{"id":113358,"date":"2022-06-19T17:40:48","date_gmt":"2022-06-20T00:40:48","guid":{"rendered":"https:\/\/careerkarma.com\/blog\/?p=113358"},"modified":"2022-06-19T17:40:51","modified_gmt":"2022-06-20T00:40:51","slug":"phd-in-cyber-security","status":"publish","type":"post","link":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/","title":{"rendered":"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries"},"content":{"rendered":"\n<p>With the growing rate of cyber attacks, the demand for cyber security professionals and their services has increased. The Bureau of Labor Statistics (BLS) projects that there will be a <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">33 percent growth rate for information security analysts<\/a> within the decade. Earning one of the best PhDs in Cyber Security is the best way to prepare yourself for senior-level cyber security jobs.<\/p>\n\n\n\n<p>A cyber security PhD is a prestigious degree that teaches students the advanced topics and skills needed to <a href=\"https:\/\/careerkarma.com\/careers\/cybersecurity\/\">become cyber security engineers<\/a>. If you would like to prepare for advanced research positions in the tech field, this guide informs you about the best cyber security PhD programs and jobs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-phd-in-cyber-security\">What Is a PhD in Cyber Security?<\/h2>\n\n\n\n<p>A PhD in Cyber Security is a degree program focused on the fundamentals of hardware and software security required for top cyber security jobs. Common courses include computer hardware and system security, software vulnerabilities and security, compliance management, and assurance controls. This degree usually takes four to five years to complete and requires 48 to 75 credits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-get-into-a-cyber-security-phd-program-admission-requirements\">How to Get Into a Cyber Security PhD Program: Admission Requirements<\/h2>\n\n\n\n<p>The requirements to get into a cyber security PhD degree include a Bachelor\u2019s Degree or Master\u2019s Degree in Cyber Security, Computer Science, or a related field. Other admission requirements may include a minimum GPA of 3.0, letters of recommendation, a resume or CV, transcripts from your graduate coursework, writing samples, and satisfactory GRE scores.<\/p>\n\n\n\n<p>Note that some schools have course prerequisites for their cyber security programs that must be met to qualify for admission. A good example of additional admission requirements is proficiency in a specific programming language.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phd-in-cyber-security-admission-requirements\">PhD in Cyber Security Admission Requirements<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/careerkarma.com\/blog\/bachelors-degree\/\">Bachelor\u2019s degree<\/a> in a related field<\/li><li>Master\u2019s degree in a related field<\/li><li>Average GPA of 3.00<\/li><li>Letters of recommendation<\/li><li>Application fee<\/li><li>Proof of English proficiency<\/li><li>Resume or CV<\/li><li>Transcripts<\/li><li>Writing samples<\/li><li>GRE scores<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cyber-security-phd-acceptance-rates-how-hard-is-it-to-get-into-a-phd-program-in-cyber-security\">Cyber Security PhD Acceptance Rates: How Hard Is It to Get Into a PhD Program in Cyber Security?<\/h3>\n\n\n\n<p>It can be difficult to get into a PhD program for cyber security as it is the highest level degree a student can achieve. A study by Duke Graduate School shows that the <a href=\"https:\/\/gradschool.duke.edu\/about\/statistics\/computer-science-phd-admissions-and-enrollment-statistics\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">acceptance rate for their most recent computer science PhD<\/a> cohort was 15.74 percent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-get-into-the-best-universities\">How to Get Into the Best Universities<\/h2>\n\n\n\n<p>[query_class_embed]\u00a0how-to-get-into-*school<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best PhDs in Cyber Security: In Brief<\/h2>\n\n\n\n<table class=\"course-info-table\">\n<thead>\n  <tr>\n    <th>School<\/th>\n    <th>Program<\/th>\n    <th>Online Option<\/th>\n  <\/tr>\n<\/thead>\n<tbody>\n  <tr>\n    <td>Arizona State University<\/td>\n    <td>PhD in Computer Science (Cybersecurity)<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>Auburn University<\/td>\n    <td>PhD in Computer Science and Software Engineering<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>Drexel University<\/td>\n    <td>PhD in Cybersecurity<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>Michigan State University<\/td>\n    <td>PhD in Information Technology Management<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>Northeastern University<\/td>\n    <td>PhD in Cybersecurity<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>Nova Southeastern University<\/td>\n    <td>PhD in Cybersecurity Management<\/td>\n    <td>Yes<\/td>\n  <\/tr>\n  <tr>\n    <td>Portland State University<\/td>\n    <td>PhD in Computer Science with a Specialization in Networks and Security<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>University of Colorado Colorado Springs<\/td>\n    <td>PhD in Security<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>University of Rhode Island<\/td>\n    <td>PhD in Computer Science with a Specialization in Cyber Security<\/td>\n    <td>No<\/td>\n  <\/tr>\n  <tr>\n    <td>University of Tennessee<\/td>\n    <td>PhD in Computer Science with a Concentration in Cyber Security<\/td>\n    <td>No<\/td>\n  <\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Universities for Cyber Security PhDs: Where to Get a PhD in Cyber Security<\/h2>\n\n\n\n<p>The best universities for cyber security PhDs offer flexible programs and teach all the in-demand skills for successful careers in the industry. If you&#8217;re wondering where to get a PhD in Cyber Security, consult the list below for details about course content, tuition, and admission requirements.