{"id":275,"date":"2021-10-29T15:44:18","date_gmt":"2021-10-29T15:44:18","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=275"},"modified":"2022-10-13T14:05:23","modified_gmt":"2022-10-13T14:05:23","slug":"online-phd-in-cyber-security","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/doctorate-degrees-online\/","title":{"rendered":"Online Doctorates in Cybersecurity"},"content":{"rendered":"<p>Innovations in cloud computing, artificial intelligence, and the internet of things continue to drive the tech industry's profound growth rates. However, with this growth comes a new generation of risks and threats, which we must counter through sound strategy, thorough planning, and capable incident response resources. These factors combine to make cybersecurity one of the fastest-growing employment sectors in the United States.<\/p>\r\n\r\n\r\n\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    <p>Businesses, governments, and other private and public sector organizations expect an increased need for cybersecurity professionals in the years ahead. The U.S. Bureau of Labor Statistics (BLS) projects a massive <a rel=\"noreferrer noopener\" href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\">31% surge in jobs<\/a> for information security analysts from 2019-2029.<\/p>\n  <\/div>\n<\/section>\r\n\r\n\r\n\r\n<p>A cybersecurity doctorate offers an excellent way to benefit from these trends. Candidates with prestigious terminal degrees enjoy access to a full spectrum of high-level <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a> and roles, garnering salaries that reflect their importance and organizational value.<\/p>\r\n\r\n\r\n\r\n<p>This guide explains everything you need to know about getting a Ph.D. in cybersecurity. It also offers a list of current options for top online study opportunities to help guide your program research.<\/p>\r\n\r\n\r\n\r\n<h2>Why Get an Online Doctorate in Cybersecurity?<\/h2>\r\n\r\n\r\n\r\n<p>According to CompTIA, a leading provider of IT certifications, there were more than <a href=\"https:\/\/www.comptia.org\/blog\/the-top-9-jobs-in-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">500,000 job openings<\/a> in the U.S. for cybersecurity professionals in October 2020. This speaks to the strong current need for qualified candidates.<\/p>\r\n\r\n\r\n\r\n<p>Cybersecurity encompasses many specialized roles and job functions. Some career paths, including advanced research positions and university-level teaching jobs, strongly prefer or require candidates to hold doctorates in cybersecurity. Ph.D. credentials also carry significant value in professional circles.<\/p>\r\n\r\n\r\n\r\n<p>As demand for cybersecurity specialists continues to rise, competition for high-profile and leadership roles intensifies. Possessing a cybersecurity doctorate helps you stand out in a crowded field of job-seekers. It also demonstrates your commitment to professional development, which employers always value.<\/p>\r\n\r\n\r\n\r\n<p>Some of the job titles available to an individual with a Ph.D. in cybersecurity include <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\">chief information security officer<\/a>, information security manager, lead data scientist, and technology research and development engineer. Beyond the prestige and high pay associated with these types of roles, an online Ph.D. in cybersecurity also delivers additional benefits:<\/p>\r\n\r\n\r\n\r\n<section class=\"checklist check \">\n  \r\n<dl>\r\n<dt>Career Flexibility<\/dt>\r\n<dd>An online doctorate in cybersecurity maximizes your employment options. A graduate with a Ph.D. can work in academia, research, or business sectors. Few other cybersecurity degree designations open as many doors as a Ph.D.<\/dd>\r\n<dt>Deep Professional Insights<\/dt>\r\n<dd>Traditional and online Ph.D. programs in cybersecurity delve well beyond the field's purely technical aspects. They also encompass proficiencies like organizational leadership and advanced research capabilities, which carry a premium in the eyes of employers.<\/dd>\r\n<dt>Cutting-Edge Advancement<\/dt> \r\n<dd>IT and tech professionals with doctorates drive a great deal of tech industry innovation. A Ph.D. in cybersecurity serves as an ideal credential for those seeking to push the limits of the field.