Doctor of Computer Science

Information Assurance

As enterprise information systems in organizations grow increasingly more complex, the need for management professionals qualified to take the lead in evaluating, analyzing and solving problems pertaining to Information Assurance is vital. CTU’s Doctor of Computer Science - Information Assurance degree program is designed to help you develop the theoretical, research and applications capabilities needed to manage and forecast future issues and developments in this field. It will challenge you to demonstrate expertise in a sub-discipline of Information Assurance by selecting and conducting research on an important problem, then communicating your results and preparing them for publication.

National Center of Academic Excellence in Information Assurance/Cybersecurity 2014-2021*

  •  Classes start October 04, 2015

  • Checkmark iconTotal Credits96

  • Program Availability

Program Details
  • Overview
  • Courses
  • Related Degrees
  • Tuition
  • Career Paths

The Doctor of Computer Science – Information Assurance program at Colorado Technical University is designed to develop leaders in managing enterprise information systems with an emphasis on information assurance.

Outcomes:

  • The program prepares the graduates to be knowledgeable consultants, academics, or professionals in their areas of expertise.
  • The program prepares the graduates to be thought leaders in their field in academia or industry.
  • The program prepares the graduates to be scholars who are able to contribute to the body of knowledge.

Each of the three years of the DCS program is designed to provide candidates with theoretical, research, and application capabilities in the field. The organization of each year is described below.

Year 1: Foundations
Year one focuses on computer science and information systems topics and an orientation to research and writing at the doctoral level. Coursework covers current topics in the disciplines as well as research methods and qualitative techniques. The research component results in a broad overview of the student’s area of concentration in order to put the research into context and inform the student’s selection of a research topic.

Year 2: Acquisition of Knowledge
Once the foundations are in place, year two is where each student develops an in-depth understanding of the knowledge and research methods in his or her chosen area of study. While most of the effort in year two is on developing a richer understanding of the discipline, the research courses include quantitative methods and the dissertation process.

Year 3: Leadership and Professional Advancement
Coursework in the final year of the program includes the two remaining concentration courses plus the final six doctoral research courses that enable one to complete the research and dissertation.

The program thus includes fifteen instructional courses, plus nine doctoral research courses. Each class is conducted online.

Symposium
Doctoral programs at Colorado Technical University require a residential symposium. Additional information about CTU's doctoral symposium can be viewed in the Doctoral Symposium section of this catalog.

Graduation Requirements
In addition to the successful completion of the above 96 credits with an acceptable GPA, students must also satisfactorily complete and defend their research proposal and final dissertation. The research proposal must be approved by the student's committee, consisting of a mentor and two readers. The dissertation is an extensive document that incorporates the literature review, a major study, and a proposal for further investigation. The dissertation must be approved by the student's committee.

Degree Completion and Post Doctoral Study
The student must be continuously enrolled until all graduation requirements are fulfilled. A student who has not completed the research requirements by the end of the formal coursework continues by registering for RES893 Research Continuation according to CTU’s re-take policy.

The Doctoral Advantage
While a relevant master’s degree is ordinarily required for admission to CTU doctoral programs, there is also the option of completing a CTU MSCS, MSIT, MSM-ISS, MSM-IT/PM, or MSSE degree while starting work on the Doctor of Computer Science degree. The program outcomes remain the same for the DCS and the master’s degrees under this option, but the normal completion time for the degrees in the combined program is reduced. Through this program, doctoral work is started after ten of the twelve required master’s courses have been successfully completed. Program plans must be approved by the Dean of Doctoral Computer Science.

Degree Requirements

Courses: Core
CS814 Current Topics in Computer Science and Information Systems

4

CS861 Information Assurance

4

CS875 Futuring and Innovation

4

CS880 Foundations of Digital Systems Security

4

CS884 Enterprise Security Architecture

4

EIS846 Enterprise Tools, Concepts and Processes

4

EIS852 Governance, Quality, Compliance and Ethics

4

EIS854 Security Management

4

RES804 Principles of Research Methods and Design

4

RES812 Qualitative Research Methods

4

RES814 Quantitative Research Methods

4

RES860 Doctoral Research I: Principles of Research and Writing

4

RES861 Doctoral Research II: Annotated Bibliography

4

RES862 Dissertation Research Process

4

RES863 Doctoral Research III: Dissertation Literature Review

4

RES864 Doctoral Research IV: Dissertation Methods

4

RES865 Doctoral Research V: Dissertation Introduction

4

RES866 Doctoral Research VI: Dissertation Findings

4

RES867 Doctoral Research VII: Dissertation Discussion and Conclusion

4

RES868 Doctoral Research VIII: Dissertation Conclusion

4

Electives Select four 4- credit courses from 800-level CS or EM or EIS courses

16

TOTAL CREDIT HOURS: 96
Electives: DCS students must complete four 4-credit courses for these electives. These courses may be selected from any of those offered under DCS. One of those electives may be chosen from the Doctor of Management program instead.

