University has helped students achieve bachelor's, master's, and doctorate degrees from the nation's capital. In 2000, the engineering school began offering applied science programs fully online, and today it boasts an online student population of over 6,000 across all programs.

Online Doctor of Engineering in Cybersecurity Analytics

This is a hybrid online PhD program with a focus on teamwork, consisting of two distinct phases. The phases in this program include a hybrid class learning phase and a research phase for students to publish a journal piece side-by-side with advisors and graduate researchers.

Online Doctor of Engineering in Cybersecurity Analytics Overview

  • Program Length: 2 years
  • Tuition and Fees: $1,625 per credit hour and a non-refundable $995 tuition deposit

Online Doctor of Engineering in Cybersecurity Analytics Admission Requirements

  • Students must have obtained bachelor's and master’s degrees in information technology, applied science, computer science, engineering, or a related field
  • If the applicant has a different undergraduate or master’s, they may be asked to take EMSE 4197 at George Washington University and required to complete two college level calculus courses
  • Minimum GPA of 3.2 upon completion of their master’s program
  • Complete the online application and attach a resume before submitting
  • Submit official transcripts from all previously attended universities
  • Submit a 250 word statement of purpose containing why the student is seeking a PhD, what they plan to do in the field, previous work experience, and why they chose George Washington University

Founded in 1950 as an exclusively Catholic university, Marymount University has a student body of over 4,000 students. Marymount University is one of the only universities on our list to offer a doctorate of science rather than a PhD, making it a unique choice for students who are more focused on research.

Venus profile photo

"Career Karma entered my life when I needed it most and quickly helped me match with a bootcamp. Two months after graduating, I found my dream job that aligned with my values and goals in life!"

Venus, Software Engineer at Rockbot

Marymount University’s doctorate is a research-heavy degree focused on applied research into the ethical, societal, policy, and technological aspects of cyber security. The doctoral program has an emphasis on the intersection of applied research and leadership needed to implement cyber security processes and policies. Students can start this program with just a Bachelor’s in Cyber Security, which makes this a rather unique doctoral program

  • Accreditation: Southern Associations of Colleges and Schools Commission on Colleges (SACSCOC) and National Center of Academic Excellence for Cyber Defense Education (CAE/CDE) by the National Security Agency and the Department of Homeland Security
  • Program Length: 1.5 to 3 years
  • Tuition and Fees: $1,140 cost per credit hour
  • Fill out the graduate application
  • Submit all official transcripts from any previously attended institutions
  • Include a professional resume separately from your official transcripts
  • Submit a one-page statement of research outlining your goals, research objectives, reason for attending Marymount, and example topics for your thesis project
  • Submit two professional or academic writing samples pertaining to cyber security that are between four and six pages in length
  • Students must have completed at least two college level statistics courses with a B grade minimum

New Jersey City University is located in Jersey City, New Jersey and was founded in 1927 as a training school for educators. In the modern era, the legacy continues with 47 undergraduate degrees and 30 graduate programs. 

Doctor Of Science (DSc) in Civil Security Leadership, Management & Policy

New Jersey City University cyber security doctorate is a hybrid program starting with two full weeks of introductory courses on campus and continues with two weekends per semester in person. 

The combination of hybrid residency requirements and a focus on student-guided interests make this one of the best choices for students who have a clear topic of interest in cyber security.

Doctor Of Science (DSc) in Civil Security Leadership, Management & Policy Overview

  • Program Length: 2 to 3 years
  • Tuition and Fees: $1,149.85 cost per credit hour and a $114.25 per credit fee; $55 graduate application fee

Doctor Of Science (DSc) in Civil Security Leadership, Management & Policy Admission Requirements

  • Applicants must possess a master’s degree with a GPA of 3.5 or higher
  • Submit a resume with four years of relevant work experience
  • Complete and have a satisfactory GRE score 
  • Submit two letters of recommendation and a one-page letter with a proposed dissertation topic
  • Official transcripts must be submitted to the Graduate Studies Office
  • Contact the Graduate Studies Office for additional requirements and forms
  • An admissions interview may be required

Located in San Diego, California, Northcentral University is the youngest university on our list. Founded in 1996 with a focus on online education, Northcentral University makes an excellent choice to get a doctorate online.

Cybersecurity, PhD-TM

Northcentral University’s Doctor of Philosophy in Cybersecurity is a degree track including several specializations. This program has no set class times, is a fully online program, and has program tracks that can be completed in as little as 40 months at any time. This program gives applicants the freedom to start classes at any point throughout the school year.

Cybersecurity, PhD-TM Overview

  • Accreditation: WASC Senior College and University Commission (WSCUC)
  • Program Length: 40 to 44 months depending on the degree track
  • Tuition and Fees: $1,094 base cost per credit; course estimated fees ranging from $50 to $135 

Cybersecurity, PhD-TM Admission Requirements

  • Begin the online application and submit all documents through the provided portal
  • Submit transcripts and use the official transfer submission form
  • Have a degree in a field related to computer science
  • Complete the online application and choose a start date

Founded in 1959, Northeastern University is full of charm and provides a great option for students. Located in Boston, Massachusetts, Northeastern University has a research-focused approach to its online doctoral programs.

Cybersecurity, PhD

Northeastern University’s Cyber Security PhD program is a 48-credit-hour research-based hybrid doctoral program. The program consists of annual reviews to keep students on track, core and elective components, and dissertation preparation and review. 

Students also are required to enroll in a full year of residency with an emphasis on exam preparation, dissertation research, and fulfilling the teaching requirement. 

Teaching requirements for this program consist of three hours of lectures, preparation of at least one assignment, and an entire semester of participation in a teaching assistant or instructor of record position.

Cybersecurity, PhD Overview

  • Accreditation: New England Commission of Higher Education, Inc. (NECHE)
  • Program Length: 4 to 5 years
  • Tuition and Fees: $1,532 cost per credit hour with no application fee listed

Cybersecurity, PhD Admission Requirements

  • Fill out the online application
  • Upload unofficial transcripts
  • Have a cumulative GPA of 3.5 in relevant master and undergraduate courses 
  • Submit a statement of purpose outlining your goals and aspirations for the future
  • Submit a recent resume that includes your job duties and responsibilities
  • Submit three letters of recommendation

Nova Southeastern University is a university located in Fort Lauderdale, Florida. This university offers degrees of all levels and has a student population of 24,000. Founded in 1964 as a research institute of technology, the legacy of technological research is alive and well today.

PhD in Cybersecurity Management

Nova Southeastern University’s PhD program can be completed in just three years. The program emphasizes research, with 24 required credits of dissertation research across three semesters. Classes can be taken in a hybrid or online format, making learning more flexible.

PhD in Cybersecurity Management Overview

  • Program Length: 3 to 5 years
  • Tuition and Fees: $1,282 per credit hour course fee; $50 application fee; $30 per-semester registration fee

PhD in Cybersecurity Management Admission Requirements

  • You must have completed a master’s program with a GPA of at least 3.25 from a regionally accredited institution with a major in computer science or a related field
  • Fill out the online application and pay the application fee
  • Send sealed official transcripts from all institutions attended
  • Submit three letters of recommendation from professors, supervisors, or employers that attest to your capabilities of completing the program (letters from family, friends, or those without experience in research or doctoral programs are prohibited and may result in immediate application rejection)
  • Submit a resume of both academic and work experience
  • English language proficiency is required and expected (any spelling or grammatical errors are grounds for application rejection. English language proficiency exam and remedial English classes if needed are recommended before applying)

Online Cyber Security PhD Graduation Rates: How Hard Is It to Complete an Online PhD Program in Cyber Security?

It is hard to complete an online PhD in Cyber Security. Although the National Center for Science and Engineering Statistics determined that in the United States the graduation rate for PhD students was 98 percent in 2019 , the selection and admission process can be rigorous, as schools seek the most dedicated potential PhD students.

How Long Does It Take to Get a PhD in Cyber Security Online?

It can take anywhere between two and 10 years to earn a PhD in Cyber Security online. It can take longer depending on the number of residency requirements, dissertation length, and the careers of students while in school.

The great thing about an online degree in cyber security is that any online PhD program or degree is flexible. Students can hold full-time jobs and grow in their careers while attending a PhD program online. It is up to students to decide how they want to approach a PhD program, which means programs like these can last as long as they need to.

How Hard Is an Online Doctorate in Cyber Security?

It is very difficult to be accepted into a PhD program. However, the accepted students are highly dedicated to their program, and dedication is the key to overcoming challenges and adversity. Less than two percent of students don’t earn their PhD in the US, which means that 98 percent of doctoral students earn their PhD, based on data from the National Center for Science and Engineering Statistics.

This means that if you are accepted into a Doctorate of Cyber Security or a similar program, there is a good chance you will eventually achieve your goal and earn that PhD. The hardest thing for most students in earning a PhD is the dissertation requirements.

A dissertation requires months of research and a well-argued defense once finished. Some students take years to complete and defend a dissertation, making it the most time-consuming and the most difficult part of any PhD program.

Best PhD Programs

[query_class_embed] phd-in-*subject

What Courses Are in an Online Cyber Security PhD Program?

The most common courses in an online cyber security PhD program teach students about top new trends in cyber security , provide dedicated research time, provide classes on dissertation preparation, and contain symposia for students to attend while networking and learning from experts.

Main Areas of Study in a Cyber Security PhD Program

  • Advancements in cyber security
  • Dissertation research and lab time
  • Dissertation argument preparation
  • Lecture and networking symposia

How Much Does Getting an Online Cyber Security PhD Cost?

It can cost between $600 to $2,000 per credit hour to earn a Doctorate in Cyber Security. Most institutions charge on a semester basis and the courses are not as rigid as in lower levels of academia.

Since the main purpose of a PhD program is to research unique additions to the cyber security field and practice what you learned in a teaching capacity, many institutions offer scholarships to offset the cost of a doctoral program.

How to Pay for an Online PhD Program in Cyber Security

Doctoral programs generally offer scholarships and aid to students seeking a doctorate. Each school has its own department of financial aid that can help students locate aid or outline requirements to qualify. Many factors, including academic prowess, previous internships, and financial status can all help students gain financial aid.

How to Get an Online PhD for Free

There is no way to get a degree in cyber security for free, especially a PhD. However, many schools offer scholarships or discounted classes for staff members. PhD classes may be available for students who have completed master’s classes or applied for a research position at the school. Some schools even offer research programs where PhD students can apply for a full-time career with classes as part of a benefits package.

What Is the Most Affordable Online PhD in Cyber Security Degree Program?

The most affordable online PhD in Cyber Security is offered by Dakota State University’s Doctor of Philosophy in Cyber Defense.

Most Affordable Online PhD Programs in Cyber Security: In Brief

Why you should get an online phd in cyber security.

You should get an online PhD in Cyber Security if you want to become a researcher in cyber security or teach classes in the field. Those with a PhD generally add to the body of research in their field. However, many also teach the subject at different levels of academia. If either of these options sounds great to you, then a PhD in Cyber Security is a wonderful investment.

Top Reasons for Getting a PhD in Cyber Security

  • To teach the subject. The knowledge gained from a PhD and work experience in the field creates the perfect circumstances for those who want to help others learn.
  • To excel in your field as an expert. A cyber security degree prepares recipients to be experts in the field. With a PhD in Cyber Security, graduates are prepared to face the world’s most advanced challenges with confidence.
  • To add to the field of research. PhD students write a dissertation in their field that adds to the research and knowledge in that field. However, as an expert in the field, you have the opportunity to continuously contribute to the information available in the sector of computer science and criminology.
  • To share your expert opinion with others. PhD students are experts in the field and are frequently asked to divulge their opinions and knowledge. From being a cable news guest to an expert consultant for a tech company, there are many opportunities to leverage a PhD. You will likely see perks like increased pay and prestigious job roles.

Best Master’s Degree Programs

[query_class_embed] *subject-masters-degrees

What Is the Difference Between an On-Campus Cyber Security PhD and an Online PhD in Cyber Security?