<\/dd>\r\n<\/dl>\r\n\n<\/section>\n\n\r\n\r\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\r\n\r\n<h2>Online Doctoral Programs in Cybersecurity<\/h2>\r\n\r\n\r\n\r\n\r\n    <table class=\"sonic-table\">\r\n        <thead>\r\n            <tr>\r\n                <th>SCHOOL NAME<\/th>\r\n                <th>PROGRAMS<\/th>\r\n                <th>NSA<\/th>\r\n            <\/tr>\r\n        <\/thead>\r\n        <tbody>\r\n            <tr>\r\n                <td data-title=\"SCHOOL NAME\">Capitol Technology University<\/td>\r\n                <td data-title=\"PROGRAMS\">Laurel, Maryland<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.captechu.edu\/degrees-and-programs\/doctoral-degrees\/doctorate-in-cybersecurity\">Doctor\r\n                        of Science in Cybersecurity<\/a><br>Capitol Technology University has a Doctor of Science in\r\n                    Cybersecurity program that is offered primarily online. Students will need to be in residence at the\r\n                    university in Laurel, Maryland, for one course a year for the three years of the program. The degree\r\n                    requires 54 to 66 credits and includes a dissertation. Applicants must have a bachelor\u2019s degree in\r\n                    information assurance, computer science, IT, or a closely related field. Additionally, applicants\r\n                    who do not currently hold one of four industry certifications \u2013 CISSP, GSE, CGEIT, or CISM \u2013 must\r\n                    take a comprehensive entrance exam. The university also requires applicants to have at least five\r\n                    years of relevant work experience. Students may enter the program in the fall, spring, or summer\r\n                    semester.<\/td>\r\n                <td data-title=\"NSA\">NSA<br>CAE<\/td>\r\n            <\/tr>\r\n            <tr>\r\n                <td data-title=\"SCHOOL NAME\">Dakota State University<\/td>\r\n                <td data-title=\"PROGRAMS\">Madison, South Dakota<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/dsu.edu\/graduate-students\/phdco\">Doctor of Philosophy in Cyber\r\n                        Operations<\/a><br>Dakota State University offers a Doctor of Science in Cyber Security that\r\n                    students can earn in a primarily online format. In addition to taking classes in a web-enhanced\r\n                    online environment, candidates must complete three onsite research seminars at the campus in\r\n                    Madison, South Dakota. The research seminars are held annually and last for several days. Applicants\r\n                    to the program must have a master\u2019s degree from an accredited university and must have earned either\r\n                    a bachelor\u2019s or master\u2019s degree in computer science. The minimum acceptable GPA is 3.0, and students\r\n                    who earned a GPA of 3.25 or higher are exempt from submitting GRE scores. Students may only enter\r\n                    the program in the fall semester.<\/td>\r\n                <td data-title=\"NSA\">NSA<br>CAE<\/td>\r\n            <\/tr>\r\n            <tr>\r\n                <td data-title=\"SCHOOL NAME\">University of Fairfax<\/td>\r\n                <td data-title=\"PROGRAMS\">Roanoke, Virginia<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.ufairfax.edu\/doctorate\/cybersecurity\/\">Doctor of Science in Information\r\n                        Assurance (DSc)<\/a><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.ufairfax.edu\/doctorate\/cybersecurity\/information-assurance\/\">Doctorate in\r\n                        Information Assurance (DIA)<\/a><br>The University of Fairfax offers a Doctorate of Information\r\n                    Assurance for online students. To earn the degree, candidates must complete at least 60 credits\r\n                    beyond the master\u2019s level, which generally requires three to five years of study. Students will have\r\n                    both synchronous and asynchronous elements in their coursework. The curriculum includes core\r\n                    courses, specialization courses, research methods courses, research preparation courses, and\r\n                    dissertation development courses. The program requires students to take two comprehensive exams and\r\n                    to complete a research project and dissertation on a focused cybersecurity problem. Students can use\r\n                    their dissertation to seek publishing opportunities. Applicants should have a master\u2019s degree and a\r\n                    minimum of five years of relevant professional experience.