<\/p>\n\n\n<div id=\"accordions-113363\" class=\"accordions-113363 accordions\" data-accordions={&quot;lazyLoad&quot;:true,&quot;id&quot;:&quot;113363&quot;,&quot;event&quot;:&quot;click&quot;,&quot;collapsible&quot;:&quot;true&quot;,&quot;heightStyle&quot;:&quot;content&quot;,&quot;animateStyle&quot;:&quot;swing&quot;,&quot;animateDelay&quot;:1000,&quot;navigation&quot;:true,&quot;active&quot;:999,&quot;expandedOther&quot;:&quot;no&quot;}>\r\n                <div id=\"accordions-lazy-113363\" class=\"accordions-lazy\" accordionsId=\"113363\">\r\n                    <\/div>\r\n\r\n    <div class=\"items\"  style=\"display:none\" >\r\n    \r\n            <div post_id=\"113363\" itemcount=\"0\"  header_id=\"header-1655682083232\" id=\"header-1655682083232\" style=\"\" class=\"accordions-head head1655682083232 border-none\" toggle-text=\"\" main-text=\"Arizona State University | Tempe, AZ\">\r\n                                    <span id=\"accordion-icons-1655682083232\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682083232\" class=\"accordions-head-title\">Arizona State University | Tempe, AZ<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682083232 \">\r\n                <p><span style=\"font-weight: 400\">Founded in 1885, <\/span><a href=\"https:\/\/careerkarma.com\/colleges\/arizona-state-university-tempe\/\"><span style=\"font-weight: 400\">Arizona State University<\/span><\/a><span style=\"font-weight: 400\"> is a public research university in the metropolitan area of Tempe. Its PhD programs offer first-class labs and venues, along with direct access to top researchers. The school ensures that graduate students are supported during their thesis and dissertation process.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science (Cybersecurity)<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This program provides students with advanced skills and knowledge in cyber security. The course is certified by<\/span><span style=\"font-weight: 400\"> the Information Assurance Courseware Evaluation Program. The program requires 84 credit hours and you must have a grade of B or better in your core courses in order to graduate.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science (Cybersecurity) Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">4-6 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition: <\/b><span style=\"font-weight: 400\">$11,720\/year (in state); $23,544\/year (out of state)<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Teaching assistantship, research assistantship, graduate services assistantship fellowships, financial aid<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science (Cybersecurity) Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor's Degree in Computer Science, Computer Engineering, or any closely related area<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">CGPA of 3.5 in the last 60 hours of first bachelor\u2019s degree and master\u2019s degree programs<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Official transcripts from previous universities attended<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">3 letters of recommendation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Statement of purpose\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume or CV<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proof of English proficiency<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"1\"  header_id=\"header-1655682106383\" id=\"header-1655682106383\" style=\"\" class=\"accordions-head head1655682106383 border-none\" toggle-text=\"\" main-text=\"Auburn University | Auburn, AL\">\r\n                                    <span id=\"accordion-icons-1655682106383\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682106383\" class=\"accordions-head-title\">Auburn University | Auburn, AL<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682106383 \">\r\n                <p><a href=\"https:\/\/careerkarma.com\/colleges\/auburn-university\/\"><span style=\"font-weight: 400\">Auburn University<\/span><\/a><span style=\"font-weight: 400\"> is a renowned public research university founded in 1856. The school is the second-largest university in the state of Alabama. Its graduate PhD programs include <\/span><span style=\"font-weight: 400\">aerospace engineering,<\/span> <span style=\"font-weight: 400\">biomedical sciences,<\/span> <span style=\"font-weight: 400\">civil engineering,<\/span><span style=\"font-weight: 400\"> chemistry, computer science, and software engineering. The school is ranked 84th among the national graduate education programs.\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science and Software Engineering<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This program is recognized for its unique offerings of research and development skills to doctoral students in computer science and software engineering disciplines. The dissertation covers the major portion of the degree\u2019s requirements. You\u2019ll need to take at least 66 credit hours of graduate work and take a minimum of 18 credit hours of research and dissertation.