The biggest difference between an on-campus cyber security PhD and an online cyber security PhD is the difference in location. In an online PhD, the learning method is fully online, despite that many of the online options listed above have certain residency requirements.

However, all on-campus PhD programs have residency requirements by nature. Students usually have internships, mandatory lectures, dissertation research labs, and an in-person dissertation defense. All of these are done on campus during an on-campus program, while in an online program, only some or even none of these are done on campus.

Online PhD vs On-Campus PhD: Key Differences

  • Flexibility. In-person classes in a PhD program generally require students to attend all lectures and classes live and in person while in the program. With an online class, lectures can be recorded, listened to later, or be pre-recorded entirely, which allows for greater flexibility with fewer set class times.
  • Teaching requirements. Many PhD programs are geared toward those who would like to teach in their chosen field. In cyber security, many of the students seeking a PhD may not be on that path, and as such the majority of online classes we listed above don’t have these teaching requirements. Many in-person classes have teaching requirements.
  • Knowledge acquired. Cyber security by nature involves information technology, combating cyber threats, and protecting data. This means that an online format for classes and research is much closer to the environment a cyber security expert will find themselves in.
  • Access to faculty. A dissertation is typically required for a PhD and is the culmination of a student’s efforts over a few months or years. In an online format, students have access to online resources but may not have full access to advisors, colleagues, or the library. Resources like libraries, labs, and faculty advisors make an on-campus option an attractive one for many students.

How to Get a PhD in Cyber Security Online: A Step-by-Step Guide

A man with a beard and glasses types lines of code into a monitor.

You can get a PhD in Cyber Security online by getting experience in the field before you apply for any doctoral program. Many schools not only require top-notch grades but also recommendations from mentors and experts in the field to even be accepted into a cyber security PhD program. Thankfully, there are several key steps to help increase your chances of being accepted into a PhD program like this.

To get accepted into a PhD in Cyber Security program, you must first enroll in and finish a Master’s Degree in Cyber Security or a related field. PhD programs primarily equip recipients to add to their field of research, which means academic prowess is needed. To apply and be accepted into a PhD program, a cumulative GPA of 3.0 or higher is needed to enroll.

PhD requirements for a degree in cyber security include a certain amount of experience before students are even considered for admission. Thus, getting a job in cyber security and gaining at least five years of industry experience is a great way to prepare for a PhD program.

There are many options when choosing a school or cyber security program. Be sure to check all relevant requirements for admission, program length, area of focus, and accreditation factors before applying. Since the list at the beginning of the article contains all online schools, perusing the schools’ summaries may be a great place to start your search.

Generally, PhD classes are not as rigorously structured as a bachelor’s or master’s degree. PhD classes are highly specialized, and many are focused on research and attending lectures from experts to keep PhD students up to date on the latest trends. Maintaining a high GPA in these advanced classes is crucial for any graduate student.

The capstone to any PhD program is a dissertation. A dissertation is one of the hardest and most involved projects a student can undertake. There are many ways to approach a dissertation and add to the body of research on cyber security, but students should be aware that dissertations take up at least one-third of a PhD program.

Online PhD in Cyber Security Salary and Job Outlook

An online PhD in Cyber Security can lead to many different types of cyber security jobs in the information technology field. All of the jobs listed in the section below are growing at an average or faster than average rate.

Many of the job roles also include salaries beyond the six-figure range, and the highest-paying job pays just over $130,000 dollars on average. This makes cyber security a safe, lucrative, and rewarding career.

What Can You Do With an Online Doctorate in Cyber Security?

With an online Doctorate in Cyber Security, you can become a leading expert in the field of cyber security and information assurance. The types of jobs you can get with this doctorate are vast but mainly focus on protecting, storing, and creating data systems. Jobs like research scientists, network analysts, and professors are all careers you can get with this PhD.

Best Jobs with a PhD in Cyber Security

  • Computer and Information Research Scientists
  • Computer Network Architects
  • Information Security Analysts
  • Database Administrators and Architects
  • Computer Science Teachers, post-secondary

Potential Careers With a Cyber Security Degree

[query_class_embed] how-to-become-a-*profession

What Is the Average Salary for an Online PhD Holder in Cyber Security?

The average salary for an online PhD holder in cyber security can range from $97,540 to $163,640 , according to the US Bureau of Labor Statistics. With a PhD in Cyber Security, you can apply for many jobs in the computer science field. That’s why we’ve listed the top jobs in cyber security in the table below, so you can approach your PhD program and career with confidence.

Highest-Paying Cyber Security Jobs for PhD Grads

Best cyber security jobs for online phd holders.

The best cyber security jobs for online PhD holders are the ones that leverage their unique skillset, knowledge, and experience. Jobs in the public sector or private sector like network architects, database managers, information analysts, and university professors are all excellent roles for cyber security PhD holders.

The largest area of growth comes from computer science researcher careers, which also have the highest-paying salary in the cyber security industry. Research scientists are at the forefront of problem solving and are on the front line of cyber security, tackling information technology threats from all across the globe.

  • Salary with a Cyber Security PhD: $131,490
  • Job Outlook: 22% job growth from 2020 to 2030
  • Number of Jobs: 33,000
  • Highest-Paying States: Oregon, Arizona, Texas, Massachusetts, and Washington

Network architects in cyber security ensure networks are designed to withstand a myriad of cyber attacks. DDOS (distributed denial of service) attacks, password security, and even physical safety procedures like locks and keypads are all tackled by these professionals. 

The network and infrastructure of any system need to have the best protection out there, and cyber security PhD professionals are the ones best equipped to handle computer architecture issues and build and defend these systems.

  • Salary with a Cyber Security PhD: $120,520
  • Job Outlook: 5% job growth from 2020 to 2030
  • Number of Jobs: 165,200
  • Highest-Paying States: New Jersey, Rhode Island, Delaware, Virginia, and Maryland

Generally, information security analysts analyze, document, and report changes and vulnerabilities in networks. An information security analyst is a key position in cyber security, and many senior-level positions are a great fit for those with a cyber security PhD.

  • Salary with a Cyber Security PhD: $102,600
  • Job Outlook: 33% job growth from 2020 to 2030
  • Number of Jobs: 141,200
  • Highest-Paying States: California, New York, Maryland, Iowa, and District of Columbia

Like computer network architects, database administrators and architects are responsible for the safety and security of a network, database, or system. These positions usually involve the maintenance and continuous upkeep of these systems after a network architect builds them.

  • Salary with a Cyber Security PhD: $98,860
  • Job Outlook: 8% job growth from 2020 to 2030
  • Number of Jobs: 168,000
  • Highest-Paying States: New Jersey, Maryland, California, District of Columbia, and Massachusetts

The two most common reasons for getting a PhD are to become a professor or work as a researcher at a university. Around half of all PhD students teach at universities, which can be an exciting and rewarding career path. If teaching students, researching, and imparting knowledge appeal to you, becoming a university professor may be a great option for you.

  • Salary with a Cyber Security PhD: $89,610
  • Job Outlook: 12% job growth from 2020 to 2030
  • Number of Jobs: 37,600
  • Highest-Paying States: California, Oregon, District of Columbia, New York, and Massachusetts

Is It Worth It to Do a PhD in Cyber Security Online?

A PhD in Cyber Security is worth it if you are planning on teaching or researching cyber security. Even then, many positions benefit from working in cyber security. A PhD is a great step for those wanting to become experts in their field, pursued by those with at least five years or more.

However, you should only get a PhD in Cyber Security if you enjoy teaching or the position you ultimately want requires it. Most positions will help you grow as a cyber security expert with just a master’s or even a bachelor’s degree.

Additional Reading About Cyber Security

[query_class_embed] https://careerkarma.com/blog/cyber-security-best-practices/ https://careerkarma.com/blog/how-to-get-a-job-in-cyber-security/ https://careerkarma.com/blog/how-to-switch-to-cybersecurity-career/

Online PhD in Cyber Security FAQ

Many cyber security doctoral-level programs require expertise in computer science, programming languages , and advanced math classes. Doctoral education includes classes like calculus, statistics, Boolean and linear algebra, and binary arithmetic. An understanding of mathematical concepts is important, as PhD programs build on these concepts mastered in specific degrees.

The difference between a PhD and a doctorate is that not all doctoral candidates are awarded a PhD. Medical doctors are awarded an MD or medical doctorate rather than a PhD upon completion of their program. While business students can be awarded a PhD or a DBA, known formally as a doctor of business administration.

Cyber security can be very stressful. From solving algorithms and finding malicious code to encrypting data, these jobs are challenging, but they can be fulfilling and rewarding in the hands of suitable candidates. Cyber security focuses on taking security measures to keep data, people, systems, and sometimes entire nations safe. This can create a high-stress work environment.

Yes, cyber security absolutely requires coding. To conduct digital forensics processes and become a successful security consultant, technical skills and knowledge of programming, algorithms, server infrastructure, binary numbers, and database management are all required. For students to achieve their career goals in the tech industry or have successful academic careers, they must be proficient in all the skills mentioned.

About us: Career Karma is a platform designed to help job seekers find, research, and connect with job training programs to advance their careers. Learn about the CK publication .

What's Next?

icon_10

Get matched with top bootcamps

Ask a question to our community, take our careers quiz.

Joseph Taglavore

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Apply to top tech training programs in one click

a student listens to a lecture

PhD in Cybersecurity

The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

  • Explore plan of study
  • View program requirements
  • How to apply
  • Request info

phd cyber security online

PhD students at Khoury College gain deep knowledge and invaluable experience—preparing them for a career in academia as well as research.

phd cyber security online

Our flagship campus in Boston is just minutes away from esteemed universities, exciting start-ups, and leaders in tech, finance, health care, and more.

phd cyber security online

Research Projects

December 15, 2023

Khoury Graduate Admissions Team

  • Financial support

January 1, 1066

January 1, 1492

Khoury Align Admissions Team

  • How to Apply
  • Cost & Financial Aid

Northeastern University - Khoury College of Computer Sciences

Khoury Social

Khoury College youtube link

Contact Khoury

phd cyber security online

I'm seeking information for

phd cyber security online

Online PhD in Cyber Security Degrees

Cybersecurity Degrees » Online Cybersecurity Degree Programs » Online PhD in Cyber Security Degrees

Consider a sponsored online program currently accepting applicants.

Click to see sponsored 100% online cybersecurity programs currently taking applicants for 2024 .

Doctorate-level degrees in cybersecurity provide advanced knowledge and valuable research opportunities to professionals that are looking at some of the highest positions in their industry. This type of education is also extremely valuable to professors and researchers that are looking to continue their studies even after the completion of this program. These further studies will lead to academic research papers and innovation in the field of cybersecurity.

Why consider a doctorate level cyber degree?

Obtaining a Doctor of Philosophy, or PhD, gives working professionals the skills needed to research and develop new security measures and the expertise to maintain the information technology sector of an organization.

Having the ability to do this online is convenient for those that are looking to gain an education while continuing their career path, but there are many programs that require on-campus residencies to prepare students or to present their final dissertations. Various degrees will emphasize either practical solutions to cybersecurity issues or finding new innovations through theory and historical development of protecting vital information.

What Can You Do With a PhD in Cyber Security?

Receiving the high-level graduate degree within cybersecurity opens up the entire information technology industry. There is a significant need for experts that can fend off data breaches and internet attacks to a company's network and retrieve sensitive information, such as personal client medical records or consumer transactions with exposed payment methods.

Ensuring that communication is secure has only become more important as people continue to rely on the transfer of information on various devices and apps constantly every day.

There are variations of the doctorate that students can study to receive specific education, and it revolves around the solution to industry problems within the cybersecurity. Those receiving the discipline directly will typically apply practical solutions directly to the company they represent. A Doctor of Philosophy, or PhD, may explore specific topics in network security or computer science, and education revolves around theory and how to find solutions to issues like cyber attacks through research and development.

After completion of a doctoral program, graduates should be able to solve complex issues within the company or organization they represent. They have gained the advanced and expertise knowledge in a particular sector and should be able to deal with any cybersecurity issues that arise. Ultimately, their goal is to improve cybersecurity systems and to help them protect organizations more efficiently on a national and/or global scale.

