{"id":282,"date":"2022-03-03T00:06:33","date_gmt":"2022-03-03T00:06:33","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=282"},"modified":"2023-10-18T18:29:32","modified_gmt":"2023-10-18T18:29:32","slug":"phd-programs-in-cyber-security","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/","title":{"rendered":"Doctoral Degrees in Cybersecurity"},"content":{"rendered":"<p>A doctoral degree is the highest academic credential in cybersecurity. Learners pursue Ph.D. programs after earning bachelor's and master's degrees. Doctorates are designed to prepare enrollees for advanced careers in teaching and research.<\/p>\r\n<p>In recent decades, cybersecurity has become a major field of employment with a growing number of open positions and a continuous need for skilled workers. The global cybersecurity industry has over 3.4 million job openings globally, according to the <a href=\"https:\/\/www.isc2.org\/\/-\/media\/ISC2\/Research\/2022-WorkForce-Study\/ISC2-Cybersecurity-Workforce-Study.ashx\" target=\"_blank\" rel=\"noopener\">2022 Cybersecurity Workforce Study<\/a>. The report reveals the U.S. alone has 400,000 vacant cybersecurity positions.<\/p>\r\n<p>Cybersecurity attracts analytical thinkers and computer science experts. In this guide, we discuss the features of a doctoral program, analyze potential careers, and list several schools offering a Ph.D. in cybersecurity.<\/p>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"why-get-a-doctorate\" id=\"why-get-a-doctorate\"><\/a>\n\n \r\n<h2>Why Get a Cybersecurity Doctoral Degree?<\/h2>\r\n<p>The history of cybersecurity dates back to 1971, when computer scientist Bob Thomas developed the first computer virus called Creeper. Around the same time, Ray Tomlinson created the original computer antivirus program &mdash; Reaper &mdash; to fight against Creeper. As computer systems and the internet progressed rapidly over the decades, <a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">cybersecurity threats<\/a> and challenges also became more complex.<\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">Cybersecurity professionals<\/a> work across industries, including finance, retail, healthcare, and government. These experts develop security strategies, detect and prevent cyberattacks, and lead security teams. Curious, innovative thinkers who work well under pressure will likely thrive in this challenging, fast-paced profession.<\/p>\r\n<p>Most entry-level cybersecurity jobs require at least a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\">bachelor's degree<\/a>. Advanced roles may require a master's degree. With a doctoral degree, professionals can qualify for the highest-level positions in the field, including research jobs that help shape the future of cybersecurity.<\/p>\r\n\r\n<p>Benefits of earning a cybersecurity Ph.D. include:<\/p>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Gaining New Skills<\/strong>: Earning a Ph.D. in cybersecurity helps students develop advanced technical skills and acquire new knowledge. Cybersecurity professionals seek out the most recent information about developments in their field to keep up with <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">changes in technology<\/a>.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Making Connections<\/strong>: Completing a cybersecurity doctoral program helps learners network with classmates, teachers, and other cybersecurity professionals. These connections can lead to job opportunities after graduation.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Qualifying for Different Jobs<\/strong>: Getting a Ph.D. in cybersecurity can open the door to a number of career opportunities. Graduates take advanced management, research, and university teaching positions.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"what-to-expect\" id=\"what-to-expect\"><\/a>\n\n \r\n<h2>What To Expect From a Doctorate in Cybersecurity Program<\/h2>\r\n<p>Because cybersecurity is a subfield of computer science, these cybersecurity doctoral programs focus on advanced topics such as <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-information-assurance-bachelors\/\">information assurance<\/a>, research methodologies, professional ethics, and leadership. Program lengths vary, but learners usually finish their cybersecurity doctorate in 3-7 years, with an average load of 60 credits.<\/p>\r\n<p>Enrollees take classes in cybersecurity theory and research design. They also complete electives and dissertation credits. Typical courses include professional research theory and practice, advanced computer security, and managing cybersecurity risk. Students can pursue online, in-person, and hybrid cybersecurity doctorates.<\/p>\r\n<p>The price of a cybersecurity Ph.D. varies, but typical cost ranges from $1,000-$2,000 per credit. Most programs provide a variety of financing options, including scholarships, grants, loans, and graduate assistantships. Some schools maintain fully funded Ph.D. in cybersecurity programs, allowing learners to earn their degree without paying any tuition in exchange for teaching or research assistant work.