Computer and Information Security

Doctor of Philosophy in Business Administration
  • Overview
  • Course Information
  • Tuition
  • Benefits

The Computer and Information Security PhD specialization responds to the demand for computer security professionals trained in cyber-terrorism, computer forensics and computer security. You will explore best practices for forensic investigations and evidence handling, federal and state privacy, intellectual property, search and seizure process and cyber-crime laws, while studying current techniques in data preservation, identification and extraction, and perform forensic analysis of systems using popular examination tool kits. With a PhD in Computer and Information Security you gain the skills and knowledge to serve as a researcher or business leader for security initiatives or to work in academia.

General Degree Requirements

Admission to a doctoral program at NCU requires a master's degree from an accredited institution.

The PhD program may be completed in 60 credits. Up to an additional 15 credit hours will be allowed as needed to complete dissertation research. The University may accept a maximum of 12 semester credit hours in transfer toward the doctoral degree for graduate coursework completed at an accredited college or university with a grade of "B" or better.

Completion Period for Doctoral Degrees

Northcentral University allows 7 years to complete all doctoral programs of 60 credits or less. Normal time to complete varies depending upon course take rate and credits transferred.

Foundational Competencies for DBA Programs

  • Graduate-Level Research Methods Competency - PhD students are required to complete BTM8102, BTM8103, BTM8104, BTM8106, BTM8107, BTM8108 and BTM8109 at Northcentral.
  • Graduate-Level Statistics Competency - PhD students are required to complete BTM8107 Statistics II at Northcentral.
  • Computer Competency - Doctoral students are required to have computer skills necessary for completing a dissertation. Students must be able to prepare documents using advanced word processing skills (e.g., creation of tables and figures, headers and footers, page breaks, tables of contents, hanging indents). Students must use computer programs for the statistical analysis of data (e.g., SAS). Students must produce a computer-based presentation (e.g., PowerPoint) for their dissertation oral defense.

See below for specialization courses specific to this program. To learn more, fill out the request information form below or view the course catalog.

Course Code


Course Description


Organizations Corporate Computer and Network Security

This course will introduce the Doctoral student to critical security concepts that organizational executives need to understand. It will examine vulnerabilities such as sabotage, financial fraud, electronic attacks, blended attacks, and other malicious activity that must be understood, with policy being developed to minimize these attacks. In addition, this course will give students the opportunity to review countermeasures, such as access controls and biometrics, and finally to develop a security plan to protect the organization.


Cyber Forensics

In this doctoral level course, Learners will be introduced to the field of advanced cyber forensics. Learners will have the opportunity to review various tools, techniques and steps needed for a successful forensic investigation. In addition, Learners will examine various legal regulations that impact the collection of data, the importance of federal rules of evidence, and the critical requirement of evidence admissibility in a court of law.


Foundations of Systems Certification and Accreditation

This course examines the guidelines for understanding, building and evaluating a successful organizational certification and accreditation program. This course examines several aspects of the certification and accreditation processes which include the necessary phases, system security plans, risk assessment, security procedures, certification testing, and documentation of accreditation decisions. The coordination of security for interconnected systems will also be examined to assist in applying best practices in the system certification and accreditation processes.


Critical Infrastructure Protection, Information Warfare, and Cyber Terrorism

This course will examine critical infrastructure protection of Information warfare and its impacts and in the evolving U.S. policy response to attacks. Analyze Cyber terrorism which is an emerging new mode of information warfare underscoring the perpetrators' deliberate exploitation of civilian and military systems' inherent vulnerabilities, thereby affecting national and global security.


Foundations of Computer Network Auditing

This Doctoral level course will enable students to analyze the foundations of Information Technology (IT) auditing and control. Students will evaluate the role of IT governance and how it may apply to new and existing systems. This course will help students to understand application system life cycle risks, analyze auditing of global IT operations, and assess the legal environment and how organizations conduct due care and follow best practices when auditing IT systems.


Information Security and Outsourcing Computer Systems

This doctoral course evaluates the risks related to information technology (IT) outsourcing, exploring how to recognize, examine, minimize, and manage these risks. The costs and benefits in the areas of IT today, namely outsourcing and security will be examined. The students will be able to successfully analyze the tangible and intangible costs and benefits associated with outsourcing and off shoring IT and information security functions, which will in turn assist in making business and technical decisions.


Advanced Risk Management in Information Assurance and Security

Students in this course will review information assurance and security concepts that impact the information technology (IT) industry as whole. The challenges associated with assessing and implementing computer security are a global issue. In this course, an overview of the subject of information technology system security will be presented including the nature of risk and its application to information system security, threats, and vulnerabilities. The student will be required to strive for the highest levels of knowledge in the field of risk management and information assurance.


Information Assurance from Legal and Ethical Issues

This course will review information assurance concepts from both legal and ethical viewpoints and how they impact Information Technology (IT) professionals. Students will carefully examine how IT professionals utilize ethical decision making techniques with regards to IT security, common types of computer security attacks, privacy protection, the impact of IT on the quality of life, freedom of expression, intellectual property, employer and employee relations, and other key ethical issues.


Disaster Recovery and Contingency Planning for the Security Professional

The attacks that occurred on September 11, 2001 (9/11), brought organizational disaster recovery strategy into the spotlight. This course provides students with the background knowledge and skills they need to develop effective disaster prevention and recovery capabilities in various organizations. Students will be able to demonstrate an understanding of the principles of disaster recovery planning for physical security consideration, host applications, and network security measures.

At Northcentral University, we pride ourselves in being completely transparent when it comes to tuition and fees. If a cost is not included in our Cost Per Course Tuition Rate, we let you know up front. Currently, the only additional cost above your program rate* is books. Learn more about the NCU’s PhD in Business Administration costs below:

  • Per credit cost: $1,129
  • Per 3 credit course cost: $3,387
  • Program cost: $68,090 - $71,477
  • Average book cost per course: $110
  • Application Fee: $0
  • Learning Management Fee (one-time per program): $350
  • Registration Fee: $0

Click here to learn more about payment and financing options.

*Program rates are subject to change and generally increase at the start of each calendar year.

Total program costs reflected are calculated based on standard degree program credits exclusive of the program’s potential evaluation track. The actual cost of a program is determined based upon the program and track the student enters, transfer credits if any, and other unique student factors. For more information: please contact Admissions or refer to the catalog.

If there’s one thing we’ve learned about our students, it’s that they are motivated and ambitious—but they are also busy! At Northcentral University, we’ve designed our education experience to work with you, not against you, so you can achieve your academic goals without sacrificing the quality, flexibility and support you need to be successful.

To learn more, request information or call 1-866-776-0331 to speak with an enrollment advisor today. We offer new courses every Monday of the year so you can get started when it’s best for you.