<\/td>\r\n                <td data-title=\"NSA\"><\/td>\r\n            <\/tr>\r\n            <tr>\r\n                <td data-title=\"SCHOOL NAME\">University of Rhode Island<\/td>\r\n                <td data-title=\"PROGRAMS\">Kingston, Rhode Island<br><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/dfcsc.uri.edu\/academics\/phd\">PhD in Computer Science \u2013 Digital Forensics<\/a><\/td>\r\n                <td data-title=\"NSA\">NSA<br>CAE<\/td>\r\n            <\/tr>\r\n        <\/tbody>\r\n    <\/table>\r\n\r\n\r\n\r\n\r\n<h2>What To Expect From Online Cybersecurity Doctoral Programs<\/h2>\r\n\r\n\r\n\r\n<p>Online Ph.D. programs in cybersecurity vary widely in their structures. Most include a standardized curriculum of core and elective courses, which students complete before focusing on their dissertations. The dissertation usually includes a long-form research project on a topic chosen by the student under the guidance and supervision of a senior faculty member.<\/p>\r\n\r\n\r\n\r\n<p>Though some cybersecurity doctoral programs adopt fully online structures, many feature limited campus residency requirements. Campus residencies typically include symposiums on relevant topics and conferences with cohorts and faculty advisors.<\/p>\r\n\r\n\r\n\r\n<p>In terms of completion timelines, candidates should expect to commit at least three years of full-time enrollment to the Ph.D. program. Schools typically allow part-time learners up to seven years to meet their graduation requirements.<\/p>\r\n\r\n\r\n\r\n<p>Doctorates in cybersecurity carry varying degree designations. The Ph.D. usually applies to programs with a primary focus on applied theory and research. Candidates can also consider doctor of science (D.Sc.) programs, which focus on more technical topics, and doctor of professional studies (DPS) degrees, emphasizing practical, job-oriented skills.<\/p>\r\n\r\n\r\n\r\n<h3>Doctoral Admission Requirements<\/h3>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/\">Cybersecurity doctorates<\/a> universally require a four-year bachelor's degree in computer science, computer engineering, information assurance, or another related field. Many programs prefer or require candidates with <a href=\"\/listings\/masters-degrees\/\">master's degrees<\/a>. In many cases, those that stipulate a bachelor's degree as the minimum education level expect applicants to possess multiple years of professional experience in cybersecurity-related roles.<\/p>\r\n\r\n\r\n\r\n<p>GPA requirements vary but usually sit in the 3.0-3.2 range. Candidates often must provide GRE or GMAT scores. Not all schools ask for test scores, but applicants can still submit them voluntarily.<\/p>\r\n\r\n\r\n\r\n<p>Cybersecurity-related professional certifications also strengthen an application. Designations like CompTIA Security+, certified ethical hacker, GIAC security essentials, and many others qualify. Include these in your application package and provide documentation of your certification, even if the school does not formally request them.<\/p>\r\n\r\n\r\n\r\n<h3>Cybersecurity Degree and Specialization Options<\/h3>\r\n\r\n\r\n\r\n<p>Most doctorates in cybersecurity lead to Ph.D. designations, though some culminate in D.Sc. and DPS credentials. <\/p>\r\n\r\n\r\n\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    <p>Even though cybersecurity exists as a specialization within the broader field of computer science, some doctoral programs offer niche concentrations in highly targeted areas. Candidates with specific research interests or career goals may wish to explore these study options.<\/p>\n  <\/div>\n<\/section>\r\n\r\n\r\n\r\n<p>Specialization examples include:<\/p>\r\n\r\n\r\n\r\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\">Digital and Cyberforensics<\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p>\r\n\r\nThis specialization has strong applications in law enforcement, antiterrorism, incident response, and private investigation.\r\n\r\n<\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\">Information Assurance<\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p>\r\n\r\nInformation assurance focuses on best practices and security techniques relating to the storage, retrieval, transmission, and use of sensitive or proprietary data.