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/listings\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about cybersecurity programs<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h3>Admission Requirements<\/h3>\r\n<p>Admission requirements for cybersecurity doctorates vary by school. Applicants need at least a bachelor's degree, but some universities also require a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\">master's degree<\/a> in a field related to computer science. Some programs accept learners with a degree in an unrelated field, but require them to complete foundational prerequisite courses.<\/p>\r\n<p>Cybersecurity doctoral programs typically require a minimum 3.0 GPA and satisfactory GRE scores. Many schools offer GRE waivers for applicants with strong professional or academic backgrounds. Other common application requirements include letters of recommendation, writing samples, college transcripts, and a resume. Some Ph.D. in cybersecurity programs require an admissions interview.<\/p>\r\n\r\n<h3>Degree and Specialization Options<\/h3>\r\n<p>Doctorates in cybersecurity, information assurance, and digital forensics exist in two primary formats: a Ph.D. or a DSc (doctor of science degree). Ph.D. in cybersecurity programs usually emphasize theory and research, while DSc in cybersecurity degrees usually focus on theory and technical knowledge with practical applications.<\/p>\r\n<p>Less commonly, some schools offer a doctor of professional studies (DPS) in cybersecurity, which focuses primarily on applied knowledge and training. Occasionally, schools offer their cybersecurity Ph.D. as a <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-vs-computer-science\/\">computer science<\/a> doctorate with a specialization in cybersecurity. The most popular option is the Ph.D. in cybersecurity.<\/p>\r\n<p>Many cybersecurity Ph.D. programs include concentrations that allow enrollees to focus their coursework on specific areas of the field. Potential cybersecurity specializations include leadership and innovation, <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/computer-forensics\/\">digital forensics<\/a>, and IT security.<\/p>\r\n\r\n<h3>Popular Ph.D. in Cybersecurity Courses<\/h3>\r\n<p>Though each cybersecurity doctorate offers its own classes, many programs cover similar topics. Typical courses explore computer security, statistics, cryptography, and information security management. Below, we describe courses from a typical Ph.D. in cybersecurity curriculum.<\/p>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Advanced Computer Security<\/strong>: This class provides a foundation in advanced computer security topics, including operating system security, database security, network security protocols, and trusted computing. Students learn to use authorization techniques and authentication mechanisms, design operating systems, and mitigate computer security risks.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Law, Policy, Ethics, and Compliance<\/strong>: This course focuses on ethical, legal, and policy issues for cybersecurity. Learners explore domestic and international legal principles and security law. They learn to critically evaluate policy documents and compliance issues, conduct independent research, and make presentations.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Managing Cybersecurity Risk<\/strong>: Students investigate cybersecurity risks and learn management techniques to mitigate breaches and develop cyberdefense strategies. This class also covers formal methodologies for strategic decision-making.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Applied Cryptography:<\/strong> In applied cryptography courses, enrollees learn mathematical techniques for data confidentiality, authentication, and verification. They also study how to apply these strategies to real-world situations.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Applied Research<\/strong>: This class prepares doctoral students to create a dissertation proposal and research plan. Candidates create the documentation for their topic, get approval from their faculty advisors, and submit information to the school's institutional research board if necessary. Learners also conduct a professional literature review of their research topic.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n<h3>The Doctoral Dissertation<\/h3>\r\n<p>To finish the Ph.D. in cybersecurity, most programs require a dissertation. Students complete all courses and take comprehensive exams before starting this written culmination of graduate work. Doctoral candidates select a topic addressing a problem in cybersecurity, complete original research in that area, and write about their findings.<\/p>\r\n<p>The research process includes creating a plan, getting faculty approval, conducting research, and writing. The final step includes an oral presentation and defense before the candidate's committee. How fast a learner completes their dissertation varies: Some enrollees finish the entire project in 1-2 years, while others take 3-5 years or even longer.