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science and Software Engineering Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">4 years beyond bachelor\u2019s, 3 years beyond master\u2019s<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">24%<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$5,913\/semester (in state); $15,993\/semester (out of state)<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Military tuition assistance, school financial assistance, assistantships, engineering research fellowships, graduate tuition fellowships, Merriwether fellowships<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science and Software Engineering Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s Degree or Master's Degree in Computer Science, Cyber Security Engineering, Software Engineering, or equivalent from any institution of recognized standing<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum GPA of 3.0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">GRE exam combined score of at least 300<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">IELTS score of at least 6.5 and TOEFL iBT score of at least 79 (for international students)<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"2\"  header_id=\"header-1655682135647\" id=\"header-1655682135647\" style=\"\" class=\"accordions-head head1655682135647 border-none\" toggle-text=\"\" main-text=\"Drexel University | Philadelphia, PA\">\r\n                                    <span id=\"accordion-icons-1655682135647\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682135647\" class=\"accordions-head-title\">Drexel University | Philadelphia, PA<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682135647 \">\r\n                <p><span style=\"font-weight: 400\">Founded in 1891, <\/span><a href=\"https:\/\/careerkarma.com\/colleges\/drexel-university\/\"><span style=\"font-weight: 400\">Drexel University<\/span><\/a><span style=\"font-weight: 400\"> is a private university located in Philadelphia. Its graduate programs are highly recognized by the US News & World Report and ranked as the <\/span><a href=\"https:\/\/www.usnews.com\/best-colleges\/drexel-university-3256\"><span style=\"font-weight: 400\">103rd best school in the United States<\/span><\/a><span style=\"font-weight: 400\">. The PhD programs offered include computing and informatics and biomedical engineering.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity<\/span><\/h4>\n<p><span style=\"font-weight: 400\">The cyber security program is offered by the Cybersecurity Institute. Students in this program are either admitted into the Electronic and Computer Engineering Department or the College of Computing and Informatics. You will take core courses that are designed to build your theoretical foundation in computer networking, policy, ethics, and privacy.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Overview\u00a0<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">4 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$1,342\/credit hour<\/span><\/li>\n<li><b>PhD Funding Opportunities:<\/b> <span style=\"font-weight: 400\">Assistantships<\/span><span style=\"font-weight: 400\">, <\/span><span style=\"font-weight: 400\">incentive programs<\/span><span style=\"font-weight: 400\">, <\/span><span style=\"font-weight: 400\">student loans, tuition remission, merit-based scholarships<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Admission Requirements\u00a0<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Completed application<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s or master\u2019s degree from an accredited school<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">2 professional letters of recommendation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume or CV<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">GRE test scores\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal essay or statement\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Official transcripts from all previous schools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum of 3.25 CGPA<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Writing sample<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">In-person or telephone interview<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"3\"  header_id=\"header-1655682159467\" id=\"header-1655682159467\" style=\"\" class=\"accordions-head head1655682159467 border-none\" toggle-text=\"\" main-text=\"Michigan State University | Houghton, MI\">\r\n                                    <span id=\"accordion-icons-1655682159467\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682159467\" class=\"accordions-head-title\">Michigan State University | Houghton, MI<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682159467 \">\r\n                <p><span style=\"font-weight: 400\">Established in 1855, <\/span><a href=\"https:\/\/careerkarma.com\/colleges\/michigan-state-university\/\"><span style=\"font-weight: 400\">Michigan State University<\/span><\/a><span style=\"font-weight: 400\"> is one of the top research universities in the country. The school is recognized for its world-class standards and its innovative graduate programs. It has prestige for its publications, research grant funding, editorial positions, and community leadership.\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Information Technology Management<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This program will prepare you for a successful career as an information systems researcher and professor at a renowned institution. It will require a dissertation, defense presentation, informal meeting, and research workshop with outside speakers. You will be given professors\u2019 guidance throughout your dissertation and also be allowed to apply for funding to execute it.