Online PhD in Cyber Security Degree Availability

Many online-based institutions that offer programs within computer science and cybersecurity also feature accredited doctorate degrees. Students can expect to find disciplines directly in cybersecurity or in a similar field, such as information assurance or security in information technology. Even though the curriculum may be fully available online, each institution has their own unique requirements when it comes to presenting final dissertations or holding on-campus residencies.

When reviewing online programs, it is important to consider institutions that have been designated as a National Center of Academic Excellence by the Department of Homeland Security and the National Security Agency. This shows that the program has been reviewed alongside a rigid criteria to ensure that students are fully prepared to enter into the field of cybersecurity. Programs hold accreditation in specific categories, such as cyber defense education, cyber defense research, and cyber operations.

What to look for in a Doctorate program

There are very few programs available online where students can fully complete a PhD within cybersecurity. Many programs require the student to complete on-campus residencies that will give them the opportunity to meet faculty members and students. During these times, they may also work on their dissertation, and they must complete a defense of their dissertation in front of faculty members to show their expertise on the particular topic.

Choose a research discipline

While there are a limited amount of programs that specifically have a discipline in data science, this can often be found as a specialization within disciplines such as Computer Science or Computer Engineering. Other similar concentrations include Information Assurance, Information Systems Security, and Digital Forensics. Information Assurance focuses on the validation and authenticity of data within an organization, and Digital Forensics focuses on the investigative process to solve digital-based crimes in a court of law.

Be prepared for some online courses but on-campus requirements

Students should prepare for online coursework that blends with on-campus requirements if they are considering a doctorate degree with an online format. An alternative to this process is finding an online Master's degree in a similar discipline that can be used to count toward the PhD. There is plenty of overlap in these programs, and this flexibility may allow for students to switch over from a Master's degree to a PhD with high academic merit.

Online Requirements and Expectations

Most PhD programs will require the student to meet on-campus at certain times of the program, such as once per year, but these are not lengthy requirements to satisfy. Residencies will typically last from a weekend to a full week and mostly consist of the student working on their dissertation. Any lab sessions or courses that require application of what is learned can generally be accomplished in a virtual setting or at the professional's place of work if applicable.

In order to complete online courses, students will need to verify that they have the proper setup to run the learning management system used by the university. This typically requires a Windows or Mac operating system that runs on a desktop or laptop computer. For some course materials, this can be accessed by a mobile device, such as a smartphone or tablet, but not all work can be completed in this format.

Additional technical requirements include having access to high-speed internet in order to download or stream on-demand lectures. A webcam and microphone may be required for courses that require students to attend lectures on a live basis. Other applications, such as Microsoft Office, web browsers such as Google Chrome or Mozilla Firefox, anti-virus software, and Adobe Acrobat Reader may be needed depending on the university.

What Are the Steps to Getting This Degree?

Doctorate degrees for cybersecurity generally require anywhere from 60 to 80 credit hours to complete, which can span from three to five years. Most of the program is dedicated to core courses and a concentration in cybersecurity if available. There may be some credit hours needed for electives that may either be part of the discipline being pursued or free electives to customize the program to fit an industry or particular career needs.

Around a third of most PhD programs will feature dissertation requirements. A dissertation is a research project with a specific focus on a topic in cybersecurity, such as a problem that is plaguing a certain industry. Once a topic is suggested and approved by a program faculty member, students are able to pursue the writing project and they will have to defend their dissertation at the end of the program.

In addition to the dissertation, multiple exams may also be needed to further expand on all the skills and concepts learned in the program. A qualifying exam will ensure that students are able to continue on with the PhD and begin their process with the dissertation. The comprehensive exam tests all the skills and concepts that the student has learned, which is usually completed at a separate time than the dissertation defense.

It is not a requirement to have a Master's degree for many computer science-based doctorate programs. Students can typically transfer over their credit from a Master's program if they choose to pursue a doctorate degree at a later date. This can cut the doctorate program nearly in half for students, decreasing the time commitment required and academic costs.

To gain the PhD degree at the end of the program, students will need to pass all examinations and successfully defend their dissertation. Many programs require that the student also maintains at least a 3.0 GPA during their studies. With many courses providing advanced topics, students must maintain a high level of academic achievement in order to successfully complete the program.

Admission Requirements

Getting into a doctorate program requires the completion of a Bachelor's degree from an accredited institution with high academic marks. Typical requirements for a Master's degree are holding a 3.0 cumulative GPA in their undergraduate studies, or this was achieved in the final 60 credit hours of their studies. For a PhD, this can jump to a GPA requirement of 3.3 or 3.5 overall.

Prospective students are not limited to this GPA requirement, but they may only receive conditional admittance into the program. This means they will need to achieve high marks in the first portion of the program in order to continue pursuing the degree. A slightly lower GPA than the requirement can be offset by higher Graduate Record Exam (GRE) scores or additional professional experience in cybersecurity.

Typical Document Requirements for Submission

Depending on the university, applicants will need to send their unofficial or official transcripts that showcase their accomplishments in higher education. If unofficial transcripts are only needed with the application, sending official transcripts are usually required once the student has been admitted into the program. This includes all academic work at various levels, including any certifications that have been earned.

Applicants should send their most updated resume to the university that showcases all of their prior work history and internship experience gained in other programs. Some programs may require a certain amount of work hours to get into the program, or students may need to complete this prior to graduating from the doctorate program. Resumes should include any accomplishments or

Multiple letters of recommendation are typically needed to verify that the student has high levels of accomplishment in this field. They may require some of the letters to be from an academic professor, but another source can be prior supervisors or managers in a professional work place. Applicants should review what specific requirements are needed with the letters of recommendation as they vary based on institution.

Personal essays are a common requirement in the application process, with potential candidates listing out why they have chosen a particular institution for their studies and what career goals they have in the cybersecurity field. These essays may also go into detail about any accomplishments within an industry that the individual has achieved.

Full-Time Versus Part-Time Enrollment for a PhD Degree

Doctorate degrees are often at least twice the length of a Master's degree program, meaning that students typically need between three to five years to complete their studies on a full-time basis. It is recommended by many schools that students pursue these graduate studies on a full-time basis due to the complexity of course content and the amount of time it takes to complete the dissertation and various assignments.

Many PhD degrees are geared for full-time study and may have some complications for those that are looking to pursue the program on a part-time basis. It may be difficult to focus on research projects without full concentration and may impact the quality of the research accomplished. Even on a part-time basis, there may be too much to balance when accomplishing high-level studies and continuing as a working professional.

Instead of completing the PhD along with a part-time job, students may consider looking at graduate assistantships or other positions within the university. This allows individuals to pursue their degree while completing various tasks for professors for a certain amount of hours per week. By accomplishing this, students will receive part or all of their tuition expenses cut and a stipend to pay for other needs.

Part-time study may be accepted at the institution, but students will have to consider the length of time it will take to complete their studies. This will increase the overall costs of the program with additional fees given out for extra years pursuing their degree. There is also a time limit at most universities, requiring students to complete the doctorate program in seven or eight years on average.

Other problems can emerge with completing the program on a part-time basis. In addition to the difficult coursework that requires plenty of focus, it may be a problem to balance struggles that exist in current employment and trying to complete advanced coursework at the same time. There are also limitations in communicating with other faculty members and students for additional help or working on group projects.

Examples of Doctorate Degrees

It is also important to determine that the program has been verified as an accredited institution and the university has been designated as a National Center of Academic Excellence (CAE) from the National Security Agency (NSA) and Department of Homeland Security (DHS). This means that the curriculum has met rigorous requirements under different security topics, such as cyber defense and cyber operations.

Regional accreditation is based on where the university is located and remains a standard when institutions are looking at students for their graduate programs. The six states based in the New England region are accredited by the New England Association of Schools and Colleges. The Southern Association of Colleges and Schools reviews a number of places in the Southeast and along the East Coast, including the states of Florida , North Carolina , Texas , and Virginia .

Online PhD Degrees for Cyber Security

Northcentral university.

This online college based in San Diego, California, has a number of doctorate programs available in technology, including the Doctor of Philosophy in Technology and Innovation Management. Within the doctorate program, there are six specializations to consider, including Cybersecurity. Students should expect to complete the program in the span of 50 months.

A total of 60 credit hours are needed to fulfill degree requirements, and with most courses being worth three credit hours, 20 courses will be taken in the program. 48 credit hours must be completed at the university, which allows for 12 total credit hours to be transferred into the program. Students must complete all courses while maintaining a 3.0 cumulative GPA.

Courses that students can explore in the main program include Computer Networks and Mobile Computing, Statistics with Technology Applications, and Technology Policy and Strategy. The latter course focuses on legal analysis in network security and gives students case study to review and policies that organizations must follow based on federal guidelines. 18 total credit hours are needed for the Cybersecurity specialization, with courses such as Cyber Forensics and Advanced Risk Management.

One of the unique student services the university offers is the Dissertation Completion Pathway, which gives those that were not able to complete their dissertation elsewhere to do so at their institution. This is a shorter program that requires at least 23 credit hours.

Capitol Technology University

Gaining a Doctorate degree in Cybersecurity through the technology institution prepares students for executive roles within the private sector and any government level. There are various electives that can customize the program and give specialty skills and knowledge within the security of health care, information assurance, cybersecurity software development, and strategic management for intrusion detection and eliminating vulnerabilities.

Up to 66 credit hours are needed to complete the curriculum at Capitol Tech, which is based in the Greater Washington DC area and is also available online. Along with dissertation preparation, some courses include Information Assurance Consulting, Advanced Mixed Methods Research, and Special Topics in Human Resource Management. There is a 16-week course that prepares students for the doctoral degree with specialized research for the career path they are pursuing.

Prospective students can apply for the doctorate degree in cybersecurity for the fall and spring semesters. An essay of at least 1,000 words that covers what the student plans to do within the cybersecurity field. Applicants must submit the essay with the application form and a fee, official transcripts, updated resume, and multiple letters of recommendation. More information may be necessary based on the college’s review.

Nova Southeastern University

The College of Computing and Engineering provide a PhD in Cybersecurity Management, which requires 67 credits to complete and is offered in a hybrid format. This means students will be mostly completing coursework and generally interacting with students and faculty members online, but they will have physical meetings once per term at the Fort Lauderdale campus. These are required meetings for students.

Examples of core courses that students will complete include Information Security Risk Management, Secure Systems Analysis and Design, and Human-Computer Interaction. 24 credits are reserved for dissertation studies, and students will also need to complete two doctoral research studies within information assurance. Some of the goals the university has for their graduates are to gain advanced knowledge within cybersecurity and to be prepared to lead and manage cybersecurity teams with strong communication skills and being fully competent of the ethics required.

Students looking for a fellowship opportunity to satisfy financial needs and gain additional experience may be eligible for one of six positions offered by the school. Applicants must submit a reference letter, hold at least a 3.0 cumulative GPA, and are going into a career that involves teaching or research. Recipients are not able to hold a job so they can commit their time to education and research, but the award provides tuition assistance for the duration of the program.

Dakota State University

The Beacom College of Computer and Cyber Sciences offers the Doctor of Philosophy in Cyber Operations, which focuses on advanced topics in cybersecurity. Graduates from the program have gone on to work at organizations such as the Central Intelligence Agency, US Army Intelligence and Security Command (INSCOM), and Carnegie Mellon’s Software Engineering Institute.

Along with the core curriculum and research-driven courses that account for 24 total credit hours, students will need to complete three credit hours of on-campus research seminars. Meeting faculty members, determining a dissertation topic, and finishing dissertation defense is accomplished in this requirement. 25 credit hours are geared toward the dissertation itself, and the remaining nine credit hours are for customizable electives.

Some courses are only available at certain times of the year. For example, dissertation work is available all year long, but Dissertation Preparation is only available in the spring on an annual basis. All students must maintain a 3.0 cumulative GPA, and no more than two C grades are allowed in the entire curriculum or the student will be put on academic probation and eventual dismissal if the grades do not improve.