CS814 Current Topics in Computer Science and Information Systems

This course provides an overview and introduction to the breadth of research in the disciplines of computer science and information systems. As such, its content will evolve over time and is expected to cover research developments at the leading edge of these disciplines.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

CS861 Information Assurance

This course presents techniques and methods for building a strategic security plan for an enterprise. This includes identifying potential risk assessment strategies and identifying the approach to standards adoption, to align with business goals. Enterprise security policy creation and implementation are also included in the student’s planning effort, as well as the Operations and Monitoring approach. Finally, students will provide and audit an assessment plan, which includes taking compliance issues into consideration. All of this security planning has the goal of bringing IT Security controls into alignment with business goals.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

CS875 Futuring and Innovation

Develops the skills in futuring through a variety of techniques. Introduces formal methods of innovation and diffusion of innovation.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

CS880 Foundations of Digital Systems Security

This course explores the fundamental topics in digital systems security. Classical access control models and policies for a secure environment are analyzed. Current cryptographic algorithms are studied as means to ensure data confidentiality and integrity and for authentication. Techniques for secure software design, implementation and maintenance are discussed. Information assurance is examined as applied to the corporate environment. Malware attacks are examined and vulnerability analysis and risk assessment are discussed. Enterprise-level digital forensics is briefly discussed.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

CS884 Enterprise Security Architecture

This course examines enterprise-level security architecture and its relationship to physical security. Security as related to service-oriented architecture (SOA), software-as-a-service (SaaS), business-to-business architectures, cloud computing and virtualization is covered. Topics include security infrastructure, policy and procedures, assessment, baselining and auditing. Secure communications, defense in depth, multiple security zones, multi-level security, cross-domain solutions and the unique challenges of advanced architectures are discussed. Compliance with national and international laws and regulations is covered as well as certification and accreditation requirements. Special emphasis is paid to the interrelationship of the security strategic plan with the business strategic plan and the strategic plans of other corporate functional units.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

EIS846 Enterprise Tools, Concepts and Processes

This course examines enterprise tools and realization technologies for enterprise computing, including ontologies and semantic web support; middleware standards and systems such as CORBA and J2EE; modeling and description languages such as XML, RDF, OWL, and UML. In addition, Enterprise computing concepts for specific domains such as electronic and mobile commerce, vertical domains such as finance, telecommunications, automotive, aerospace, command and control, defense, healthcare, and government are reviewed. Business process and workflow modeling, analysis, integration, monitoring, and management are also examined in view of the enterprise.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

EIS852 Governance, Quality, Compliance and Ethics

This course presents an overview of the major structures, such as the Sarbanes-Oxley regulations and their impact on the enterprise. The course also explores governance and ethics relative to policies and control within the enterprise. In addition, topics such as trust, security, and privacy issues in enterprise computing and quality assurance issues in enterprise computing are closely examined.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

EIS854 Security Management

This course focuses the student on a broad range of topics relative to managing security at the enterprise level. The intent is focusing on creating a security management framework, so that organizations can build up and sustain security for their enterprise. This approach integrates policies, best practices, guidelines, procedures, and regulations while incorporating a broad range of security topics. This broad outlook covers not only security but also any other risks to an organization’s core business relative to people, processes, data, facilities, and technology. This course examines external and internal security threats, failed systems development and system processes, employee mistakes and their respective risk mitigation.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES804 Principles of Research Methods and Design

This course provides a general understanding of both quantitative and qualitative methods within the context of research designs. Research design is the plan for the selection and application of accepted research practices. Research methods provide models for the appropriate collection, organization and analysis of data for decision-making, replication, and contribution to a knowledge base. Additionally, this course supports doctoral students’ abilities to demonstrate an understanding of the research purpose, nature and forms of research design and their relationship to research questions, methods for data collection and data analyses.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES812 Qualitative Research Methods

This course examines the fundamental principles of qualitative inquiry differentiating among various qualitative research designs. Includes active engagement and practice with capturing qualitative data including being a participant observer and an interviewer. Students will learn how to minimize threats to the internal validity of qualitative studies, focusing on specific techniques for interpretation of data that contributes to the authenticity of qualitative studies.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES814 Quantitative Research Methods

Students will learn fundamental concepts of designing, collecting and assessing quantitative data. The course covers descriptive measures as well as various forms of probability and inferential analysis. Exploration of multivariate statistics will be practiced via large datasets using statistical analysis software.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES860 Doctoral Research I: Principles of Research and Writing

RES860 is the first course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course: clarifies the research focus, defines the research question(s)/objective/hypotheses, and produces a written document that shows adequate progress toward completion of dissertation research.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES861 Doctoral Research II: Annotated Bibliography

RES861 is the second course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course: clarifies the research focus, defines the research question(s)/objective/hypotheses, and produces a written document that shows adequate progress toward completion of dissertation research.