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Information Technology Management Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">5 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$817.25\/credit hour (in state); $1,605.75\/credit hour (out of state)<\/span><\/li>\n<li><b>PhD Funding Opportunities<\/b><span style=\"font-weight: 400\">: Teaching assistantships, research assistantship, fellowships, traineeships, student grant, loans, scholarships<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Information Technology Management Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Completed application<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">At least a bachelor\u2019s degree program from a recognized institution<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Letters of recommendation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume or CV<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">GMAT score of 600 or equivalent GRE score<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal qualifications of demonstrated interest in scholarly research, sound character, and others<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Statement of purpose<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Official transcripts from previous schools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum 3.0 GPA<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">In-person or Skype\\Zoom interview<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">TOEFL minimum score of 600 (for international students)<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"4\"  header_id=\"header-1655682186448\" id=\"header-1655682186448\" style=\"\" class=\"accordions-head head1655682186448 border-none\" toggle-text=\"\" main-text=\"Northeastern University | Boston, MA\">\r\n                                    <span id=\"accordion-icons-1655682186448\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682186448\" class=\"accordions-head-title\">Northeastern University | Boston, MA<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682186448 \">\r\n                <p><a href=\"https:\/\/careerkarma.com\/colleges\/northeastern-university\/\"><span style=\"font-weight: 400\">Northeastern University<\/span><\/a><span style=\"font-weight: 400\"> was founded in 1898. It is recognized for its professional education and signature cooperative co-education programs. The <\/span><a href=\"https:\/\/www.usnews.com\/best-colleges\/northeastern-university-2199\"><span style=\"font-weight: 400\">university is ranked 49th in the nation<\/span><\/a><span style=\"font-weight: 400\"> for its excellent educational performance by US News. Northeastern University is highly recognized for its 33 graduate programs.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This PhD program in cyber security is a research-based, interdisciplinary degree that combines its technical foundation with a security policy perspective. It will prepare you to advance in management and understand the state of the art security in the Internet industry, systems, academia, government, and networks.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">4-5 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">18.38%<\/span><\/li>\n<li><b>Tuition: <\/b><span style=\"font-weight: 400\">$1,532\/credit hour<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Graduate assistantship, scholarship, tuition waiver, stipend, tuition remission<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Completed application<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">At least a bachelor\u2019s degree program from a recognized institution<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">3 letters of recommendation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume or CV<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">GRE score (but not required for Fall 2022)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Statement of purpose<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Official transcripts from previous schools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum 3.0 CGPA<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">TOEFL minimum score of 100, IELTS of 7.5, SAT: 1049, Duolingo: 125 (for international students)<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"5\"  header_id=\"header-1655682216731\" id=\"header-1655682216731\" style=\"\" class=\"accordions-head head1655682216731 border-none\" toggle-text=\"\" main-text=\"Nova Southeastern University | Broward County, Florida\">\r\n                                    <span id=\"accordion-icons-1655682216731\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682216731\" class=\"accordions-head-title\">Nova Southeastern University | Broward County, Florida<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682216731 \">\r\n                <p><span style=\"font-weight: 400\">Founded in 1964, <\/span><a href=\"https:\/\/careerkarma.com\/colleges\/nova-southeastern-university\/\"><span style=\"font-weight: 400\">Nova Southeastern University<\/span><\/a><span style=\"font-weight: 400\"> is a private institution nationally recognized for its highly competitive and rigorous professional programs in a variety of fields. Its programs give students a hands-on approach to educational leadership to enable them to gain a competitive edge in their respective fields of study.