In order to get into the program, students must hold a Master’s degree from an accredited institution with a 3.0 cumulative GPA or higher. GRE scores are required in the admission process, but these are waived if the student has accomplished a 3.25 cumulative GPA in their Bachelor’s degree. Entry is only available for the fall semester into this program, so applications must be received by May 1st each year.

Colorado Technical University

Students can pursue the Doctorate of Computer Science with an emphasis in Big Data Analytics or Cybersecurity and Information Assurance. This is a program with an expected time of at least three years to complete. There are multiple start times throughout the year providing flexibility for students to enter into the program.

While the curriculum is fully available, there are in-person residencies that are required – two residencies are needed for this program and they are held quarterly in the Denver area. This gives students an ability to meet with other peers in their classes and faculty members one-on-one and there are various events that will aid in dissertations required for the student to complete. Students can maintain their schedule and join discussions with the CTU Symposium mobile app.

The 100-credit hour curriculum consists of the residencies, many levels of Doctoral and Dissertation Research, and various advanced topics within cybersecurity, such as Foundations of Digital Systems Security, Enterprise Security Architecture, and Principles of Research Methods and Design. At the conclusion of the program, students will be presenting their final dissertation and must be approved by a faculty supervisor.

Capella University

An online Doctor of Information Technology (DIT) with emphasis in Information Assurance and Cybersecurity can be obtained through the Minnesota-based institution. Students can also elect to take courses at the Minneapolis campus or pursue a combination of both. The curriculum is divided up into eight core courses and four specialization courses, along with various dissertations and three residency requirements, all requiring four days of attendance.

Two different IT degrees

Capella offers two versions of information technology degrees at this education level – the DIT and the Doctor of Philosophy in Information Technology. The DIT prepares students to solve business problems and to apply what they have learned directly into their career. Having a philosophical approach in the other program explores new theories that can be used to solve these issues instead. While both programs have a difference in solution, there is overlap in the specialization of assurance and cybersecurity.

DIT specialized on cybersecurity

The Doctor of Philosophy in Information Technology features a specialization in Information Assurance and Cybersecurity, giving students the capability to learn advanced knowledge in the field. In addition to five specialization courses, students complete a comprehensive exam that reviews all of the material they have learned, a dissertation spanning a large portion of their studies, and three on-campus residencies.

Typical courses you may take

Courses in the specialization include Enterprise Security Risk Management, Network Security Advances, and System and Application Security Advances. These topics cover the advancement of security and how this has impacted their implementation into company networks. Students do not have the availability to transfer in these courses for the specialization and must be taken through the school. Some specialization courses must be completed through this campus, including System and Application Security Advances and Enterprise Security Risk Management. The latter course has students review academic research and professional reports on risk modeling that impacts managerial decisions. Security advancement courses focuses on improvements in the field and the advantages of improving these processes with new available technology.

What each program is like at Capella

All three on-campus residencies focus on dissertation research, which first begins through an overview in an online course and the student builds upon their research when they meet faculty members and other students. The goal of the dissertation is to build critical thinking skills and the ability to communicate with others to help improve the dissertation, which requires significant research after determining a topic.

GuidedPath is a unique resource available to students that helps them get through the doctorate degree in a more focused process online. They will take between one to three courses during each of the four quarter terms available, which requires 10 weeks to complete. Based on availability and schedule, students will take the courses they have time for and only pay for what they are pursuing.

University of Rhode Island

The College of Arts and Sciences offers a Doctor of Philosophy in Computer Science, which can utilize the graduate certifications available in Cyber Security and Digital Forensics. All courses are available online, with lectures streamed on demand for students to learn at any time of the day, and all lab sessions are completed through the cloud-based infrastructure.

Examples of courses that can be completed and applied to the doctorate degree include Advanced Topics in Network and Systems Security, Advanced Incident Response, and Penetration Testing. Many courses will only be available at certain times of the year, and courses must be followed along a certain path in order to meet prerequisites for the more advanced courses.

Coursework is typically distributed each Friday, meaning students will have a week to complete their assignments and submit them by each Friday, and new coursework will be available on that day. Students have the capability of studying on their own time as long as they continue to meet deadlines.

Applications are accepted for these programs throughout the first half of the year to get admission for the fall, which is required for graduate certification in Cyber Security. Students must have a Bachelor’s degree with an undergraduate cumulative GPA of 3.0 or higher. There is no requirement to submit GRE scores, but other additional needs include two letters of recommendation and a statement of purpose.

On-Campus PhD Degrees for Cyber Security

University of tennessee.

The Tickle College of Engineering offers a few options for cybersecurity studies at the Knoxville campus location. One of the advanced programs is a Doctor of Philosophy in Computer Engineering, with a concentration in Cybersecurity. The amount of credit hours needed depends on if the student has taken a Master’s degree or hold prior academic work in the same discipline or related, such as computer science.

At least 72 credit hours are needed for students that only have a Bachelor’s degree or simultaneously completing a Master’s degree in a similar field through the university. This truncates to 48 total credit hours if they already have a Master’s degree. At least 24 credit hours are earned through taking dissertation courses and completing the research and writing requirements.

The comprehensive exam features both a written and oral segment, which connects with the dissertation, but may have additional writing requirements. Students must have a strong understanding of the topic they have studied and can thoroughly explain many aspects of it while demonstrating competency in communication and critical thinking. At least six months need to separate the comprehensive exam and defense of the dissertation.

Admission requires outstanding work in a Bachelor’s degree for students to be able to jump from the undergraduate program to the PhD program. GRE scores are needed for the admission process and should have been obtained in the last three years. For students that have a Master’s degree, up to six credit hours from courses that match the 400-level and above can be transferred into the program.

Arizona State University

Through the School of Computing, Informatics, and Decision Systems Engineering, students can complete the Doctor of Philosophy in Computer Science with a concentration in Cybersecurity. Students will complete five core courses that explore different aspects of computer science, and there is no ability to transfer credit for those courses unless they have already taken the courses at Arizona State University. Students do not have the capability to duplicate credit between the concentration focus and the core curriculum.

Nine total credit hours will count toward the Cybersecurity specialization. There is an overview of Information Assurance, then students will pick two of the following three courses: Advanced Computer Network Security, Applied Cryptography, or Software Security. 24 total credit hours will go toward both the research and dissertation portion of the curriculum.

Admission requirements include submitting a personal statement that details professional goals and why they are choosing this particular program. It should also feature any research experience that the individual has accomplished personally. In addition, there should be three letters of recommendation validating these accomplishments, from prior professors or professionals in the industry the individual has worked in.

Other needs to get into the program include holding a minimum cumulative 3.5 GPA or higher in the last 60 credit hours of work from the Bachelor’s degree, and this should be similar to the Master’s degree overall if they hold one. Up to 30 credit hours within a different graduate program, such as a Master’s degree, can be used to account for some credit if approved by the program.

Sam Houston State University

A Doctor of Philosophy in Digital and Cyber Forensic Science is available exclusively on campus for students that are looking at cybersecurity careers at the executive level or academic research at an institution. Topics include understanding network and mobile device forensics, ethical and legal issues in cybersecurity, and the basic principles of this field. 85 total credit hours are needed to complete the program for students that only hold a Bachelor’s degree.

Breaking the curriculum down, 52 credit hours are part of the core academic curriculum, 15 credit hours are gained through the dissertation, and the remaining 18 credit hours are for the internship and customizable electives. Examples of elective opportunities include Cloud Computing Forensics, Cryptography and Steganography, and Social Network Forensics.

Counting for six total credit hours, the internship will require 10 weeks of full-time commitment. This is another process to apply what the student has learned to real-time situations, giving them an additional opportunity and potential to network with an organization for improving job potential.

In order to gain admittance into the program, applicants must hold at least a Bachelor’s degree in a similar field from an accredited university, and they must have obtained a 3.5 cumulative GPA or higher. Three letters of recommendation are needed for verification, with at least two of them from faculty members. Other needs include a personal statement with a maximum of 1,000 words, updated resume, GRE scores, and a potential interview may be conducted.

University of Colorado-Colorado Springs

The College of Engineering and Applied Science offers the Doctor of Philosophy in Security, which has been verified by the NSA and DHS as a CAE in Information Assurance Education. In graduating the program, individuals will become an expert in the topic they decide to develop a dissertation on, and they have been able to improve upon their communication skills when presenting findings or working with others collaboratively.

60 total credit hours are needed to complete this program, and half of that credit must be completed with courses that are at the 5000 level or higher. There is an opportunity to transfer in 24 credit hours if the student has completed the Master’s degree previously. Half of the curriculum is dedicated to dissertation development and presentation.

Applicants should have at least a Bachelor’s degree from an accredited institution with at least a 3.3 GPA, and those entering the program with the completion of the Homeland Defense graduate certificate must also have the same GPA requirement. Additional admission materials include having three letters of recommendation, latest resume, and will need GRE scores if they did not complete their education at an accredited university.

Courses that students can choose in this program include Applied Cryptography, Advanced System Security Design, and System Administration and Security. At least three months of cyber operations must be completed in the form of training, internship, or already established professional work. This can be substituted with the completion of a Certified Information Systems Security Professional (CISSP) certification.

Typical Coursework for a PhD Degree

Principles of cyber security.

Explores the basics of cybersecurity features at the executive and management level of an organization, including the latest innovations in the field and various security measures that can be added into information systems. In some cases, students that have already completed a Master’s degree in the cybersecurity field may be able to skip this course as it is also frequent at that education level.

Advanced Risk Management

Analysis of theory when defending information systems in a more complex environment, and what practices are used when implementing these solutions in an organization. Students may learn how to audit these security measures to determine their accuracy and what needs to be improved upon to avoid certain attacks. This can help in preparing recommendations and consider different strategies in established cybersecurity practices.

Security Software Development

Having security measures in place on network servers and database management systems are key to preventing intrusions, but software can also be manipulated and compromised without security. This course looks into the different ways of implementing this type of protection in the software development process. Students may also learn how to identify rogue activities within software to identify potential threats.

Critical Infrastructure

A national government-focused course that emphasizes security measures that are taken to protect the United States’ critical infrastructure. This includes the important industries of public health, transportation, telecommunication, agriculture, electricity, and more. Topics may include the strengths and weaknesses of prior security implementation and how future innovations will change these procedures.

Quantitative and Qualitative Research

Common research methods when analyzing reports and writing the dissertation includes using quantitative and qualitative information. Students will understand the differences between these analysis methods and where to best apply them in their reports. Quantitative data focuses on specific numbers and measurements, while qualitative data focuses on more subjective information that explains these figures.

Intrusion Detection

Professionals must be able to react quickly when an attack occurs on an organization’s network, mitigating disaster and sensitive information that could be compromised. Popular topics in these courses include the various tools that are used in scoping out problems and eliminating them, how to detect vulnerabilities earlier to prevent these situations, and disaster recovery processes once the damage occurs.

Penetration Testing

One of the most popular and impactful ways to determine if a strong security system has been implemented is to mimic similar attacks in a controlled environment. Penetration testing, which can be a position on its own within a cybersecurity team, oversees this event and determines the effectiveness of security that is protecting valuable information.

Cyber Operations

Institutions designated as a CAE and holding an emphasis in cyber operations will often have courses that provide a general overview of the measures taken by security-driven organizations. Topics in these courses can range from the evolution of these processes, such as how to eliminate security threats on mobile devices and cloud-based computing, and the legal and ethical policies that can be implemented.

Dissertation Research

Many doctorate degrees will have courses that prepare students for dissertations, focusing on various studying methods, sources to consider, and helping them pick topics for a proposal that they will be able to defend when presented. These courses may go into creating an outline or framework for the dissertation and look at other example proposals to gain different perspectives or to criticize. Frequently, preparation courses will serve as the platform for students to submit their proposal.

Dissertation Preparation

Many PhD programs will emphasize the dissertation, allocating around one-third or a quarter of the curriculum to the dedication of preparing students for their dissertation writing. These courses may include how to find a topic that works for the researching project and an official process to send this idea in to faculty members, They may also be able to work with professionals in the industry that can help them further their analysis in the topic selected.