\r\n\r\n<\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\">Leadership and Innovation<\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p>\r\n\r\nLeadership-oriented specializations add organizational management training to a standard cybersecurity curriculum.\r\n\r\n<\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\r\n\r\n\r\n\r\n<p>Doctoral programs typically facilitate high levels of customization. Thus, learners can also focus their electives, research, and dissertations on areas of particular interest. This effectively allows enrollees to create their own specializations.<\/p>\r\n\r\n\r\n\r\n<h3>Popular Doctoral Program Courses<\/h3>\r\n\r\n\r\n\r\n<p>Course content varies among schools and programs, and degree-seekers at the doctoral level play an active role in shaping their own learning. Most programs concentrate their customization potential in the program's dissertation components. These usually feature a high level of self-direction, though dissertation topics require faculty input and approval.<\/p>\r\n\r\n\r\n\r\n<p>In most programs, a standard set of required and elective courses precede the dissertation. Common examples of these courses include:<\/p>\r\n\r\n\r\n\r\n<sonic-tabs theme=\"secondary\">\r\n<div data-tab=\"Computer Networking\">This foundational course builds on existing networking skills to explore intermediate and advanced topics in wireless computer and cellular telecommunications. Learners engage in theoretical and applied aspects of networking. Each enrollee completes a research project that critically examines a contemporary networking-related cybersecurity issue.<\/div>\r\n<div data-tab=\"Applied Cryptography\">Usually offered as an elective, applied cryptography provides an accelerated survey of techniques used to protect information from unauthorized access. The course emphasizes information theory, number theory, cryptographic systems, and probability. Students also explore methods for decrypting sensitive data for investigative purposes.<\/div>\r\n<div data-tab=\"Software Security and Vulnerabilities\">Many cyberattacks originate with targeted exploits of vulnerabilities in software applications. In this required course, learners examine common, uncommon, and novel security weaknesses in widely used and specialized forms of software. Students foster a thorough, comprehensive understanding of how to prevent, detect, and remediate software-based attacks.<\/div>\r\n<div data-tab=\"Cyberlaw\">Governments continue to update laws and regulations associated with data, information, and computing networks. This elective course explores current and emerging topics in the field of cyberlaw and related ethical issues. It also familiarizes students with widely used compliance standards.<\/div>\r\n<\/sonic-tabs>\r\n\r\n\r\n\r\n<h3>The Doctoral Dissertation<\/h3>\r\n\r\n\r\n\r\n<p>Practically all cybersecurity doctorates culminate in an intensive research project known as a dissertation. Most programs offer students wide latitude regarding topic selection, but they almost always require each enrollee to pose a specific, targeted, and relevant research question. The content of the dissertation then draws on original academic investigation and\/or fieldwork to answer the research question.<\/p>\r\n\r\n\r\n\r\n<p>Dissertation courses usually span two semesters in the final year of the program. Candidates begin by formulating and refining their topics with the assistance of dedicated faculty advisors. They then research, write, and revise multiple drafts of the dissertation before presenting their findings to a faculty panel.<\/p>\r\n\r\n\r\n\r\n<p>Doctoral programs leading to Ph.D. degrees usually prompt candidates to take an academic focus in their research. Programs leading to D.Sc. and DPS designations typically feature a more applied approach, requiring students to demonstrate their synthesis of advanced skills and technical proficiencies gained throughout the program.<\/p>\r\n\r\n\r\n\r\n<h3>How Much Will an Online Doctorate in Cybersecurity Cost?<\/h3>\r\n\r\n\r\n\r\n<p>Earning an online Ph.D. in cybersecurity requires a significant investment of time and money. Accredited programs start around <a href=\"https:\/\/catalog.dsu.edu\/content.php?catoid=28&amp;navoid=1349\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$350-$600 per credit<\/a>. Top programs at prestigious schools can carry fees in the range of $1,500-$2,000 per credit or more.