<\/p>\r\n<p>Though students do not need to identify a dissertation topic at the beginning of the program, developing an understanding of your research interests as soon as possible is helpful.<\/p>\r\n\r\n\r\n<h3>How Much Will a Doctorate in Cybersecurity Cost?<\/h3>\r\n<p>Tuition rates for doctorates in cybersecurity depend on the school. Factors influencing price include program length, type of university (public or private), and program format (online, hybrid, or in person). Cost also varies depending on whether learners pay in-state or out-of-state tuition.<\/p>\r\n<p>The price of a Ph.D. in cybersecurity can seem high, but do not assume you can not afford it. First, choose your top cybersecurity programs, then consider the cost. Although many doctoral cybersecurity programs look expensive, students almost never pay the full price for a Ph.D.<\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/how-to-pay-for-a-degree\/\">Financing options<\/a> include loans, fellowships, grants, and scholarships. Many cybersecurity doctorate programs also offer assistantships, where students work as teaching or research assistants in exchange for tuition reimbursement and a stipend. In fully funded Ph.D. programs, doctoral candidates pay zero tuition, and instead get paid to work and study full time.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<ul>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/resources\/how-to-pay-for-a-degree\/\">Learn how to pay for cybersecurity degrees<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/resources\/lgbtq-scholarships\/\">Explore scholarships for LGBTQIA+ students<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/resources\/scholarships-military-veterans\/\">Discover scholarships for military and veterans<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-resources-for-underrepresented-populations\/\">Find more resources for underrepresented students<\/a><\/li>\r\n<\/ul>\r\n\n<\/div>\n\r\n\r\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n \r\n<h2>Jobs for Ph.D. in Cybersecurity Graduates<\/h2>\r\n<p>While a bachelor's degree is often enough for entry-level positions in cybersecurity, some employers seek a master's degree. Cybersecurity graduates with a Ph.D. can qualify for advanced positions, including postsecondary teaching roles and researcher jobs. We explore several career possibilities below.<\/p>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Computer Information Researcher<\/h3>\r\n<p>Computer information researchers analyze data to create new technologies, detect computing problems, and develop solutions. Typical duties include conducting experiments, upgrading and improving current programs, and publishing research papers. These scientists often hold advanced credentials and command higher-than-average salaries.<\/p>\r\n<p><strong>Required Education: <\/strong>Master's degree<\/p>\r\n<p><strong>2021 Median Annual Salary:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener\">$131,490<\/a><\/p>\r\n<p><strong>Job Outlook (2021-31): <\/strong><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener\">+21%<\/a><\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Director of Information Security<\/h3>\r\n<p>The <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-director\/\">director of information security<\/a> is responsible for developing and implementing technology-based security measures in an organization. These professionals identify vulnerabilities and design strategies to combat security threats. The information security director handles both analytical and administrative responsibilities.<\/p>\r\n<p><strong>Required Education: <\/strong>Master's degree<\/p>\r\n<p><strong>February 2023 Average Annual Salary:<\/strong> <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Information_Security_Director\/Salary?loggedIn\" target=\"_blank\" rel=\"noopener\">$142,090<\/a><\/p>\r\n<p><strong>Job Outlook (2021-31): <\/strong>N\/A<\/p>\r\n<\/div>\r\n\r\n<div class=\"border-thick rounded-lg px-5 border-secondary-50 mb-4\">\r\n<h3>Professor of Cybersecurity<\/h3>\r\n<p>Professors specializing in cybersecurity may teach full time or part time at colleges and universities. Community college professors usually teach full time, while tenured professors also perform research and mentor graduate students.<\/p>\r\n<p><strong>Required Education: <\/strong>Doctorate<\/p>\r\n<p><strong>2021 Median Annual Salary:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/education-training-and-library\/postsecondary-teachers.htm\" target=\"_blank\" rel=\"noopener\">$79,640<\/a><\/p>\r\n<p><strong>Job Outlook (2021-31): <\/strong><a href=\"https:\/\/www.bls.gov\/ooh\/education-training-and-library\/postsecondary-teachers.htm\" target=\"_blank\" rel=\"noopener\">+12%<\/a><\/p>\r\n<\/div>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs-overview\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore more cybersecurity careers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/careers-for-vets\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find cybersecurity jobs for military and veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn about cybersecurity in the government sector<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"choosing-the-right-program\" id=\"choosing-the-right-program\"><\/a>\n\n \r\n<h2>Choosing the Right Doctorate in Cybersecurity Program<\/h2>\r\n<p>Our list of cybersecurity doctorates is a great place to begin the search for potential schools. Finding <a href=\"https:\/\/www.cyberdegrees.org\/resources\/degree-required-for-cybersecurity-career\/\">the right program<\/a> takes research. Below, we describe several key factors to consider when choosing a cybersecurity program.