Online Doctorate in Cybersecurity
Doctor of Computer Science - Cybersecurity and Information Assurance
A key to staying one step ahead of cybercriminals may be a constant and vigilant monitoring of your systems and network. You could grow your expertise in managing enterprise systems through an understanding of Sarbanes-Oxley regulations, trust and privacy best practices, and enterprise tools such as CORBA and J2EE, XML, RDF, OWL, and UML with a Doctor of Computer Science degree in Cybersecurity and Information Assurance from CTU.
Our doctoral program includes:
- An online curriculum with a residency component
- Multiple start dates throughout the year
- An opportunity to complete the program in three years
- Dissertation development integrated into the program
- In-person symposium experiences
At CTU, students come first. Our flexible online course schedule helps you to build a class schedule around your schedule. And with grants and scholarships available for those who qualify, a degree from CTU can be both achievable and affordable. Learn more below or fill out the form to speak with an admissions advisor.
Relevant Institutional/Programmatic Accreditation
CTU is institutionally accredited by the Higher Learning Commission www.hlcommission.org
- April 04, 2023
- May 09, 2023
- June 13, 2023
Estimate Tuition and Grad Date
Total tuition for this degree program will vary depending on your educational needs, existing experience, and other factors.Estimate your costs, potential savings and graduation date
Course Title Course Description Credit Hours CS814
This course provides an overview and introduction to the breadth of research in the disciplines of computer science and information systems. As such, its content will evolve over time and is expected to cover research developments at the leading edge of these disciplines.
Current Topics in Computer Science and Information Systems 4 CS861
This course presents techniques and methods for building a strategic security plan for an enterprise. This includes identifying potential risk assessment strategies and identifying the approach to standards adoption, to align with business goals. Enterprise security policy creation and implementation are also included in the student’s planning effort, as well as the Operations and Monitoring approach. Finally, students will provide and audit an assessment plan, which includes taking compliance issues into consideration. All of this security planning has the goal of bringing IT Security controls into alignment with business goals.
Information Assurance 4 CS875
Develops the skills in futuring through a variety of techniques. Introduces formal methods of innovation and diffusion of innovation.
Futuring and Innovation 4 CS880
This course explores the fundamental topics in digital systems security. Classical access control models and policies for a secure environment are analyzed. Current cryptographic algorithms are studied as means to ensure data confidentiality and integrity and for authentication. Techniques for secure software design, implementation and maintenance are discussed. Information assurance is examined as applied to the corporate environment. Malware attacks are examined and vulnerability analysis and risk assessment are discussed. Enterprise-level digital forensics is briefly discussed.
Foundations of Digital Systems Security 4 CS884
This course examines enterprise-level security architecture and its relationship to physical security. Security as related to service-oriented architecture (SOA), software-as-a-service (SaaS), business-to-business architectures, cloud computing and virtualization is covered. Topics include security infrastructure, policy and procedures, assessment, baselining and auditing. Secure communications, defense in depth, multiple security zones, multi-level security, cross-domain solutions and the unique challenges of advanced architectures are discussed. Compliance with national and international laws and regulations is covered as well as certification and accreditation requirements. Special emphasis is paid to the interrelationship of the security strategic plan with the business strategic plan and the strategic plans of other corporate functional units.
Enterprise Security Architecture 4 EIS846
This course examines enterprise tools and realization technologies for enterprise computing, including ontologies and semantic web support; middleware standards and systems such as CORBA and J2EE; modeling and description languages such as XML, RDF, OWL, and UML. In addition, Enterprise computing concepts for specific domains such as electronic and mobile commerce, vertical domains such as finance, telecommunications, automotive, aerospace, command and control, defense, healthcare, and government are reviewed. Business process and workflow modeling, analysis, integration, monitoring, and management are also examined in view of the enterprise.
Enterprise Tools, Concepts and Processes 4 EIS852
This course presents an overview of the major structures, such as the Sarbanes-Oxley regulations and their impact on the enterprise. The course also explores governance and ethics relative to policies and control within the enterprise. In addition, topics such as trust, security, and privacy issues in enterprise computing and quality assurance issues in enterprise computing are closely examined.
Governance, Quality, Compliance and Ethics 4 EIS854
This course focuses the student on a broad range of topics relative to managing security at the enterprise level. The intent is focusing on creating a security management framework, so that organizations can build up and sustain security for their enterprise. This approach integrates policies, best practices, guidelines, procedures, and regulations while incorporating a broad range of security topics. This broad outlook covers not only security but also any other risks to an organization’s core business relative to people, processes, data, facilities, and technology. This course examines external and internal security threats, failed systems development and system processes, employee mistakes and their respective risk mitigation.
