Doctor of Computer Science - Information Assurance

As enterprise information systems in organizations grow increasingly more complex, the need for management professionals qualified to take the lead in evaluating, analyzing and solving problems pertaining to Information Assurance is vital. CTU’s Doctor of Computer Science - Information Assurance degree program is designed to help you develop the theoretical, research and applications capabilities needed to manage and forecast future issues and developments in this field. It will challenge you to demonstrate expertise in a sub-discipline of Information Assurance by selecting and conducting research on an important problem, then communicating your results and preparing them for publication.

Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission

  • Classes start in 4 Weeks

  • Checkmark icon Total Credits  96

This program is available at the following campuses and/or online: Online

Program Details

Concentrations
Career Paths
Curriculum
Graduation Requirements
  • Concentrations

    Information Assurance is just one of the industry-relevant concentrations CTU offers in the Doctor of Computer Science degree program. Choose the option below that best supports your educational goals.

    Headset icon Contact an Admissions Advisor for additional concentration information
  • Career Paths

    CTU's Doctor of Computer Science degree builds on the foundation of a master’s degree to prepare students for senior level leadership, consulting, and teaching positions within business, government, nonprofit organizations, and higher education. CTU doctoral students are educated to discover new solutions to unsolved problems in a range of fields. Students develop analytic and research skills to define problems, study advanced content knowledge to discover innovative solutions, and practice consulting and leadership techniques to facilitate innovative change in organizations, communities, and society. Using these skills, graduates may find opportunities as leaders within nonprofit organizations and businesses, as consultants, or as faculty within higher education.

    Headset icon Request more information now
  • Curriculum

    The following courses are specific to the Information Assurance concentration. To view courses that must be completed for all Doctor of Computer Science degrees, visit the Doctor of Computer Science overview page.

    • Foundations of Digital-Systems Security
    • Enterprise Security Architecture
    • Security Management
    • Enterprise Tools, Concepts and Processes
    • Governance, Quality, Compliance and Ethics
    • Enterprise Change, Innovation and Future 

    Doctorate degree program courses are taught in an executive format, combining an active online component with an intensive residential symposium lasting two and a half days with an additional orientation day the first quarter. Students are required to attend two of these quarterly symposia each year. The program also includes twelve 5-credit instructional courses, taken one per quarter for three years, plus a research-and-writing class taken each quarter.

    Students are required to attend an intensive two and a half day residential symposium twice annually. The symposia are scheduled four times throughout the year and doctoral students are welcome to attend all four symposia available. First term doctoral students will have an additional required CTU student orientation the day prior to the residential symposium for returning students.

    Headset icon Contact an Admissions Advisor for additional curriculum information Pages icon View the complete Course Catalog for all required courses
  • Graduation Requirements

    In addition to the successful completion of all 96 credits with an acceptable GPA, students must also satisfactorily complete and defend their research proposal and final dissertation. These documents must be approved by the student’s committee, consisting of a mentor and two readers.

    Each of the three years of the DCS-IA program is designed to provide candidates with the theoretical, research, and applications capabilities necessary in the field of information assurance. The organization of each year is described below.

    Year 1: Foundations

    Year one focuses on computer science and software engineering topics and an orientation to research and writing at the doctoral level. Coursework covers current topics in computer science and software engineering, requirements engineering, project management and process engineering, and research methods. Considerations of digital systems security are covered in each of these courses. The research and writing component results in a broad overview of current research in digital systems security and inform the student’s selection of a research topic. Students prepare research proposals and begin their research.

    Year 2: Acquisition of Knowledge

    With the foundations in place, each student develops an in-depth understanding of the knowledge areas and research methods in information assurance. Coursework covers information assurance, security foundations, and enterprise security architecture. The research and writing courses further develop each student’s research

    Year 3: Leadership and Professional Advancement

    Coursework in the final year of the program includes Futuring and Innovation, Virtual World Simulation, Web Science and Technology, and Virtual and Cloud Computing Architectures. The research component of the program results in documentation of the student’s applied research in either a final dissertation.

    Headset icon Contact an Admissions Advisor for additional information Pages icon View the complete Course Catalog for all required courses

Select a Location
Learn more about program costs, median debt, student outcomes and related occupations by selecting a location or Online from the dropdown below.

Student Disclosures


Program Costs

Q:
How much will this program cost me?
A:

  • $-Tuition & Fees
  • $-Books & Supplies
  • $-Room & Board

 

 

Tuition pricing is subject to change and can vary by location and program structure.

 

Learn More 

 

Financing

Q:
What are my financing options to pay for this program?
A:

In addition to any grant or scholarship aid for which students might be eligible, students may use loans to finance their education. The median loan debt for graduates of this program is as follows:

  • $-Federal
  • $-Private
  • $-Institutional

 

 

The amounts shown above represent the median debt incurred by students of the given Institution who completed the program between - and -.

 

Learn More 

 

Success

Q:
How long will it take me to complete this program?
A:

This program could take - months to complete.

-% of the students graduating from this program completed in the designed timeframe.

Q:
What job opportunities exist for students in this area of study?
A:
-

The occupation(s) listed here are derived from the Occupational Information Network (O*Net), which is developed under the sponsorship of the U.S. Department of Labor / Employment and Training Administration.

The specific program does not necessarily prepare students for, and graduates do not typically find employment in, all listed occupations. We cannot guarantee employment or salary.

Learn More 

For additional information on program costs and available financial aid options, visit the Net Price Calculator

 

- Graduation Rate

Select a campus for rate information.

Learn More 

 

Employment Rates:

Select a campus for rate information.

Need help choosing the right degree program?

Request Information Chat Now
Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×