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Management<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This graduate program prepares students to work in academic, governmental positions, and business industries. Students with a <\/span><a href=\"https:\/\/careerkarma.com\/blog\/bachelors-degree\/\"><span style=\"font-weight: 400\">bachelor\u2019s degree<\/span><\/a><span style=\"font-weight: 400\"> must complete 66 credits, while students with a master\u2019s degree must only complete 51. Core courses include information security governance, research methods, ethics in computing, and data mining.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Management Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">Maximum of 5 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$1,346\/credit hour\u00a0<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Fellowships, grants, scholarships<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Cybersecurity Management Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Online application<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">50$ application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s or master\u2019s degree from an accredited institution<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum GPA of 3.25\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume or CV<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Essay<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">3 letters of recommendation<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"6\"  header_id=\"header-1655682240099\" id=\"header-1655682240099\" style=\"\" class=\"accordions-head head1655682240099 border-none\" toggle-text=\"\" main-text=\"Portland State University | Portland, OR\">\r\n                                    <span id=\"accordion-icons-1655682240099\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682240099\" class=\"accordions-head-title\">Portland State University | Portland, OR<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682240099 \">\r\n                <p><span style=\"font-weight: 400\">Known for its in-person and online education programs for graduate and undergraduate students, <\/span><a href=\"https:\/\/careerkarma.com\/colleges\/portland-state-university\/\"><span style=\"font-weight: 400\">Portland State University<\/span><\/a><span style=\"font-weight: 400\"> is a public research school founded in 1946. The school offers over 200 degree programs and is recognized as the most diverse and affordable school in the state of Oregon.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Specialization in Networks and Security<\/span><\/h4>\n<p><span style=\"font-weight: 400\">Portland\u2019s computer science PhD program has a networks and security specialization that enhances the skills and training of students in advanced computer science study. The program combines theory with core coursework in programming, to provide a deep understanding of both current and fundamental issues in the field.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The program requires a total of 90 credits, which consists of core courses, elective courses, and a dissertation, which you will execute with guidance from an assigned research expert. Core courses include machine learning, programming languages, cryptography, and internetworking protocols.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Specialization in Networks and Security Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">Maximum of 5 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">95.2%<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$501.50\/credit hour (in state); $728.50\/credit hour (out of state)<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Graduate assistantships, scholarships, fellowships, awards, grants, federal student aid<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Specialization in Networks and Security Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Copies of transcripts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proof of English proficiency<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal essay or statement of purpose<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Standardized test scores<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Letters of recommendation\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Writing sample<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Portfolio<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s degree in a related program<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum GPA of 2.75<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"7\"  header_id=\"header-1655682268852\" id=\"header-1655682268852\" style=\"\" class=\"accordions-head head1655682268852 border-none\" toggle-text=\"\" main-text=\"University of Colorado Colorado Springs | Colorado Springs, CO\">\r\n                                    <span id=\"accordion-icons-1655682268852\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682268852\" class=\"accordions-head-title\">University of Colorado Colorado Springs | Colorado Springs, CO<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682268852 \">\r\n                <p><a href=\"https:\/\/careerkarma.com\/colleges\/colorado-technical-university-colorado-springs\/\"><span style=\"font-weight: 400\">University of Colorado Colorado Springs<\/span><\/a><span style=\"font-weight: 400\"> has a student population of 26,284. The 15-to-one student-to-faculty ratio ensures that students have a personalized and quality education. PhD students have access to a wide variety of campus resources.