<\/p>\r\n\r\n<div class=\"bg-accent-light rounded-lg border-thin py-1 px-6 mb-6\">\r\n    <h3><strong>Accreditation<\/strong><\/h3>\r\n    \r\n    <p>Look for Ph.D. in cybersecurity programs offered at institutionally accredited schools. The accreditation process verifies that a school meets standards of academic excellence regarding curriculum, faculty, and university resources.<\/p>\r\n            \r\n    <hr>\r\n    <h3><strong>Acceptance Rates<\/strong><\/h3>\r\n    \r\n    <p>How hard is it to get into your desired cybersecurity program? Admission requirements and acceptance rates vary considerably.<\/p>\r\n            \r\n    <hr>\r\n    <h3><strong>Program Culture<\/strong><\/h3>\r\n    \r\n    <p>What type of doctoral program culture do you seek? Look for schools that create an inclusive, diverse atmosphere that welcomes students from all backgrounds. Some programs may be more focused on professionalizing than others, offering more resources to help learners find careers after graduation.<\/p>\r\n            \r\n    <hr>\r\n    <h3><strong>Program Prestige<\/strong><\/h3>\r\n    \r\n    <p>Decide how much influence program prestige has on your decision-making process. Some schools have strong reputations in the teaching and cybersecurity worlds, which may lead to improved job prospects from employers. However, these schools usually have more competitive acceptance rates. Other schools with less name recognition and higher acceptance rates also offer thorough curricula that prepare learners for careers in research and academia.<\/p>\r\n            \r\n    <hr>\r\n    <h3><strong>Cost<\/strong><\/h3>\r\n    \r\n    <p>How much will it cost to earn your Ph.D. in cybersecurity? Many doctoral programs offer tuition reductions to enrollees who work for the university as research or teaching assistants.<\/p>\r\n            \r\n\r\n<\/div>\r\n\r\n\r\n\r\n\r\n<h3>Should You Get Your Degree Online?<\/h3>\r\n<p>Because online coursework in cybersecurity Ph.D. programs typically offers more convenience and flexibility, these degrees may appeal to <a href=\"https:\/\/www.cyberdegrees.org\/resources\/transitioning-from-general-it\/\">working IT professionals<\/a> and learners with family obligations. Other students may also prefer the structure of these distance learning programs.<\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/listings\/doctorate-degrees-online\/\">Online graduate programs<\/a> are increasingly popular, and many employers recognize that these degrees offer the same rigorous education as their on-campus counterparts. Cybersecurity doctorates may be well-suited to the online learning environment because of the curricular emphasis on computing and technical skills.<\/p>\r\n<p>Whether an online degree is right for you depends on factors like your learning style, <a href=\"https:\/\/www.cyberdegrees.org\/resources\/the-big-list\/\">resources available for distance students<\/a>, and other time commitments in your life. Many schools offer hybrid programs, which combine online and in-person learning &mdash; an ideal compromise for some cybersecurity students.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/listings\/doctorate-degrees-online\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about online doctorates in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"doctoral-degrees-in-cyber\" id=\"doctoral-degrees-in-cyber\"><\/a>\n\n \r\n<h2><sonic-icon icon='academic-cap' type='solid' size='large' color='#12C7C4'><\/sonic-icon>10 Cybersecurity Doctoral Degree Programs<\/h2>\r\n<p>The following alphabetical list highlights ten schools in the U.S. that offer doctoral programs in computer science or cybersecurity. Please note this is not a ranking or a comprehensive list.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<div>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/degrees.apps.asu.edu\/masters-phd\/major\/ASU00\/ESCSEIAPHD\/computer-science-cybersecurity-phd\" target=\"_blank\" rel=\"noopener\">Arizona State University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.captechu.edu\/degrees-and-programs\/doctoral-degrees\/doctorate-in-cybersecurity\" target=\"_blank\" rel=\"noopener\">Capitol Technology University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/catalog.dsu.edu\/preview_program.php?catoid=36&amp;poid=2813\" target=\"_blank\" rel=\"noopener\">Dakota State University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/catalog.gmu.edu\/colleges-schools\/engineering-computing\/information-technology-phd\/\" target=\"_blank\" rel=\"noopener\">George