<\/p>\r\n\r\n\r\n\r\n<p>In general, private schools charge more than public institutions. Similarly, reputable programs attract more accomplished faculty members, who tend to command higher salaries. Thus, students pay more to attend these schools.<\/p>\r\n\r\n\r\n\r\n<p>Studying online offers significant savings over the cost of campus attendance, as learners do not need to relocate or commute. Some schools also offer price breaks to online students, such as reduced flat-rate fees for off-campus learners or access to reduced in-state tuition fees.<\/p>\r\n\r\n\r\n\r\n<p>Despite the cost advantages of studying online, most candidates still need help financing their doctorates. Investigate forms of aid that do not require repayment, such as scholarships, fellowships, grants, and bursaries first. Consider options like government-issued or private loans as a last resort.<\/p>\r\n\r\n\r\n\r\n<h2>Jobs and Salaries for Doctors of Cybersecurity<\/h2>\r\n\r\n\r\n\r\n<p>Cybersecurity professionals work in the public and private sectors. Candidates with doctorates often qualify for leadership roles on cybersecurity and incident response teams. Doctorates also lead to roles in research, academia, and postsecondary teaching. Education-related career paths represent a set of options uniquely available to those with Ph.D., D.Sc., or DPS degrees.<\/p>\r\n\r\n\r\n\r\n<p>Despite strong labor market needs for capable cybersecurity experts, professionals may struggle to advance into mid-level roles with only a bachelor's degree. It can take years of on-the-job development to break through such barriers. Advanced degrees offer an alternative path, helping job-seekers qualify for meaningful roles more quickly while also maximizing their career growth options.<\/p>\r\n\r\n\r\n\r\n<p>Examples of rewarding jobs available to candidates with a doctorate in cybersecurity include:<\/p>\r\n\r\n\r\n\r\n<div class=\"accordion-minimal\">\n<section class=\"accordion   \" layout=\"\" data-cy=\"accordion\" data-accordion data-accordion-type=\"base\" data-accordion-title=\"accordion-438923\">\n\t\t\t<ul class=\"my-0 text-right\">\n\t\t\t<li class=\"inline-block mb-0 mr-1\">\n\t\t\t\t<button class=\"p-3 py-2 text-xs leading-3 border collapse-all control\">\n\t\t\t\t\tCollapse All\n\t\t\t\t<\/button>\n\t\t\t<\/li>\n\t\t\t<li class=\"inline-block mb-0\">\n\t\t\t\t<button class=\"p-3 py-2 text-xs leading-3 border expand-all control\">\n\t\t\t\t\tExpand All\n\t\t\t\t<\/button>\n\t\t\t<\/li>\n\t\t<\/ul>\n\t\n\t\t\t\t\t\t\t<div\n\t\t\tclass=\"accordion__items \" data-order=1>\n\t\t\t<!-- header -->\n\t\t\t<div class=\"flex items-center overflow-hidden cursor-pointer header flex-nowrap\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"content-1\" id=\"header-1\">\n\n\t\t\t\t\n\t\t\t\t<!-- title -->\n\t\t\t\t\t\t\t\t\t<h3 class=\"mr-auto text-xl font-bold leading-6 title lg:text-2xl\">\n\t\t\t\t\t\tInformation Systems Manager\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<!-- control -->\n\t\t\t\t<span class=\"flex justify-center flex-grow-0 flex-shrink-0 w-20 text-center\" aria-hidden=\"true\" focusable=\"false\">\n\t\t\t\t\t<svg class=\"block w-6 h-6 collapse\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M19 9L12 16L5 9\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t\t<svg class=\"hidden w-6 h-6 expand\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 15l7-7 7 7\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\n\t\t\t<!-- content -->\n\t\t\t<div class=\"block p-8 content\">\n\n\t\t\t\t\n\t\t\t\t<section>&#13;\n&#13;\n<p>These professionals direct the design and operation of all computer hardware, software, and networking systems their organization uses. A cybersecurity background provides an excellent foundation for those working in industries that handle high volumes of sensitive, private, or proprietary data.<\/p>&#13;\n<ul>&#13;\n<li><strong>Required Education: <\/strong>Master's degree or doctorate<\/li>&#13;\n<li><strong>Job Outlook (2019-29):<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/management\/computer-and-information-systems-managers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">+10%<\/a><\/li>&#13;\n<li><strong>Median Annual Salary:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/management\/computer-and-information-systems-managers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">$146,360<\/a><\/li>&#13;\n<\/ul>&#13;\n &#13;\n<\/section>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<div\n\t\t\tclass=\"accordion__items \" data-order=2>\n\t\t\t<!