\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Security<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This program stands out amongst the rest because it has a strong self-learning component. Independent studies help students establish their independence skills. Students must complete 60 credit hours in courses such as computer architecture, software security, computer communications, and system administration and security in order to graduate.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Security Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">Maximum of 7 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$1,012.94\/credit hour (in state); $1,674.94\/credit hour (out of state)<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Graduate student grants, graduate student scholarships, graduate research fellowships, teaching and research assistantships, student employment<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Security Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s or master\u2019s degree in a related field<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum GPA of 3.3<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Applicants who haven\u2019t graduated from a recognized institution must take the GRE<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal statement<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Resume<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">3 letters of recommendation<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"8\"  header_id=\"header-1655682290816\" id=\"header-1655682290816\" style=\"\" class=\"accordions-head head1655682290816 border-none\" toggle-text=\"\" main-text=\"University of Rhode Island | Kingstown, RI\">\r\n                                    <span id=\"accordion-icons-1655682290816\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682290816\" class=\"accordions-head-title\">University of Rhode Island | Kingstown, RI<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682290816 \">\r\n                <p><span style=\"font-weight: 400\">Founded in 1892, the <\/span><a href=\"https:\/\/careerkarma.com\/colleges\/university-of-rhode-island\/\"><span style=\"font-weight: 400\">University of Rhode Island<\/span><\/a><span style=\"font-weight: 400\"> is a public institution that is known for its innovative and mentor-based graduate programs. Some of its research programs are ranked as the best in the Northeast due to their scientific excellence.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Specialization in Cyber Security<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This research degree is designed to equip students with relevant experience and knowledge for the professional education field. The graduate program consists of three core areas, namely mathematical foundations, programming languages, and architecture and systems. Core courses include computer algebra, theory of compilers, and advanced computer organization.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Specialization in Cyber Security Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">Maximum of 7 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$16,858\/9-15 credits (in state); $30,652\/9-15 credits (out-of-state)<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">teaching assistantships, research assistantships, enhancement of graduate research awards, tuition scholarship, dean\u2019s fellowship<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Specialization in Cyber Security Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s degree from an accredited institution in a related field<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum GPA of 3.0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal statement<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">All transcripts<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113363\" itemcount=\"9\"  header_id=\"header-1655682315210\" id=\"header-1655682315210\" style=\"\" class=\"accordions-head head1655682315210 border-none\" toggle-text=\"\" main-text=\"University of Tennessee | Knoxville, TN\">\r\n                                    <span id=\"accordion-icons-1655682315210\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655682315210\" class=\"accordions-head-title\">University of Tennessee | Knoxville, TN<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655682315210 \">\r\n                <p><a href=\"https:\/\/careerkarma.com\/colleges\/the-university-of-tennessee-institute-for-public-service\/\"><span style=\"font-weight: 400\">University of Tennessee<\/span><\/a><span style=\"font-weight: 400\"> is a public institution founded in 1794. It is well recognized for its high-quality academic and extracurricular activities. Alongside its doctoral programs, the university has nationally competitive fellowships that help support graduate students during and after their program.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Concentration in Cyber Security<\/span><\/h4>\n<p><span style=\"font-weight: 400\">This PhD program has a concentration in cyber security. You will be required to pass a comprehensive examination with excellence as well as an oral part in which you\u2019ll defend your dissertation. The exam will be written six months after your defense. <\/span><a href=\"https:\/\/careerkarma.com\/blog\/masters-degree\/\"><span style=\"font-weight: 400\">Master\u2019s degree<\/span><\/a><span style=\"font-weight: 400\"> holders will need to complete 48 credits while bachelor\u2019s degree graduates must complete 72.