Mason University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/isi.jhu.edu\/academics\/phd\/\" target=\"_blank\" rel=\"noopener\">Johns Hopkins University<\/a><\/p>\r\n<\/div>\r\n<div>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.ncu.edu\/programs-degrees\/technology\/cybersecurity-phd-tim\" target=\"_blank\" rel=\"noopener\">National University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/phd.northeastern.edu\/program\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Northeastern University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/computing.nova.edu\/doctoral\/dcm\/index.html\" target=\"_blank\" rel=\"noopener\">Nova Southeastern University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.stu.edu\/business\/programs\/dba-cyber-security-management\/\" target=\"_blank\" rel=\"noopener\">St. Thomas University<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/eas.uccs.edu\/cs\/academics\/graduate-programs\/phd-in-engineering-concentration-in-security\" target=\"_blank\" rel=\"noopener\">University of Colorado Colorado Springs<\/a><\/p>\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n\r\n<h3 class=\"text-center\">Expand your knowledge of cybersecurity<\/h3>\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1213479360-425x230-c-default.jpg\"\n        alt=\"Cybersecurity Certificate Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Certificate Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/certificate-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/shutterstock_696885817-425x230-c-default.jpg\"\n        alt=\"Guide to Cybersecurity Certifications\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Guide to Cybersecurity Certifications<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375208\/CyberDegrees.org\/Man-at-desk-on-laptop-typing_5776e384a\/Man-at-desk-on-laptop-typing_5776e384a.jpg?_i=AA\"\n        alt=\"Degrees in Information Systems Security\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Degrees in Information Systems Security<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-information-systems-security-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2021\/07\/CD_Listings_BachelorsCybersecurity_FTR-425x230-c-default.jpg\"\n        alt=\"Bachelor's in Cybersecurity Management and Policy\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Bachelor's in Cybersecurity Management and Policy<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-bachelors-security-management-degree\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>Questions About Doctoral Degrees in Cybersecurity<\/h2>\r\n\r\n<h3>What can you do with a Ph.D. in cybersecurity?<\/mark><\/h3>\r\n<p>A Ph.D. in cybersecurity prepares graduates for a variety of computing and IT career paths. Potential jobs include information security analyst, computer and information research scientist, professor, and IT security director.<\/p>\r\n\r\n<h3>How long does it take to get a Ph.D. in cybersecurity?<\/mark><\/h3>\r\n<p>The timeline to complete a Ph.D. in cybersecurity varies by program and individual. Depending on coursework requirements and how quickly the dissertation is finished, learners often graduate with their doctorate in 3-7 years.<\/p>\r\n\r\n<h3>Is a doctorate in cybersecurity worth it?<\/mark><\/h3>\r\n<p>Though completing a cybersecurity Ph.D. requires significant investments of time and money, the credential can qualify graduates for advanced roles in the field. Many of these jobs offer higher-than-average salaries: For example, computer and information systems managers earned a <a href=\"https:\/\/www.bls.gov\/ooh\/management\/computer-and-information-systems-managers.htm\" target=\"_blank\" rel=\"noopener\">median annual salary<\/a> of $159,010 in 2021.<\/p>\r\n\r\n<h3>Is earning a doctoral degree in cybersecurity hard?<\/mark><\/h3>\r\n<p>As with any graduate degree, earning a Ph.D. in cybersecurity poses challenges, including upper-level coursework and the dissertation process. With persistence, hard work, and support systems, students can complete their doctorate to help them qualify for advanced cybersecurity jobs.<\/p>","protected":false},"excerpt":{"rendered":"A doctorate in cybersecurity can open doors to advanced computer science roles. Find out more about cybersecurity Ph.D. programs, including prospective careers for graduates.","protected":false},"author":5,"featured_media":2160,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[28,29],"jobs-overview":[],"rankings":[],"class_list":["post-282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","degrees-in-person","degrees-online"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":8040,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/282\/revisions\/8040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2160"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=282"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=282"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=282"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=282"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}