Security Management 4 RES804
This course provides a general understanding of both quantitative and qualitative methods within the context of research designs. Research design is the plan for the selection and application of accepted research practices. Research methods provide models for the appropriate collection, organization and analysis of data for decision-making, replication, and contribution to a knowledge base. Additionally, this course supports doctoral students’ abilities to demonstrate an understanding of the research purpose, nature and forms of research design and their relationship to research questions, methods for data collection and data analyses.
Principles of Research Methods and Design 4 RES812
This course examines the fundamental principles of qualitative inquiry differentiating among various qualitative research designs. Includes active engagement and practice with capturing qualitative data including being a participant observer and an interviewer. Students will learn how to minimize threats to the internal validity of qualitative studies, focusing on specific techniques for interpretation of data that contributes to the authenticity of qualitative studies.
Qualitative Research Methods 4 RES814
Students will learn fundamental concepts of designing, collecting and assessing quantitative data. The course covers descriptive measures as well as various forms of probability and inferential analysis. Exploration of multivariate statistics will be practiced via large datasets using statistical analysis software.
Quantitative Research Methods 4 RES863
RES863 is the third course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course: clarifies the research focus, defines the research question(s)/objective/hypotheses, produces a review of the literature.
Doctoral Research III: Dissertation Literature Review 4 RES864
RES864 is the fourth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires: fine tuning the research question(s)/objective/hypotheses, strengthening the review of the literature, drafting a methods chapter (min), and drafting a chapter one. Students may surpass this description as they are able.
Doctoral Research IV: Dissertation Methods 4 RES865
RES865 is the fifth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: producing a defense-ready draft of Chapters 1, 2 & 3 (the research proposal), undertaking the Proposal Defense, undertaking modifications required by the dissertation committee, achieving an approved IRB application.
Doctoral Research V: Dissertation Introduction 4 RES866
RES866 is the sixth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: undertaking the Proposal Defense, undertaking modifications required by the dissertation committee, achieving an approved IRB application, proceeding with Data Collection and Analysis.
Doctoral Research VI: Dissertation Findings 4 RES867
RES867 is the seventh course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: proceeding with Data Collection and Analysis, working on initial drafting of chapters 4 & 5, and preparing for Final Defense. Course is pass/fail.
Doctoral Research VII: Dissertation Discussion and Conclusion 4 RES868
RES868 is the eighth course of eight research and writing courses that result in a dissertation. Each term, the student progresses toward the completion of the dissertation by completing required elements of the dissertation process. This course requires the student to focus on: completing Data Collection and Analysis as needed, completing work on chapters 4 &5, undertaking the Final Defense, modifying document as required by the committee, editing of final document for publishing, and University sign off. Course is pass/fail.
Doctoral Research VIII: Dissertation Conclusion 4 RSCH860The course is designed to help students develop as scholar‐practitioners through research and writing activities required for the dissertation. Students will be introduced to doctoral level evidence‐based research and writing skills, critical thinking, ethics in research, and the development of an annotated bibliography. Doctoral Research I: Principles of Research and Writing 4 RSCH861This is the first of the research and writing courses that together comprise the dissertation process. Each term, the student advances on the dissertation pathway by completing required components of the dissertation. The focus of this course is on the development of the research prospectus, which is the first official milestone in the dissertation process. Satisfactory completion of the research prospectus is required to move forward to the next step on the dissertation pathway. Students are also encouraged to begin work on next steps in the dissertation process as appropriate. Dissertation Process I 4 RSCH862This course focuses on development of a literature review in the context of a dissertation topic aligned with the student's degree field, concentration, and personal interests; is consistent with the study trio; and is both scholarship‐based and practice‐oriented. As part of developing the literature review, the course also addresses creation of the conceptual framework and consideration of the research tradition appropriate for the proposed topic. To pass this course the student must produce a literature review draft satisfactory for movement forward to the next course in the dissertation process sequence. Students are also encouraged to begin work on next steps in the dissertation process as appropriate. Dissertation Process II 4 Select four 4- credit courses from 800-level CS or EM or EIS courses 16 SYMP801Doctoral Symposium I provides first-year doctoral students with activities designed to develop foundational skills for doctoral study and an orientation to the doctoral dissertation process. Students participate in both the Doctoral Symposium and online classroom activities in the second term of their first year of study.
