
PhD in Cybersecurity
Specialization
NO Residency
NO Group Work
100% Online Learning
PhD in Cybersecurity Overview
As organizations produce more and more data – and stake their future on its security – the risks associated with possible data theft and other malicious interventions have become ever greater. NU’s Cybersecurity specialization in Technology Management will prepare you to take a leadership role in helping thwart hackers and other security breaches. In this program, you will be encouraged to think outside of the box as an innovation leader who stays one step ahead of those dedicated to breaching security. Our PhD Cybersecurity specialization will prepare you for a variety of technology leadership roles in both government and private organizations. Upon graduation, you will be well prepared to anticipate and mitigate risks in managing and deploying data-intensive systems.
Benefits
Unmatched Flexibility
NU offers weekly course starts, no scheduled lecture hours, no group assignments, weekly assignments, and the ability to schedule courses around your personal and professional obligations.
100% Doctoral Faculty
No matter the degree level you pursue, you can rest assured that you will be mentored by doctors in your field of study.
One to One Engagement
You won’t have to fight for face time as one of many within a classroom. At NU, you’ll have the opportunity to interact one to one with your professor, receiving personalized mentoring.
Course Details
Credit Hours : 60
Courses: 20
Estimated Time to Complete: 50 months
*Credit hours and courses reflect new students meeting credit requirements and utilizing no transfer credits. Est. Time of Completion reflects new students following the preferred schedule designed by the Dean for the program.
Course Name
This course will consolidate a foundation of concepts relating to security and cybersecurity, enabling the successful examination of greater detail and complexity in later courses. You will examine the full range from governance through compliance with laws, through people risks, to technology. Various mitigation options are considered to reduce vulnerabilities, counter threats, and to protect an organization’s data and system assets. You will study the need to protect organizations from future exposures and apply critical thinking and synthesis to motivate the resources needed to defend an organization.
In this course, you will be introduced to the field of advanced cyber forensics. You will review various tools, techniques, and steps needed for a successful forensic investigation. In addition, you will examine various legal regulations that impact the collection of data, the importance of federal rules of evidence, and the critical requirement of evidence admissibility in a court of law.
Organizations dependent on information systems and solutions to enable the effective operation and survival. Malicious acts, accidental errors, and natural risks threaten the continuous availability of those systems. In this course you will develop the knowledge and skills needed to develop business continuity and disaster recovery plans after the proper analysis of events and incidents. You will help the organization prioritize exposures, identify threats, define appropriate defenses, prepare related processes, and identify resources needed to provide appropriate continuity solutions. Your knowledge will include planning, preparation, training, testing, and updating the incident detection, contingency plans, and crisis management for the organization.
Risk management is the foundation of defending organizations from information security, cyber threats, compliance, audit, and privacy exposures. To address risk and assurance, this course builds an integrated approach solution leading to the prioritization of resources for an organization. You will extend your knowledge and skills for global protection within and beyond the perimeter. This course positions the importance of risk management within a cybersecurity program and its role within Enterprise Risk Management (ERM). You will also assess theories and practices concerning risk management, compose a risk strategy, and leverage maturity models to improve the protection of organizations.
Knowledge of security principles and practices in software engineering is vital to provide quality software solutions. This course is an application-based examination of software engineering for the security professional. During this course, you will explore the foundations that support secure software development and analyze different secure software design and development practices. You will also select and defend a secure software architecture and technology approach and then design a secure software deployment and maintenance solution strategy.
Global integration and broad alliances between criminal elements and nation-states frequently lead to rapidly changing and significant threats to all nations, organizations, and citizens. During this course, you will study current and predictable threats, target critical infrastructure, and determine risks implied in new technology. You will also learn to recognize the risks originating from cybercriminals, terrorism, hacktivism, and nation-state, and other significant threat actors. You will devise and work to get funding for viable strategies to defend critical infrastructures, organizations, and the citizens of the nation.
PhD in Cybersecurity Program Outcomes
- Formulate solutions to cybersecurity problems
- Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale
- Manage legal, ethical, and security risks in technology-based systems
- Explain concepts and arguments associated with cybersecurity
- Evaluate an organization’s maturity in protecting its information infrastructure
Finish Your Dissertation!
Dissertation Completion Pathway (DCP) is a 100% online pathway helping students “All But Dissertation” finish their doctoral degree.
- Block transfer of credit from your previous institution
- Flexible monthly start dates
- Highly trained faculty providing feedback each week on your dissertation
- Strategic support and targeted resources to help you finish
Program Disclosure
Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.
Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.
NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.
All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.
National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.