General and Technology, PhD-CY

General and Technology Specialization

The Doctor of Philosophy in Cybersecurity (PhD-CY), General and Technology specialization degree builds on the core computing principles and cybersecurity best practices, frameworks, and models. The degree provides a broad overview, adding governance and strategic views to compliment forensic, software development cloud, and systems certification content. Students use firsthand experience, explore advanced topics, learn the latest and anticipated concepts, consider the evolution of risks and mitigation and advanced threat detection, and propose their own research. The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors.

 

Students will gain more depth in these areas:

  • Cyber Forensics
  • Cloud Computing
  • Secure Software Development
  • Governance, Compliance, and Privacy
  • Systems Certification and Accreditation
Course information
  Credit Hours Courses Est. Time to Complete  
PhD-CY 60 20 40 - 44 months View Course Catalog
*Credit hours and courses reflect new students meeting credit requirements and utilizing no transfer credits. Est. Time of Completion reflects new students following the preferred schedule designed by the Dean for the program.

Unmatched Flexibility
NCU offers weekly course starts, no scheduled lecture hours, no group assignments, weekly assignments, and the ability to schedule courses around your personal and professional obligations.

100% Doctoral Faculty
No matter the degree level you pursue, you can rest assured that you will be mentored by doctors in your field of study. 

One-to-One Engagement
You won't have to fight for face time as one of many within a classroom. At NCU, you'll have the opportunity to interact one-to-one with your professor, receiving personalized mentoring.

Learning Outcomes

  • Advance theory and practical applications of cybersecurity
  • Formulate cybersecurity governance, policy, risk, and compliance
  • Devise strategic thought leadership for challenges in cybersecurity architecture and operations
  • Assess internal and external threats and vulnerabilities to reduce organizational cyber risk
  • Evaluate tools, data, and processes to enhance protection and foster resilience
  • Facilitate the protection of critical information resources from current and future loss
  • Extend technical capabilities to create new knowledge in important areas
  • Improve the ability to gain leadership support, resources, and adoption of needed improvements