Dissertation Presentation

Immediately prior to graduation, students may have the requirement to meet in front of select faculty members to present or defend their dissertation. This process tests the vulnerabilities of the writing where the student should successfully defend what they have gathered. Any preparation classes for the presentation may focus on improving presentation material and studying further information to prepare for questions.

Information Assurance

This is the specific term used when managing and securing sensitive data within the organization’s network and system. Assurance of the information means that it remains confidential and can only be accessed by authorized parties. Many degrees will have this term within the discipline, and these courses can serve as an overview of information security and to become exposed to real-world situations.

Software Assurance

Doctorate studies will focus on the development and stability of cybersecurity software, with uses of identifying potential threat and analyzing risk. Students typically assess the performance of security software, measuring their stability and how well they protect systems from attacks, and various ways that it can be implemented into networks.

Applied Research Methods

Explores various research methods and how to perform them to help students with research for their dissertation and other studies. Topics may consist of how to read complicated information, creating visualizations from raw data or cleaning it for easier organization, surveying and interviewing subjects to gain perspective, and how to use software tools for researching. Coursework typically consists of researching and report writing to demonstrate proficiency in these skills.

Network Security

Courses covering network security at the doctorate level will have an in-depth look into history and various theories involving the revolutionary technology. Topics include the advancement of network security in the industry and how this impacts various organizational networks, the benefits and disadvantages of sending sensitive information online, and encryption methods to ensure that data is kept secure when being transferred from one place to the other.

Careers and Associations

Having a doctorate in cybersecurity means that a professional has explored theories and case studies within cybersecurity, giving them expert knowledge in the field that they customized their degree toward. This makes them beneficial as information security consultants in the organization they work for. They help review the network for any vulnerabilities and they will provide information on the latest technological innovations and how to implement them for a seamless transition.

In general, IT consultants help the organization gain perspective on the strengths and limitations of the department and aids in the improvement of management and supervising team members. They may recommend technological needs based on employee and client feedback, or creating reports based off performance data and expected outcomes should the organization improve these areas.

Higher education can also give graduates with professional experience an edge in becoming a director of information technology. One of the frequent requirements when managing the entire technology infrastructure of a company is to ensure that the network security is free from vulnerabilities and that there is a protocol in place in case intrusions take place. Directors will often make the final decisions in hardware and software additions and the coordination of teams and managers.

IT directors fall under the position of computer and information systems management through the US Bureau of Labor Statistics. Average salary for this position is is approximately $142,530 , with those working within finance and computer systems design receiving above the average. The top 10 percent receives over the $200,000 mark while the lowest 10 percent sees $85,380 when salaries are reviewed across the nation.

Tuition Costs for a PhD Degree in Cyber Security

Tuition rates will range widely based on the institution that a student selects to study their cybersecurity education, and if they are a resident in the state of the university. Smaller institutions or online-based colleges will generally be cheaper than more established institutions. When adding up full tuition for a full academic year, along with various student fees, full costs can be between $20,000 up to $50,000 per year.

For example, at Capella University, tuition for the PhD in Information Technology is $965 per credit, or $5,000 total in each quarter. The comprehensive exam and dissertation sessions are $2,895 per quarter. Unlike some programs, there is no capability to transfer credits into this program, so students will have to pay for the full tuition, which is 90 quarter credit hours.

Adding up the number of years it can take to complete a PhD program, it can be very costly to pursue this type of education. Luckily, there are many ways to bring these costs down in what essentially is an investment into a job opportunity that pays more than typical positions while just holding a Bachelor’s degree.

Ways to Lower PhD Costs for Students

If pursuing the program on a full-time basis, students can consider federal student loan options if they qualify and have any remaining funds from their prior education. Part-time education is generally not acceptable for federal student loans as this requires full-time enrollment and pursuing a certain number of credit hours in a given term. Personal loans provide another option to receive funding for school, but this may have considerably higher interest rates.

In some cases, an employer may pay for the employee to receive their PhD degree in cybersecurity. This requires a commitment from the individual to stick with the company for an extended period of time, and they will likely see an upgraded role in the organization if they successfully complete the program. If the individual leaves shortly after receiving the degree, they may be responsible for paying some of this tuition.

Assistantships are frequently the best opportunity for students to receive tuition aid for their education. These are competitive positions that can pay for some or all of a student’s tuition expenses, and provide additional stipends on a monthly basis, or in each term. Assistantships will require a certain amount of hours for students to complete tasks for faculty members in addition to their studies.

Scholarship Options for a PhD Degree

For students that have excelled in their prior academics, there may be an option to apply for a scholarship to cut down on costs. While there are few scholarships that pay for full tuition, this can provide some relief for students in multiple years of their education. In addition to rewarding those with solid academics, scholarships are also available for those in difficult financial situations or are part of an underrepresented demographic.

Some graduate college-based scholarships provide automatic entry for students that are administered into the program. Select students will receive an award simply based on being admitted into a high-level program. These are typically smaller awards that lower tuition rates and there are no restrictions for these opportunities.

For the majority of scholarships that are distributed by the school or an association that is promoting cybersecurity, students will need to submit a writeup that details why they are the best candidate for the scholarship and/or list the achievements that they have accomplished so far in their career. They must also submit proof of the criteria needed to receive the scholarship award.

Examples of Cyber Security Scholarships

The National Science Foundation has a Graduate Research Fellowship Program that is geared toward students that are going after graduate-level programs within the sectors of science, technology, engineering, and management – also known as the STEM field. A total of $46,000 is awarded to an individual, which provides a $34,000 three-year stipend and $12,000 deduction in tuition that is given to the institution.

The National Defense Science and Engineering Graduate Fellowship Program also provides aid for students that are pursuing a STEM field. Students can receive up to three years of educational aid, and it covers the tuition and provides a stipend. One requirement that students must uphold is working at a laboratory session with the Department of Defense, and they need to be able to accept the full awards.

Both of these scholarships not only require students to be in the STEM field, but they must be United States citizens or nationals to be eligible. They must show proof of citizenship when applying for these awards, and they must hold strong academic standing. Eligibility for the latter program opens up in the final year of undergraduate studies.

What Can You Do With a PhD Degree in Cyber Security?

When considering the pursuit of a doctorate degree, students must determine if it is worth the time and money for their cybersecurity career opportunity. Entry-level positions only require the completion of an undergraduate degree in this discipline, or a similar discipline such as computer science or information assurance. Advanced and senior positions can be obtained with a PhD, along with more research-focused positions in academia.

PhD degrees are geared for individuals that are looking at managerial and executive positions at industries that are looking to implement or improve their cybersecurity practices. They must understand advanced processes and be able to determine what they should do for their existing systems, or what is compatible with their information systems if they are moving to cloud-based solutions in the future.

Director positions review the analysis of network and computer security practices and make significant decisions on how the company should continue forward. They must follow the latest innovations in security measures that are being improved upon in order to keep their systems secure. It is important to keep the information technology sector updated with the latest security measures and to stay ahead of the latest hacking attacks.

Academic positions will offer more researching opportunities beyond completing the dissertation at the end of the PhD degree program. Further reports can help improve the entire field of cybersecurity when published in academic journals, or these can provide a specific focus within an industry, such as health care or the finance sector. They can also use this knowledge as a professor in a technology or engineering course within cybersecurity.

Career Opportunities

Looking at specific jobs in cybersecurity while holding a PhD degree, being a security engineer is a popular position to consider with the advanced knowledge needed in developing the architecture of an information system and making sure it is secure. These are more for advanced or senior positions that require numerous years of professional experience or hold advanced certification, like the CISSP, which is geared more toward individuals looking at management positions.

Another popular position is chief information security officer , which the job title can be slightly alternative based on the organization they are working at. Bigger enterprises will have specific designations for a CISO, but some smaller companies may only have a chief technology officer that deals with the security measures that are implemented into the organization.

When disaster strikes at an organization, the CISO is usually responsible for working with federal government or legal workers in order to determine what the next steps are needed after a data breach occurs. They are also responsible for moving forward with disaster recovery measures and working with any clients or employees that are affected. In addition, they are usually responsible for making final decisions on new implementations in the information system security processes.

According to the US Bureau of Labor Statistics , information security analyst make a mean annual wage of $104,210 across the United States. This is slightly higher for those working directly in computer systems design, which is geared for those with more experience in computer engineering and architecture.

At the higher spectrum of estimated wages in this position, workers are making an average of $158,860 among the top 10 percent. Some of the top states to consider when looking at the highest wages are New York, Virginia, and California. The highest state overall is New York with over 7,000 workers represented and over $121,750 being made on an annual basis.

In addition to the state of Virginia having the most employment opportunity in any state with over 15,000 employed, the annual estimated wage across the state is at $114,760. For the District of Columbia alone, there are 2,000 workers represented and estimated $119,160 made annually. This also makes the largest metropolitan area in terms of employment when adding in the cities of Arlington and Alexandria with Washington DC.

PhD Graduate Education at Northeastern University logo

This program engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities. It prepares students from diverse backgrounds and interests to advance the reliability and security of cyberspace as researchers, faculty members, and policy advisors.

In addition to focusing on using technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

Our program is affiliated with the International Secure Systems Lab , a collaboration between European and US researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues. We are also the lead institution in the ALERT Center , a multi-university Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives.

  • Admitted PhD students are guaranteed full tuition scholarship and are supported with stipends or fellowships for the first five years of their program
  • Northeastern University has been designated by the National Security Agency and the U.S. Department of Homeland Security as a Center of Academic Excellence in Information Assurance/Cyber Defense, in IA Research, and in Cyber Operations
  • Boston area is home to some of the nation’s largest Department of Defense contractors as well as prestigious government and independent labs, such as MIT Lincoln Lab, MITRE, and Draper Lab
  • Interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs and makes it unique in the Boston area

Application Materials

  • Online application and fee
  • Unofficial undergraduate/graduate transcripts (you can submit official transcripts from all colleges/universities attended at the time of admission)
  • Statement of purpose that should include career goals and expected outcomes and benefits from the program
  • Recent professional resume listing detailed position responsibilities
  • Three confidential letters of recommendation
  • GRE Test Scores Optional for 2022-23
  • Degree earned or in progress at an U.S. institution
  • Degree earned or in progress at an institution where English is the only medium of instruction
  • Official exam scores from either the TOEFL iBT, IELTS, or  PTE exam
  • Applicants seeking enrollment prior to the Fall 2023 term should apply through this  link .

Application

Applicants must submit the online application and all required admission materials no later than the stated deadlines to be considered for admission. Admissions decisions are made on a rolling basis.

Applicants are reviewed annually for admission to the Fall Term:

  • December 15

Applicants seeking enrollment prior to the Fall 2023 term should apply at the link under application materials below.

  • Program Website

Request Information for PhD in Cybersecurity

Marymount University

  • Staff & Faculty
  • Current Students
  • Parents & Family
  • Visitors & Community
  • Corporate Partnerships
  • Support Marymount
  • Marymount Shuttles
  • Student Counseling Services
  • News & Events
  • Campus Safety
  • Faculty & Staff Directory
  • My Marymount
  • Registrar’s Office
  • Library & Learning Services
  • Campus Ministry
  • Human Resources
  • Office of the President
  • Marymount at a Glance
  • Points of Pride
  • Our Mission, Vision, & Plan
  • Capital Location
  • Our History
  • The Rixey History
  • Our Inclusive Community
  • Marymount’s Economic Impact
  • Involvement & Service
  • Distinguished Speakers
  • Map and Directions
  • Visit Marymount
  • Admitted Students
  • Undergraduate Students
  • Graduate Students
  • Online Students
  • Non Degree Students
  • Summer Programs
  • Early College Programs
  • Scholarships & Aid
  • Early Learning Academy
  • New Student Scholarships
  • How to Apply
  • Types of Aid
  • Graduate Student Aid
  • Military & Veteran Services
  • Financial Aid FAQs
  • Tuition & Fees
  • Satisfactory Academic Progress Standards
  • Office of the Provost
  • Academic Calendar
  • Majors & Programs
  • Online Programs
  • Services & Resources
  • College of Business, Innovation, Leadership, and Technology
  • College of Health and Education
  • College of Sciences and Humanities
  • Access, Belonging, Inclusion, Diversity, and Equity Hub
  • Marymount Global
  • Center for Optimal Aging
  • Saints’ Service Network
  • Faculty Research and Experts
  • Commencement
  • Student Affairs Administration
  • New Student Orientation
  • Dining Services
  • International Student & Scholar Services
  • Student Activities and Events
  • Student Accounts
  • Commuter Students
  • Student Health and Well-being
  • Community Standards and Title IX
  • Ministry, Activities & Leadership
  • Careers, Internships & Employment
  • Auxiliary Services
  • Campus Safety & Emergency Management
  • Student Government Association
  • Student Success and Well-being

Cybersecurity (D.Sc.)