Course work is designed to help students prepare to progress through the next year of the doctoral program. Successful completion of all specified activities and requirements of the Doctoral Symposium and assigned deliverables are required to pass this course.
Doctoral Symposium I 2 SYMP802Doctoral Symposium II provides second or third year doctoral students with activities that help them prepare for completion of the dissertation. Students participate in both the Doctoral Symposium and online course work. The course is designed to prepare students to attend Symposium and to progress to completion of the dissertation. Successful completion of all specified activities and requirements of the Doctoral Symposium and assigned deliverables are required to pass this course. Doctoral Symposium II 2
Total Credit Hours: 100
Compare Related Areas of Study
Compare up to three additional degrees
Ways to Save
Program Areas of Focus
The DCS program is designed to provide candidates with theoretical, research, and application capabilities in the field. The areas of focus are described below.
The program provides a focus on computer science and information systems topics and an orientation to research and writing at the doctoral level. Coursework covers current topics in the disciplines as well as research methods and qualitative techniques. The research component results in a broad overview of the student’s area of concentration in order to put the research into context and inform the student’s selection of a research topic.
Acquisition of Knowledge
Once the foundations are in place, the focus is on student development of an in-depth understanding of the knowledge and research methods in his or her chosen area of study. While the focus is on developing a richer understanding of the discipline, the research courses include quantitative methods and the dissertation process.
Leadership and Professional Advancement
The program includes the two remaining concentration courses plus the final six doctoral research courses that are designed to help students to complete the research and dissertation.
Doctoral programs at Colorado Technical University require a residential symposium. Additional information about CTU's doctoral symposium can be viewed in the Doctoral Symposium section of this catalog.
In addition to the successful completion of the above 100 credits with an acceptable GPA, students must also satisfactorily complete their research proposal and final dissertation. The research proposal must be approved by the student’s Research Supervisor and University Reviewer. The dissertation, which must be approved by the student’s dissertation committee, is an extensive document that includes the research study. In addition, graduation requires presentation of the final dissertation.
Cost of this degree may be reduced based on one or more of the following:
- Active duty military status
- Number of credits transferred and accepted from other institutions
- Eligibility for a Corporate Alliances Grant (check with your CTU Admissions Advisor)
- Tuition Reimbursement (talk to your HR Manager)
- Grants or scholarships at CTU
Where do I go from here?
Choosing to continue your education with is a big decision and we're here to help. Choose one of the options below to get started.
Start the conversation
Submit your details and speak to an admissions advisor within the next day:Request Information
Chat or call an Admissions Advisor today.1-855-230-0555
Program details are provided lower on the page.
Classes start April 4, 2023 *
*Start dates may vary by program and location.
CTU’s Doctor of Computer Science (DCS) with a concentration in Cybersecurity and Information Assurance Degree Program is designed to provide candidates with theoretical, research, and application capabilities in the field. The program’s coursework provides a focus on computer science and information systems topics including those related to cybersecurity and information assurance, as well as an orientation to research and writing at the doctoral level. Coursework may cover current topics in the disciplines as well as various types of research methods.
As you work to complete your DCS with a concentration in Cybersecurity and Information Assurance, you will be immersed in courses where you will study these topics and much more: the fundamental topics in digital systems security; managing security at the enterprise level; and trust, security, and privacy issues in enterprise computing and quality assurance issues in enterprise computing.
Courses for the DCS with a concentration in Cybersecurity and Information Assurance degree program start online approximately every five weeks. Completion of the CTU admissions process will depend on how quickly you complete the steps in the CTU online application process. You may complete the application process over the phone with an advisor or you may go online. Once you’ve completed the online application, you may hear from an advisor within the following 24 hours to discuss the next steps toward starting your degree program. Master’s programs may have additional entrance requirements that take additional processing time.
The DCS with a concentration in Cybersecurity and Information Assurance degree program consists of 100 credits. You may be eligible for transfer credit, which is evaluated on an individual basis.
As you study topics in computer science and cybersecurity that are always being evaluated and updated to reflect industry-relevant trends, you will experience a curriculum through classroom learning and hands-on experience that aligns to industry standards and helps develop skills that are applicable to the needs of the digital economy.
In addition to the successful completion of the program’s 100 credits with an acceptable GPA, students must also satisfactorily complete their research proposal and final dissertation. The research proposal must be approved by the student’s research supervisor and university reviewer. The dissertation, which must be approved by the student’s dissertation committee, is an extensive document that includes the research study. Graduation also requires students’ presentation of the final dissertation.