-- header -->\n\t\t\t<div class=\"flex items-center overflow-hidden cursor-pointer header flex-nowrap\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"content-2\" id=\"header-2\">\n\n\t\t\t\t\n\t\t\t\t<!-- title -->\n\t\t\t\t\t\t\t\t\t<h3 class=\"mr-auto text-xl font-bold leading-6 title lg:text-2xl\">\n\t\t\t\t\t\tLead Data Scientist\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<!-- control -->\n\t\t\t\t<span class=\"flex justify-center flex-grow-0 flex-shrink-0 w-20 text-center\" aria-hidden=\"true\" focusable=\"false\">\n\t\t\t\t\t<svg class=\"block w-6 h-6 collapse\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M19 9L12 16L5 9\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t\t<svg class=\"hidden w-6 h-6 expand\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 15l7-7 7 7\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\n\t\t\t<!-- content -->\n\t\t\t<div class=\"block p-8 content\">\n\n\t\t\t\t\n\t\t\t\t<section>&#13;\n&#13;\n<p>Data scientists specialize in using technology to solve organizational challenges and business problems. A Ph.D. in cybersecurity qualifies candidates for lead roles on data science and information security teams.<\/p>&#13;\n<ul>&#13;\n<li><strong>Required Education: <\/strong>Master's degree or doctorate<\/li>&#13;\n<li><strong>Job Outlook (2019-29):<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener noreferrer\">+15%<\/a><\/li>&#13;\n<li><strong>Median Annual Salary:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener noreferrer\">$122,840<\/a><\/li>&#13;\n<\/ul>&#13;\n &#13;\n<\/section>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<div\n\t\t\tclass=\"accordion__items \" data-order=3>\n\t\t\t<!-- header -->\n\t\t\t<div class=\"flex items-center overflow-hidden cursor-pointer header flex-nowrap\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"content-3\" id=\"header-3\">\n\n\t\t\t\t\n\t\t\t\t<!-- title -->\n\t\t\t\t\t\t\t\t\t<h3 class=\"mr-auto text-xl font-bold leading-6 title lg:text-2xl\">\n\t\t\t\t\t\tChief Technology Officer\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<!-- control -->\n\t\t\t\t<span class=\"flex justify-center flex-grow-0 flex-shrink-0 w-20 text-center\" aria-hidden=\"true\" focusable=\"false\">\n\t\t\t\t\t<svg class=\"block w-6 h-6 collapse\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M19 9L12 16L5 9\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t\t<svg class=\"hidden w-6 h-6 expand\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 15l7-7 7 7\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\n\t\t\t<!-- content -->\n\t\t\t<div class=\"block p-8 content\">\n\n\t\t\t\t\n\t\t\t\t<section>&#13;\n&#13;\n<p>These executives play leadership roles in fulfilling their organization's technology needs. They develop and implement organizational technology strategies and align organizational goals with existing and emerging technologies.<\/p>&#13;\n<ul>&#13;\n<li><strong>Required Education: <\/strong>Master's degree or doctorate<\/li>&#13;\n<li><strong>Job Outlook (2019-29):<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/management\/top-executives.htm\" target=\"_blank\" rel=\"noopener noreferrer\">+4%<\/a><\/li>&#13;\n<li><strong>Median Annual Salary:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/management\/top-executives.htm\" target=\"_blank\" rel=\"noopener noreferrer\">$104,690<\/a><\/li>&#13;\n<\/ul>&#13;\n &#13;\n<\/section>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<div\n\t\t\tclass=\"accordion__items \" data-order=4>\n\t\t\t<!-- header -->\n\t\t\t<div class=\"flex items-center overflow-hidden cursor-pointer header flex-nowrap\" role=\"button\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"content-4\" id=\"header-4\">\n\n\t\t\t\t\n\t\t\t\t<!-- title -->\n\t\t\t\t\t\t\t\t\t<h3 class=\"mr-auto text-xl font-bold leading-6 title lg:text-2xl\">\n\t\t\t\t\t\tPostsecondary Instructor\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<!-- control -->\n\t\t\t\t<span class=\"flex justify-center flex-grow-0 flex-shrink-0 w-20 text-center\" aria-hidden=\"true\" focusable=\"false\">\n\t\t\t\t\t<svg class=\"block w-6 h-6 collapse\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M19 9L12 16L5 9\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t\t<svg class=\"hidden w-6 h-6 expand\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\">\n\t\t\t\t\t\t<path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M5 15l7-7 7 7\"><\/path>\n\t\t\t\t\t<\/svg>\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\n\t\t\t<!