Banner image

Academics College of BILT – Business, Innovation, Leadership and Technology School of Technology and Innovation School of Technology and Innovation Graduate Programs Cybersecurity (D.Sc.)

D.Sc. Cybersecurity Program Overview

Marymount University’s doctorate program in Cybersecurity prepares highly qualified individuals for elite careers in cybersecurity, with unique knowledge and skill sets to manage increasingly complex networks and information systems to protect the nation’s digital infrastructure and our national security.

The D.Sc. in Cybersecurity program teaches candidates higher-order thinking and diversity of thought surrounding current and future cybersecurity issues, such as exploration of new technology, the role of artificial intelligence, and research to develop expertise in an area of cybersecurity of their choice.

  • Most strategic location

While available online and in person, Marymount’s Cybersecurity doctorate program takes advantage of the University’s strategic location. The national capital region is near more cybersecurity firms and related employment opportunities than anywhere else in the U.S. Here, you can find the Dept. of Homeland Security, Dept. of Defense, National Security Agency, Central Intelligence Agency, and National Science Foundation, as well as major companies such as Amazon Web Services, Capital One, Northrup Grumman, L-3, CACI, and more. Our faculty are also experts who are active in the federal government and corporate security, with experience you can’t easily find anywhere else.

Designed primarily for working professionals, the program offers a unique opportunity to work in different cybersecurity environments — from Google and Facebook to the Dept. of Defense, Dept. of Commerce, and so many others. You will learn by collaborating with a diverse set of experienced professionals and developing insights into the many real-world applications of cybersecurity.

  • Advanced cybersecurity t raining

Marymount’s Cybersecurity doctoral program goes beyond basic network security, recognizing an evolving field that is at the intersection of technology, management, ethics, leadership, human behavior, policy, and data science. We are a designated National Center of Academic Excellence for Cyber Defense Education (CAE/CDE) by the National Security Agency and the Dept. of Homeland Security, a distinction in the cybersecurity domain held by only select universities in the country. Marymount is also a recipient of the CyberCorps Scholarship for Service grant from the National Science Foundation, allowing us to offer scholarships to Cybersecurity students in turn for the same length of service in government cybersecurity positions.

  • Focus on applied research

Our goal is to share the expertise of cybersecurity professionals with students who will become the future leaders and educators in the field. We accomplish this through scholarly inquiry involving real-world situations as well as extensive research into the technological, societal, ethical, and policy domains of cybersecurity.

Program Features

Answer

  • 72 credits for post-bachelor’s degree applicants; 36 credits for post-master’s degree applicants
  • $1,275 per credit
  • Courses offered in person, online, and through a hybrid format

Admission Requirements

  • Graduate application
  • Official transcripts of all postsecondary education
  • Professional résumé
  • 1-page statement describing research-focused coursework, papers, and projects completed, and possible research interests for final dissertation
  • 2 writing samples from either an academic paper or professional work report (approx. 4-6 pages) pertaining to the IT or cybersecurity field
  • Grade of B- in a college-level statistics course is required prior to 800-level coursework
  • Interview is required for qualified applicants

International Students: For university coursework completed outside the U.S., a course-by-course transcript evaluation is required from a  NACES  member evaluation agency such as  World Education Services  or  Educational Credentials Evaluators .

Students for whom English is a second language must submit a recent official score of 96 from TOEFL, 6.5 from IELTS, or 58 from the PTE academic exam, or documentation of program completion at 1 of Marymount University’s language partners. For complete information about International Admissions Guidelines and language partner programs, visit our  International Graduate Students page .

For more information, please contact:    Sean Buchanan   [email protected] 703-526-6899

Program Curriculum Snapshot

IT 727: Managing Cybersecurity Risk

In general, the digital assets of modern-day organizations are susceptible to numerous threats and potential vulnerabilities — but there’s not always enough money and resources to protect them. This course covers all aspects of managing cyberattack risk and covers the foundations of developing cyber defense strategies for any organization. Also covered is the strategic decision-making process, including formal methodologies, of which assets to defend and why.

IT 757: Cyber Threat Intelligence

This course covers the cyber threat intelligence landscape, including tactical, operational, and strategic dimensions. It includes open-source, social media, and mobile app intelligence gathering techniques. Investigational strategies such as counterintelligence methods and attribution are also discussed.

IT 777: Malware Analysis

This is an advanced hands-on class that explores the roles of malware analysis, cybersecurity defenses, developing policies to handle malware, and performing dynamic and static analysis to recognize existing and potential malware. Students learn how and when to use analysis techniques to mitigate risks associated with malware.

IT 800: Beginning Applied Research in Cybersecurity

This course prepares doctoral students for the applied research process in the cybersecurity field. Students review APA guidelines and look at special requirements for academic writing. They start thinking of issues in the field that could benefit from additional research and then develop these ideas into potential dissertation topics. Students also analyze past work and consider ethical issues that might occur during their cybersecurity research.

Career and Salary Possibilities

Through the D.Sc. Cybersecurity program, we offer work opportunities and other experiential learning practicums, including a variety of paid research and teaching assignments through the CyberTeach program and publications of group research projects completed with other D.Sc. in Cybersecurity students. In addition, the Center for Career Development has experts to help with résumés, LinkedIn, and interviewing.  

The median annual salary for Computer and Information Systems Managers in 2021 was $199,010, according to the U.S. Bureau of Labor Statistics. During the next decade, the career outlook for cybersecurity professionals is expected to grow 33%, far above the national average.

More information on careers in cybersecurity can be found at cyberseek.org .

Meet Our Faculty

Welcome to the  School of Technology and Innovation  within Marymount University’s  College of Business, Innovation, Leadership, and Technology (BILT) .

Today, technology is a major part of all of our lives and our School is here to educate the next generation of technology gurus in whatever that technology brings. We are extremely proud of our progressive technology programs and the quality of our students who are entering the challenging workplaces of today and tomorrow.

The School of Technology and Innovation focuses on preparing individuals to take part in the global critical technology workforce shortage. Our programs, whether they are at the undergraduate, masters, or doctoral levels, prepare students for roles in digital transformation, cybersecurity, data science, cloud computing, and the constantly growing field of technology applications.

We are particularly proud of our diversity, equity, and inclusion initiatives as we help significant numbers of minorities, women, veterans, and the neurodiverse succeed in the technology field.

Please explore our website to learn more about our programs and our faculty, staff, students, and alumni.

Dr. Diane Murphy

Click here to view our Faculty

Contact an Admissions Advisor

Schedule an appointment with one of our dedicated admissions advisors today to get more information about our programs, the application process and our student support structure..

logo

(703) 522-5600

Privacy Policy - Terms of Use

  • Contact CONTACT MARYMOUNT
  • Directions MAPS & DIRECTIONS
  • Careers CAREERS AT MARYMOUNT
  • Student Jobs JOBS ON CAMPUS (MU STUDENT)
  • Our Mission, Vision & Plan
  • Maps & Directions

phd cyber security online

Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

  • Majors & Degrees

Popular searches

  • Commencement
  • Academic Calendar
  • Tuition and Fees
  • Online Programs
  • Karl E. Mundt Library
  • Scholarships

smiling woman

Is DSU the right fit for you?

Even the best brochures and postcards (and yes, even websites) can only tell you so much about a college. The only surefire way to know if DSU is right for you is to see for yourself.

Cyber Defense Doctor of Philosophy (PhDCD)

Defend the elite.

Unsolicited threats pose a dangerous risk to government agencies and organizations alike. They, too, are vulnerable to hackers, malware, and data breaches. Equip your business or agency with the ultimate security protection –  you. 

With a doctorate in Cyber Defense, you can learn what it means to be a leader on the edge of innovation. 

Defend the elite and address growing cyber threats. Practice risk management strategies. Harbor knowledge in research methodology and practice. Validate authenticity and confidentiality. Design and implement security policies and provisions. Conduct recovery plans for your future IT infrastructure. Work and learn from faculty who are experts in their field. 

The program is provided entirely through online learning. There is an annual residency requirement of three on-site research seminars. Seminars will be held on the Madison, South Dakota campus (students may petition to participate in the residency requirement from a distance). A great way to finish your degree while holding a professional career.

  • VIEW COURSES
  • Timelines & Requirements
  • Tuition & Fees
  • Request Program Info

The Beacom College of Computer and Cyber Sciences

Arica Kulm ’18 MS Cyber Defense ’20 PhD Cyber Defense

Cyber defense is a career, not just a job

Arica Kulm was looking for a career, not just a job. After finishing her master’s in Cyber Defense, she decided to continue on as one of the first students in the PhD in Cyber Defense program. This gives her the knowledge base for a meaningful, interesting career in a field that is in great demand worldwide.

Student Spotlight

Explore the defensive line

DSU’s curriculum addresses the important technical aspects of cyber defense, and includes important leadership, ethics, and management concepts. This degree complements our PhD in Cyber Operations and fits tightly with our strategic priorities and initiatives. Our graduates obtain careers in private industries, government agencies, the military, and academia. We have a recognized excellence in cyber security, education, and research that is central to our mission. We currently hold four prestigious Centers of Academic Excellence Designations from the National Security Agency and Department of Homeland Security, including the most technical for Cyber Operations and the most prestigious as a Cyber Defense Consultative Regional Resource Center, one of four university-based centers in the nation.

Cyber Operations Masters of Science

Learning Outcomes

Upon completion of the Ph.D. degree in Cyber Defense, students will be able to:

  • Apply scientific research methodologies.
  •  Advance the field of cyber defense.
  • Apply ethical frameworks to security decisions.

Kyle Cronin

Kyle Cronin

Associate Professor, Coordinator for Ph.D. in Cyber Defense

Tyler  Flaagan

Tyler Flaagan

Assistant Professor

Chris Olson

Chris Olson

Associate Professor / Coordinator for MS in Cyber Defense

Related Programs

professor teaching class

  • Current Students
  • U.S. Locations
  • UMGC Europe
  • Learn Online
  • Find Answers
  • 855-655-8682

Online Bachelor's Degree: Cyber Operations

Cyber operations, degree at a glance.

  • 120 credits
  • Transfer up to 90 credits
  • All courses available online
  • Select hybrid courses available

TUITION RATES

  • $324 per credit (in-state)
  • $499 per credit (out-of-state)
  • $250 per credit (military)
  • Other fees may apply

Next Session Starts

Advance in your career with an online bachelor’s degree in cyber operations from University of Maryland Global Campus. Increase your marketability by learning and developing career-relevant skills including software development and cloud programming. Expand your knowledge base under the direction of experienced faculty members who bring their practical expertise to the classroom. Earn your degree on your own time with our convenient online courses and save time and money with our generous transfer credit policy . Why wait? Take the first step and apply today!

Gain Knowledge in Cybersecurity, Programming, Information Technology, & More

UMGC’s online cyber operations program is designed to help you build career-relevant skills in network security, cybersecurity, information technology, and computer programming. You’ll leverage hacking tools, customize computer scripts and applications, and employ techniques to conduct offensive and defensive cyberspace operations. The program will help enable you to detect and triage security alerts, assess risks, automate threat detection, and respond to adversary attacks while helping our country gain an advantage in cyberspace across all domains. The conceptual, clinical, and theoretical skills you acquire in this program may help you stand out in the market and become an effective problem-solver at your organization.