Prerequisites

RES860

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES862 Dissertation Research Process

This course presents doctoral students to the dissertation research process and applies relevant integrative understanding of complementary disciplines. It examines in depth the research process and introduces doctoral candidates to the various aspects of conducting valid research. Topics in this course include: hypothesis formulization, designing a literature review, conniving data collection techniques, ethical issues in research, and dissertation research design.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES863 Doctoral Research III: Dissertation Literature Review

RES863 is the third course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course: clarifies the research focus, defines the research question(s)/objective/hypotheses, produces a review of the literature.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES864 Doctoral Research IV: Dissertation Methods

RES864 is the fourth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires: fine tuning the research question(s)/objective/hypotheses, strengthening the review of the literature, drafting a methods chapter (min), and drafting a chapter one. Students may surpass this description as they are able.

Prerequisites

None

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES865 Doctoral Research V: Dissertation Introduction

RES865 is the fifth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: producing a defense-ready draft of Chapters 1, 2 & 3 (the research proposal), undertaking the Proposal Defense, undertaking modifications required by the dissertation committee, achieving an approved IRB application.

Prerequisites

RES864

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES866 Doctoral Research VI: Dissertation Findings

RES866 is the sixth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: undertaking the Proposal Defense, undertaking modifications required by the dissertation committee, achieving an approved IRB application, proceeding with Data Collection and Analysis.

Prerequisites

RES865

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES867 Doctoral Research VII: Dissertation Discussion and Conclusion

RES867 is the seventh course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: proceeding with Data Collection and Analysis, working on initial drafting of chapters 4 & 5, and preparing for Final Defense. Course is pass/fail.

Prerequisites

RES866

Corequisites

None

Credits

4

Distribution

Computer Science
×

RES868 Doctoral Research VIII: Dissertation Conclusion

RES868 is the eighth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: completing Data Collection and Analysis as needed, completing work on chapters 4 &5, undertaking the Final Defense, modifying document as required by the committee, editing of final document for publishing, and University sign off. Course is pass/fail.

Prerequisites

RES867

Corequisites

None

Credits

4

Distribution

Computer Science
×

Information Assurance is just one of the industry-relevant concentrations CTU offers in the Doctor of Computer Science degree program. Choose the option below that best supports your educational goals.

$57,408 Tuition

$4,000 Symposium Fee*
$200 Graduation Fee

We understand that paying for your education is an investment in your future. Visit our tuition resources page for links to full tuition, books and fees.

Cost of this degree may be reduced based on one or more of the following:

*A $1,000 non-refundable fee is charged to a student’s account each quarter in which a student is registered for symposium (attendance at four symposia are required as part of the degree). This fee covers administrative costs such as conference rooms, AV equipment, academic event materials and supplies that are associated with the symposium event. Please see the Doctoral Symposium section of the catalog for more information.
**Financial aid available for those who qualify

CTU's Doctor of Computer Science degree builds on the foundation of a master’s degree to prepare students for senior level leadership, consulting, and teaching positions within business, government, nonprofit organizations, and higher education. CTU doctoral students are educated to discover new solutions to unsolved problems in a range of fields. Students develop analytic and research skills to define problems, study advanced content knowledge to discover innovative solutions, and practice consulting and leadership techniques to facilitate innovative change in organizations, communities, and society. Using these skills, graduates may find opportunities as leaders within nonprofit organizations and businesses, as consultants, or as faculty within higher education.

Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission

Request Information

Fill out this brief form and an admissions advisor will contact you within the next day.

This information will be used to contact you through various means, which may include: phone, text messaging, and email, about the programs and services that are offered.

Thank you!

Degree Finder

 
 

Gainful Employment and Other Student Disclosures

Below you can find placement rates and other information tailored to your chosen campus and program. Certain disclosures are published on this website to assist students in understanding the facts about their programs.

Program Disclosure Information for:
-- Select Campus above --

 

Employment Rates:

Select a campus for rate information.

 

- Graduation Rate

Select a campus for rate information.

Learn More 

Need help choosing the right degree program?

Request Information Chat Now
*CTU has been designated as a National Center of Academic Excellence in Information Assurance/Cybersecurity for academic years 2014-2021 for its cybersecurity and information assurance programs
Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×