-- content -->\n\t\t\t<div class=\"block p-8 content\">\n\n\t\t\t\t\n\t\t\t\t<section>&#13;\n&#13;\n<p>Postsecondary instructors work at colleges and universities, where they teach courses to undergraduate and graduate students. Many also take on administrative duties and supervise graduate students' research.<\/p>&#13;\n<ul>&#13;\n<li><strong>Required Education: <\/strong>Master's degree plus extensive professional experience, or a doctorate<\/li>&#13;\n<li><strong>Job Outlook (2019-29):<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/education-training-and-library\/postsecondary-teachers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">+9%<\/a><\/li>&#13;\n<li><strong>Median Annual Salary:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/education-training-and-library\/postsecondary-teachers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">$79,540<\/a><\/li>&#13;\n<\/ul>&#13;\n &#13;\n<\/section>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t<\/section>\n\n\n<\/div>\r\n\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore Cybersecurity Careers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n\r\n<h2>How To Find the Right Cybersecurity Doctorate<\/h2>\r\n\r\n\r\n\r\n<p>Each learner holds a distinct set of criteria to identify their ideal program. Depending on your learning goals, career objectives, and personal preferences, you should consider such factors as:<\/p>\r\n\r\n\r\n\r\n<section class=\"checklist circle-check \">\n  \r\n    <dl>\r\n        <dt>Program Composition<\/dt>\r\n        <dd>What kind of balance does the program place on core courses, electives, and dissertation research? Candidates seeking to maximize technical skills may wish to pursue more coursework-heavy programs, while those more oriented toward research may prefer schools that place more emphasis on dissertation requirements.<\/dd>\r\n        <dt>Available Concentrations or Specializations<\/dt>\r\n        <dd>Degree-seekers with targeted cybersecurity interests should seek programs with curriculum-based support in their preferred areas of inquiry.<\/dd>\r\n        <dt>Faculty Credentials<\/dt>\r\n        <dd>Many students value the opportunity to study under the tutelage of accomplished professionals whose achievements mirror their own ambitions.<\/dd>\r\n        <dt>Program Location<\/dt>\r\n        <dd>Proximity to key employment corridors help career networking efforts pay off. Examples of advantageous locations include major metro areas and tech-heavy regions like Silicon Valley and the Dulles Technology Corridor.<\/dd>\r\n    <\/dl>\r\n\n<\/section>\n\n\r\n\r\n\r\n\r\n<p>Accreditation is another critical consideration. Institutional credentials should always include current and valid national or regional accreditation. Specialized optional endorsements, such as the National Security Agency's National Centers of Academic Excellence, also signal that the doctoral program meets elite standards.<\/p>\r\n\r\n\r\n\r\n<h3>Why You Should Get Your Cybersecurity Ph.D. Online<\/h3>\r\n\r\n\r\n\r\n<p>As a computer science field heavy on technical concepts, cybersecurity translates well to remote learning. Online delivery formats allow degree-seekers to move quickly through familiar concepts and slow down when handling more challenging material.<\/p>\r\n\r\n\r\n\r\n<p>Scheduling flexibility offers another significant advantage. Campus-based programs have rigid schedules and require physical attendance, making it very difficult to balance learning with existing personal and professional commitments. Online learning liberates students from these confines, allowing them to study as their schedules allow.<\/p>\r\n\r\n\r\n\r\n<p>Learners in technical fields related to IT and computer science generally feel comfortable with the independent, self-directed nature of online schooling. Keep in mind that succeeding at the doctoral level demands self-discipline and advanced time management skills.<\/p>\r\n\r\n\r\n\r\n<p>Finally, remember that most online doctorates in cybersecurity include residency requirements. They deliver plenty of opportunities to enrich your learning experience through in-person interactions with peers, cohorts, and faculty members.