  • You can join one of our cyber-focused student organizations such as computer club or Upsilon Pi Epsilon (the international honor society for computing and IT).
  • Try out for the award-winning Cybersecurity Competition Team to gain hands-on experience and develop your skills in the Virtual Security Lab and nationwide competitions.
  • We offer competitive tuition rates for Maryland residents, as well as discounts for military servicemembers and their spouses and dependents.

See Courses & Program Info

View a complete list of program courses, program-specific and degree-level requirements, and more.

View Cyber Operations Program Courses

This program requires a total of 120 credits .

  • 33 Required Major Credits: Review the required major courses outlined below or view the recommended course sequence to progress through this program.
  • 41 General Education Credits: Review the options available to fulfill the 41 credits of general education coursework requirements for bachelor's degrees.
  • 46 Minor & Elective Credits: Review a list of available academic minors or see the course catalog or Schedule of Classes to help you select elective courses.

Required Major Courses

  • Foundations of Cyberspace Operations (3 Credits, CYOP 200)
  • Reverse Engineering and Malware Analysis (3 Credits, CYOP 310)
  • Fundamentals of Networking (3 Credits, CMIT 265)
  • Building Secure Python Applications (3 Credits, CYOP 300)
  • Detecting Software Vulnerabilities (3 Credits, CYOP 325)
  • Database Security (3 Credits, CYOP 350)
  • Secure Software Engineering (3 Credits, CYOP 360)
  • Secure Programming in the Cloud (3 Credits, CYOP 400)
  • Mitigating Software Vulnerabilities (3 Credits, CYOP 425)
  • Software Security Testing (3 Credits, CYOP 460)
  • Cyber Operations Capstone (3 Credits, CYOP 495)

Review Technology Requirements

For some of the upper-level cybersecurity and IT courses in this program, you will need equipment that meets the following specifications. Courses in graphics- or computing-intensive disciplines may require a higher processing speed, more RAM, and/or better screen resolution.

Hardware Requirements

  • 64-bit processor, Intel Core i5 (7th generation or higher), or equivalent (e.g., AMD, M1) 
  • Processor speed: 1.5 GHz or higher (2 GHz recommended) 
  • Storage: At least 250 GB (SSD [preferred] or HD), with at least 30 percent free space 
  • RAM: At least 4 GB (8 GB recommended) 
  • Display/monitor: Minimum 13” 
  • Screen resolution: Minimum 1280 px x 1024 px 
  • Keyboard and mouse/trackpad 
  • High-speed Internet connection (Ethernet or Wi-Fi) 
  • 32-bit video card

Operating System

Choose one of the following:

  • Windows 10 (recommended; version 1909 or higher required for any course using Adobe Creative Cloud) 
  • Mac OS X 10.15 or higher 
  • Ubuntu 18.04+ (or other Linux LTS) 
  • Microsoft Office 2019 or later (Office 365 Education is available for free with your student email address.) 
  • Most recent version/update of a web browser (Firefox, Safari, or Chrome) 
  • Antivirus software 
  • Adobe Acrobat PDF Reader 

Additional Recommendations

  • Built-in camera (or USB port for a webcam)
  • Built-in microphone and speakers (or USB ports for external audio devices)

Explore a Minor in Cybersecurity

Not ready to get started on this bachelor’s degree? You can pair a 15-credit minor in cybersecurity or computer science with another major at UMGC.

Search Course Catalog

These requirements are for students who enroll in the 2024–2025 academic year . For prior year requirements, visit our catalog archive.

Bachelor’s Degree Requirements

In addition to the specific course requirements outlined on each bachelor’s degree webpage, UMGC maintains certain requirements for all bachelor’s degrees.

Develop Career-Ready Skills in Cyber Operations

Employers highly value the knowledge and skills that you cultivate in this program and can easily translate to almost any modern industry in a cyber role such as software developer or security software engineer. Program graduates develop crucial skills in project management, communication, teamwork, software development, software engineering, and cybersecurity. Our program directors refresh and update the curriculum regularly, with a focus on helping students achieve the following: 

Unlock Your Career Potential

This program is designed to help prepare you for technical and leadership roles in diverse application development and security settings, including high-demand areas such as coding, security analysis, security management, application and software architecture, information security, intrusion analysis, penetration testing, programming languages, software development, software engineering, security and code auditing, intelligence, and system architecture.

UMGC 2021

Practice Real-World Skills in Your Cyber Courses

Throughout your curriculum, your instructors will assign coursework that may help you prioritize real-world skills and experience. You will learn real-world skills in your classes at UMGC through our hands-on, project-based labs using our state-of-the-art virtual laboratory environment. Examples of specific projects for this program include:

  • Use cyber industry standard tools to identify web application vulnerabilities.
  • Use threat intelligence feeds and appropriate data sources to prepare for possible cyber attacks by state-sponsored cyber espionage groups.
  • Use NSA-developed reverse engineering and malware analysis tools to identify indicators of compromise and malware infections in intelligence scenarios.
  • Analyze and correlate log events to detect and mitigate cyber attacks.
  • Configure and monitor a honeypot to identify sources of intrusion and other anomalous computer network activities.

You might be interested in similar programs

Compare All Programs

Get answers to questions that current and prospective students are asking about program admission, credibility, student organizations, and more.

What is an online bachelor’s degree in cyber operations?

An online bachelor's degree in cyber operations is a 120-credit that students can earn online to help them prepare for a career in cyber operations, software development, and cybersecurity. UMGC’s online bachelor's degree in cyber operations covers topics like programming languages, coding, cloud programming, software development, software engineering, communication, networks, and more. The program can help students prepare for a career path in a wide range of industries, including government; military; intelligence, counterintelligence, and homeland security; software and technology; and more. Possible roles include programmer, software developer, cybersecurity engineer, software engineer, and more.

How long does it take to get an online bachelor’s degree in cyber operations?

UMGC's cyber operations degree is a 120-credit program with courses offered year-round. The time it will take you to complete your degree will depend on several factors, including your goals, how many transfer credits you have, your course load each term, and whether you are able to benefit from one or more of our fast paths to credit , including credit for prior learning and credit for military education and training .

How much does an online bachelor’s degree in cyber operations cost?

Tuition rates for this online bachelor’s degree are very competitive and appear at the top of this page. We offer a low in-state rate for Maryland residents and a reduced tuition rate for military service members and their spouses and dependent children. We also offer scholarships for those who qualify , an interest-free monthly payment plan , and no-cost digital materials in place of most textbooks to help make online bachelor's degrees even more affordable.

What background do I need to get an online bachelor’s degree in cyber operations?

You do not need any background or experience in cyber operations, software development, or other cyber or computer software fields to apply for and graduate with this online bachelor’s degree. As long as you meet our undergraduate admission requirements , you can enroll in this program.

Are any certifications available for those with an online bachelor’s degree in cyber operations?

You do not need any previous cyber, software development, or software engineering certifications to enroll in or complete this program.

What student organizations are available to cyber operations majors?

Computing club.

The Computing Club provides a dynamic environment where members can work collaboratively, share innovative ideas, enhance their career-readiness, and gain marketable experience in their respective fields. It is available to graduate or undergraduate students, alumni, faculty, and staff members. Students and alumni can join the Computing Club group on CareerQuest .

Upsilon Pi Epsilon (Computing & Technology Disciplines)

Upsilon Pi Epsilon, the international honor society for the computing and IT disciplines, is designed to promote the computing and information sciences and to encourage the enhancement of knowledge in the field. Upsilon Pi Epsilon is open to both undergraduate and graduate students who are pursuing a degree in the computing and information science disciplines. Membership is by invitation only.

Undergraduate membership is open to students majoring in one of the computing disciplines who have completed at least 45 credit hours towards their degree, including 30 or more credits at UMGC (in graded coursework) and at least 15 credits from information technology and computer science courses. Undergraduate students need to have a cumulative GPA of a 3.5 or higher and a GPA of 3.5 or higher in all coursework taken from the information technology and computer science courses.

Graduate student membership is open to students pursuing a master's degree in cloud computing systems, cyber operations, cybersecurity management and policy, cybersecurity technology, data analytics, or digital forensics and cyber investigation; a master's degree in information technology with a concentration in database systems technology, informatics, information assurance, software engineering, or systems engineering; or a legacy master's degree in cybersecurity. Graduate students must have completed at least 18 resident credits towards their degree at UMGC, with a cumulative GPA of a 3.5 or higher.

For more information, please email upe@umgc.edu .

Our helpful admissions advisors can help you choose an academic program to fit your career goals, estimate your transfer credits, and develop a plan for your education costs that fits your budget. If you’re a current UMGC student, please visit the Help Center .

Personal Information

Contact information, additional information.

By submitting this form, you acknowledge that you intend to sign this form electronically and that your electronic signature is the equivalent of a handwritten signature, with all the same legal and binding effect. You are giving your express written consent without obligation for UMGC to contact you regarding our educational programs and services using e-mail, phone, or text, including automated technology for calls and/or texts to the mobile number(s) provided. For more details, including how to opt out, read our privacy policy or contact an admissions advisor .

Please wait, your form is being submitted.

By using our website you agree to our use of cookies. Learn more about how we use cookies by reading our  Privacy Policy .

A man in his graduation cap and gown.

No Application Fee

Apply by May 31, and we'll waive your application fee.

CyberSecurity Graduate Spotlight: Nick Ellison

May 7, 2024, by sydney smith.

Nick Ellison graduated from the  Cybersecurity Bootcamp program in July 2023 and leveraged his newfound knowledge to change his career. As a University of Michigan alumnus, Nick was well-versed in the university’s rigorous academic environment, innovative culture, and exceptional faculty. Throughout the program, he effectively used these resources to advance his cybersecurity knowledge and transition from the field of education to information security. Nick sat down with us to discuss his experiences from the bootcamp and how they propelled him into his current role.

phd cyber security online

CAN YOU DESCRIBE YOUR CURRENT ROLE AND RESPONSIBILITIES?

NICK: I am currently an IT Support Analyst. Most of my job includes working at the help desk, but I have various responsibilities. I do a lot of work with Microsoft Active Directory, such as managing assigned groups and writing queries for dynamic groups to automatically assign department members to these groups. I also do some cybersecurity work using Abnormal software and Microsoft 365 admin panels.

WHAT MOTIVATED YOU TO TRANSITION FROM YOUR PREVIOUS CAREER TO CYBERSECURITY?

NICK: If I’m honest, I saw an ad for this program that promoted entry-level pay for cybersecurity positions. And I thought, wow, that’s more than I’m making teaching. So, initially, I was interested in the higher paycheck.

But I also know that tech and cybersecurity are popular right now, so it was a good field to get into. I also wanted a low-stress job that would be better for my mental health. Teaching proved to be stressful, and I wasn’t working the hours I thought I would. My new job is much less stressful, and I am really enjoying it so far.

WHY DID YOU CHOOSE THE UNIVERSITY OF MICHIGAN’S CYBERSECRUITY BOOTCAMP PROGRAM?

NICK: The university’s reputation played a big part in my decision since it’s a renowned school. I also got my undergraduate degree in teaching from U-M.

In addition, I decided to take the introductory course first. It’s a month-long course you can take to determine if you want to apply for the entire program. During that intro course, I was surprised by how much there was to learn. I questioned whether the course was really for me. But in the end, I decided to complete the full program, and I’m really glad I did.

WHAT WAS THE MOST IMPORTANT THING YOU LEARNED IN THE CYBERSECURITY BOOTCAMP PROGRAM?

NICK: There were three things. The first was being able to build confidence in myself when it comes to problem solving. When I first started the program, I didn’t know where to begin troubleshooting or where to start asking the questions I needed answers to. This program teaches you what to look for when something is going wrong. You’ll learn how to dig a little deeper and try to figure things out. So, building confidence and learning where to gather information was huge. The second thing was learning technical skills. I learned tools and systems like Active Directory, Linux, Windows, Kali Linux, etc., and I quickly got comfortable with computers and technology.