<\/p>\r\n\r\n\r\n\r\n<h2>Frequently Asked Questions About Cybersecurity Ph.D's<\/h2>\r\n\r\n<h3>How long does it take to get a Ph.D. in cybersecurity?<\/h3>\r\n<p>You should expect to spend at least three academic years on your cybersecurity doctorate if you intend to study full time. Candidates making part-time progress toward degree completion usually graduate in 5-7 years.<\/p>\r\n<h3>What can I do with a degree in cybersecurity?<\/h3>\r\n<p>A degree in <a href=\"\/jobs\/security-architect\/\">cybersecurity qualifies candidates to work as cryptographers, cryptanalysts, security architects<\/a> or engineers, incident response professionals, penetration testers, and IT consultants. Those with doctorates also gain access to research, teaching, and high-ranking management, executive, and C-suite roles.<\/p>\r\n<h3>Is a Ph.D. in cybersecurity worth it?<\/h3>\r\n<p>Given the current boom in the field of cybersecurity, degree-seekers continue to gravitate toward the field in large numbers. A Ph.D. or other doctoral designation can help your credentials stand out in a competitive labor market and help you bypass entry-level roles.<\/p>\r\n<h3>What's the difference between a Ph.D. and D.Sc. in cybersecurity?<\/h3>\r\n<p>Ph.D. programs retain a stronger academic focus, and coursework emphasizes applied theory and research. By contrast, D.Sc. programs center more on the advanced technical skills required of elite professionals.<\/p>\r\n\r\n\r\n\r\n\r\n<section class=\"container-wrap-sm \">\n    <div class=\"container\">\n\n                <div class=\"content text-center mx-auto mb-12\">\n\n                        <h2>Recommended Reading<\/h2>\n            \n            \n            \n        <\/div>\n        \n        <sonic-posts\n            class=\"m-auto\"\n            layout=\"base\"\n            posts='[{\"image\":\"https:\\\/\\\/www.cyberdegrees.org\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/GettyImages-1194430861.jpg\",\"title\":\"Cybersecurity Jobs: Overview\",\"author\":\"Liz Simmons\",\"date\":\"March 1, 2022\",\"link\":\"https:\\\/\\\/www.cyberdegrees.org\\\/jobs\\\/\",\"content\":\"Interested in a job in cybersecurity? Explore cybersecurity salaries, typical duties and required skills, and how to prepare for a rewarding cybersecurity career.\"},{\"image\":\"https:\\\/\\\/www.cyberdegrees.org\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/GettyImages-619503664.jpg\",\"title\":\"Doctoral Degrees in Cybersecurity\",\"author\":\"Cynthia Widmayer\",\"date\":\"March 3, 2022\",\"link\":\"https:\\\/\\\/www.cyberdegrees.org\\\/listings\\\/doctoral-degrees\\\/\",\"content\":\"A doctorate in cybersecurity can open doors to advanced computer science roles. Find out more about cybersecurity Ph.D. programs, including prospective careers for graduates.\"},{\"image\":\"https:\\\/\\\/www.cyberdegrees.org\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/GettyImages-589090389.jpg\",\"title\":\"Best Online Master&#39;s in Cybersecurity Programs for 2023\",\"author\":\"Holland Webb\",\"date\":\"March 1, 2022\",\"link\":\"https:\\\/\\\/www.cyberdegrees.org\\\/listings\\\/top-online-masters-in-cyber-security-programs\\\/\",\"content\":\"An online master&#39;s in cybersecurity can boost your career options and earning potential. Check out our program rankings to kick off your search.\"}]'>\n        <\/sonic-posts>\n\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"This guide explains everything you need to know about getting a Ph.D. in cybersecurity. It also outlines top online study opportunities to help guide your program research.","protected":false},"author":5,"featured_media":2181,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-rankings.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[29],"jobs-overview":[],"rankings":[],"class_list":["post-275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","degrees-online"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=275"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/275\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2181"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=275"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=275"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=275"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=275"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=275"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}