The third thing this program helped me with was passing my CompTIA Security+ certification test. The program places a huge emphasis on gaining entry-level certifications for career advancement. I’m proud that I have the certification because it reflects the confidence I’ve gained based on what I learned in the program.

HOW HAVE YOU APPLIED WHAT YOU’VE LEARNED IN THE PROGRAM IN YOUR ORGANIZATION?

NICK: An exciting thing happened the other day, but it was also kind of scary. Our chief marketing officer got a phishing email from a fake law firm that said they were going to sue her because of copyright infringement. It had a fishy link in it, so she asked us to take a look. I looked at it using Microsoft Sandbox. I pulled the resources from the email to examine their legitimacy. While I was reviewing the links in Sandbox, 12 Javascript files automatically started loading like they were trying to run malware. So I told our CMO, “Yeah, please don’t click anything in that.”

The other big thing I’ve applied is how to gather information and get my bearings before reaching out for help. I’ve been able to solve things on my own by asking important questions like “What do I have? What do I need? What am I looking for? And where can I start to find those things?” Those questions help me solve things on my own.

CAN YOU TELL ME ABOUT YOUR EXPERIENCE LEARNING FROM THE INSTRUCTORS?

NICK: Every single one of them was really passionate about the course. The professors are people actively working in their fields, which made the material authentic. They would use real-world examples of work they’d actually done. We’d be in the middle of a project, and they would stop to tell us how it connects to something they’ve worked on.

For example, one instructor showed us how to use software to replicate a banking login page to steal someone’s information. If someone tried to log into Bank of America, you could recreate the login page and mask your device and IP address. You effectively create a fake login page, and when someone logs in, you can steal their credentials and money. The instructor worked for a bank and said this happens all the time, so he taught it to us. I appreciated how the instructors taught the material using real-world examples that we could actually use in the future.

Not to mention, there wasn’t a lot of hand-holding in the program. The instructors would give us assignments and some options to explore, and we would have to do a bit of detective work to figure it out ourselves. But that doesn’t mean they weren’t open to questions. I honestly think that every instructor was very open and willing to help, especially if you came in asking about something you were working on.

CAN YOU SHARE ANY TIPS OR STRATEGIES THAT HELPED YOU MAKE THE MOST OF YOUR EXPERIENCE IN THE PROGRAM?

NICK: The instructors will say this often, but try to have your camera on. From their perspective, it’s so they know who you are. They might be more willing to write a letter of recommendation for you if they can put a face to a name. Also, keeping your camera on helps you keep yourself accountable. You are there. You are ready to learn. Then, the instructors know you’re there and ready to learn. Don’t waste your own time and money if you aren’t willing to jump into this wholeheartedly.

Also, be aware that you are not the only person who is going to struggle with something. I definitely struggled with things. Just be okay with the fact that you are new to this. There are going to be other people who are new to this. You are here because you are looking for something new. And so it’s okay not to be an expert right away.

WOULD YOU RECOMMEND THE CYBERSECURITY BOOTCAMP TO OTHERS? 

NICK: Yes, I would definitely recommend the program. It may not be for everyone, but I got something out of it—and so did everyone else in my cohort. Even if you don’t make a complete career change like I did, you’ll still learn a lot, be able to apply the lessons, and gain multiple skills.

Would you like to request a custom course? Please email Andrea Schuitman at  [email protected] or submit the form below.

Become Our Next Partner

We want to build relationships with people and organizations and welcome the opportunity to connect with you.

Please submit form or call (734) 647-7200 to get started.

University of Central Missouri UCM Logo - Universities in Missouri

  • Request Info

Visit UCM

  • James C. Kirkpatrick Library
  • Campus Maps
  • University Calendars

University of Central Missouri's Online Master’s in Computer Science Program Achieves Top Rankings for Affordability and Overall Excellence

By Alex Greenwood, May 2, 2024

man at computer

WARRENSBURG, MO — The University of Central Missouri’s online Master of Science in Computer Science program is ranked #5 for affordability in TechGuide's 2024 list of Online Master’s in Computer Science degree programs. This ranking highlights the program’s commitment to providing high-quality education at an accessible price point, placing it among the top 25 institutions nationwide for affordability and value.

In addition to its affordability, the program also secured the #12 spot on TechGuide's list for the Best Online Master's in Computer Science degree programs for 2024, further underscoring its excellence in the competitive field of technology education.

The University of Central Missouri's HLC-accredited online master’s in computer science degree equips students with the skills necessary to lead in the tech industry, where professionals are increasingly essential across all sectors. As the largest and one of the most affordable programs in Missouri, UCM offers specialized tracks in cloud computing, general computer science and software development.

This flexibility ensures that graduates are not only proficient in using technology to solve diverse practical problems but are also prepared to lead teams and innovate in their chosen fields. While the program's courses are primarily available in person, students have the flexibility to customize their program options by pursuing their degree entirely online , on a full-time or part-time basis, accommodating various schedules and career goals.

Learn more about the program at the website: https://www.ucmo.edu/academics/programs/masters-degrees/chst/comp-sci-and-cybersecurity/computer-science/computer-science-masters/index.php .

TechGuide, a leading technology education resource platform, is renowned for its comprehensive coverage and expert insights in the technology sector, featuring contributions from esteemed professors and professionals through its "Ask an Expert" series and podcast, which includes more than 50 episodes with tech industry professionals. Learn more: https://techguide.org/computer-science/online-masters-in-computer-science/

social-section

facebook

IMAGES

  1. 10 Best PhD Cyber Security Online Programs [2024 Guide]

    phd cyber security online

  2. Best online PhDs in cyber security for 2021

    phd cyber security online

  3. 10 Best PhD in Cyber Security Online [2024 Guide]

    phd cyber security online

  4. master degree in cyber security online

    phd cyber security online

  5. 10 Best PhD in Cyber Security Online [2024 Guide]

    phd cyber security online

  6. How To Get A PhD In Cyber Security

    phd cyber security online

VIDEO

  1. Junior Software Developer Course 2024

  2. WebAppAttackVectorEnumerator 1.0

  3. Smart Phone Security

  4. Cyber Security Online Training @ DURGASOFT

  5. Cyber Security Online Training @ DURGASOFT

COMMENTS

  1. List of Online Cybersecurity PhD Degree Program Options

    Learn about the best online cybersecurity PhD programs for 2024, how to choose one, and what to expect from the curriculum. Compare tuition, credits, delivery methods, and admission requirements of different schools.

  2. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    Learn about the different types of cybersecurity doctoral degrees, admission requirements, coursework and potential career paths. A Ph.D. in cybersecurity prepares graduates for advanced roles in research, education and management.

  3. 10 Best PhD in Cyber Security Online [2024 Guide]

    Learn about the best online PhD in Cyber Security programs, courses, and career paths. Compare schools, concentrations, and salaries for this in-demand field of information assurance and cyber security.

  4. Online Doctorate in Cybersecurity

    Earn a Doctor of Computer Science degree in Cybersecurity and Information Assurance from CTU, a regionally accredited university. Learn about artificial intelligence, enterprise security, digital systems, and more in this online program with a residency component.

  5. Cybersecurity

    Learn cybersecurity skills and knowledge with Stanford Online, a platform that offers online, self-paced courses at both the professional and graduate level. Choose from a range of topics, such as data security, network security, and cybercrime, and earn academic credit, a certificate, or both.

  6. Doctor of Philosophy in Cybersecurity (PhD-CY)

    Earn a doctoral degree in cybersecurity with four specializations and a flexible online format. Learn advanced topics, research methods, and leadership skills to protect networks and systems from threats and vulnerabilities.

  7. Doctoral Degrees in Cybersecurity

    Learn about the benefits, requirements, and options for earning a Ph.D. or D.Sc. in cybersecurity online. Compare five of the best cybersecurity schools and their programs.

  8. Best Online PhDs in Cyber Security for 2024

    Learn about the top online PhDs in cyber security, their tuition costs, benefits, and job prospects. Compare different programs and schools based on delivery, ranking, and price.

  9. Top 10 Best PhD in Cybersecurity Online Programs

    Learn about the best online PhD in cybersecurity programs in 2024, including courses, credits, tuition, and admission requirements. Compare different options and find out how to get a doctorate in cybersecurity online.

  10. Online PhD in Cybersecurity

    Learn to anticipate and mitigate risks in managing data-intensive systems with NU's Cybersecurity specialization in Technology Management. This program is 100% online, offers weekly course starts, no group work, and doctoral faculty mentoring.

  11. Cybersecurity, PhD Degree

    A research-based, interdisciplinary PhD program that combines security technical foundation with policy and social sciences perspective. Learn from faculty experts, access research projects, and gain industry experience through co-op or experiential learning.

  12. Best Online PhD Cybersecurity Programs in 2024

    Best Online PhD Cybersecurity Programs in 2024. Pursuing an online PhD in cybersecurity is a convenient way to advance your career. Learn more about enrolling in an accredited program that works for you.

  13. The Best Online Doctoral Degree Programs in Cyber Security

    Compare the best online doctoral programs in cyber security from four universities, including Dakota State, Capitol Technology, Capella, and Colorado Technical. Learn about the curriculum, tuition, NSA/CAE designation, and student satisfaction of each program.

  14. Best Online PhDs in Cyber Security

    Learn about the best online PhD programs in cyber security, how to get admitted, and what career paths and salary you can expect. Compare schools, tuition, and residency options for online cyber security PhDs.

  15. Ph.D. in Cybersecurity Management

    Earn a Ph.D. in Cybersecurity Management from Nova Southeastern University, a NSA-designated Center of Academic Excellence in Cybersecurity. Learn from world-renowned faculty and conduct research on various topics in the field of information assurance.

  16. PhD in Cybersecurity

    Using technology for a more secure world. The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy ...

  17. Online PhD in Cyber Security Degrees

    Online PhD in Cyber Security Degree Availability. Many online-based institutions that offer programs within computer science and cybersecurity also feature accredited doctorate degrees. Students can expect to find disciplines directly in cybersecurity or in a similar field, such as information assurance or security in information technology. ...

  18. Cybersecurity

    Cybersecurity. This program engages faculties from the Khoury College of Computer Sciences, the College of Engineering, and the College of Social Sciences and Humanities. It prepares students from diverse backgrounds and interests to advance the reliability and security of cyberspace as researchers, faculty members, and policy advisors. In ...

  19. Computer Science (Cybersecurity), PhD

    The PhD program in computer science with a concentration in cybersecurity is designed for graduate students who want to pursue a thorough education in the area of cybersecurity and information assurance. The goal of this concentration is to provide students with the knowledge and skills in science and engineering for cybersecurity, including ...

  20. Cybersecurity (D.Sc.)

    The D.Sc. in Cybersecurity program teaches candidates higher-order thinking and diversity of thought surrounding current and future cybersecurity issues, such as exploration of new technology, the role of artificial intelligence, and research to develop expertise in an area of cybersecurity of their choice. While available online and in person ...

  21. Cyber Defense Doctor of Philosophy (PhDCD)

    Learn how to defend the elite and address growing cyber threats with a doctorate in Cyber Defense from DSU, a program that offers online learning and on-site research seminars. The program is designed for students who want to work and learn from faculty experts in cyber security, education, and research.

  22. Online Cyber Operations Bachelor's Degree

    An online bachelor's degree in cyber operations is a 120-credit that students can earn online to help them prepare for a career in cyber operations, software development, and cybersecurity. UMGC's online bachelor's degree in cyber operations covers topics like programming languages, coding, cloud programming, software development, software ...

  23. Cybersecurity Graduate Spotlight: Nick Ellison

    As a University of Michigan alumnus, Nick was well-versed in the university's rigorous academic environment, innovative culture, and exceptional faculty. Throughout the program, he effectively used these resources to advance his cybersecurity knowledge and transition from the field of education to information security.

  24. University of Central Missouri's Online Master's in Computer Science

    By Alex Greenwood, May 2, 2024 WARRENSBURG, MO — The University of Central Missouri's online Master of Science in Computer Science program is ranked #5 for affordability in TechGuide's 2024 list of Online Master's in Computer Science degree programs. This ranking highlights the program's commitment to providing high-quality education at an accessible price point, placing