<\/span><\/p>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Concentration in Cyber Security Overview<\/span><\/h4>\n<ul>\n<li><b>Program Length: <\/b><span style=\"font-weight: 400\">5 years<\/span><\/li>\n<li><b>Acceptance Rate: <\/b><span style=\"font-weight: 400\">N\/A<\/span><\/li>\n<li><b>Tuition and Fees: <\/b><span style=\"font-weight: 400\">$639\/credit hour (in state); $1,650\/credit hour (out of state)<\/span><\/li>\n<li><b>PhD Funding Opportunities: <\/b><span style=\"font-weight: 400\">Graduate fellowships, graduate assistantships, student loans<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400\">PhD in Computer Science with a Concentration in Cyber Security Admission Requirements<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Application fee<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Bachelor\u2019s or master\u2019s degree in related field<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Completed online admission<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unofficial transcripts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">IELTS or TOEFL English certification (for international students)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">GRE or GMAT score<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proof of citizenship<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Minimum GPA of 3.0<\/span><\/li>\n<\/ul>\n            <\/div>\r\n    <\/div>\r\n\r\n\r\n\r\n            <\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Can You Get a PhD in Cyber Security Online?<\/h2>\n\n\n\n<p>Yes, you can get a PhD in Cyber Security online. If you prefer the flexibility that comes with online programs rather than the traditional on-campus lectures, then you should opt for one of the best online PhDs in Cyber Security. Asynchronous courses allow you to view and take your lectures when it\u2019s convenient for you. However, there will be deadlines for assignment submission and for taking exams.<\/p>\n\n\n\n<p>Some online PhD programs in cyber security are more affordable than on-campus programs, while others offer hybrid programs which feature both online and in-person academic activities. Below are some of the best online PhD programs in the cyber security field.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Best Online PhD Programs in Cyber Security<\/h3>\n\n\n\n<table class=\"course-info-table\">\n<thead>\n  <tr>\n    <th>School<\/th>\n    <th>Program<\/th>\n    <th>Length<\/th>\n  <\/tr>\n<\/thead>\n<tbody>\n  <tr>\n    <td>Capella University<\/td>\n    <td>Online PhD in Information Technology<\/td>\n    <td>2-3 years<\/td>\n  <\/tr>\n  <tr>\n    <td>Capitol Technology University<\/td>\n    <td>Online PhD in Cybersecurity<\/td>\n    <td>3 years<\/td>\n  <\/tr>\n  <tr>\n    <td>Colorado Technical University<\/td>\n    <td>Online PhD of Computer Science in Cybersecurity and Information Assurance<\/td>\n    <td>3 years<\/td>\n  <\/tr>\n  <tr>\n    <td>Marymount University<br><\/td>\n    <td>Online PhD of Science in Cybersecurity<\/td>\n    <td>N\/A<\/td>\n  <\/tr>\n  <tr>\n    <td>Northcentral University<\/td>\n    <td>Online PhD in Technology and Innovation Management \u2013 Cybersecurity<\/td>\n    <td>50 months<\/td>\n  <\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Long Does It Take to Get a PhD in Cyber Security?<\/h2>\n\n\n\n<p>It takes three to seven years to get a PhD in Cyber Security. The number of credits, intense research requirements, and dissertation can be very lengthy endeavors. You will spend time demonstrating your ability to practically apply your knowledge in cyber security, conducting research, and contributing theories in your field. The exact length varies based on the specific program and individual.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is a PhD in Cyber Security Hard?<\/h2>\n\n\n\n<p>Yes, a PhD in Cyber Security can be hard. If you are willing to put in the required effort and time, your degree will be easier. Although cyber security doesn\u2019t necessarily involve math, which makes it easier to navigate than most other tech fields, it does involve programming languages.<\/p>\n\n\n\n<p>The program can be challenging and rigorous as it is tailored to prepare you for research-based jobs such as corporate researchers, policy advisors, and college professors. It is the final educational component of the field and will require you to complete multiple hands-on projects.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Much Does It Cost to Get a PhD in Cyber Security?<\/h2>\n\n\n\n<p>It costs <a href=\"https:\/\/nces.ed.gov\/programs\/digest\/d19\/tables\/dt19_330.50.asp?current=yes\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">$19,314 per year to get a PhD<\/a> in Cyber Security, according to the National Center for Education Statistics (NCES). The cost of PhD in Cyber Security programs varies by school, but students can apply for fellowships, scholarships, and assistantships to reduce costs. This PhD will cost you an average of $12,171 per year at a public institution and $25,929 per year at a private institution.<\/p>\n\n\n\n<p>Some of the factors that determine the cost of a PhD in Cyber Security include the type of university you attend, whether you pay out-of-state tuition or in-state tuition, and the format of your program.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Pay for a PhD in Cyber Security: PhD Funding Options<\/h2>\n\n\n\n<p>The PhD funding options that students can use to pay for a PhD in Cyber Security include scholarships, loans, grants, research fellowships, and graduate assistantships. While most schools offer partially-funded programs, some schools offer fully-funded doctoral programs in the cyber security field. This way, you can earn your degree without paying any tuition.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Online Master\u2019s Degrees<\/h2>\n\n\n\n<p>[query_class_embed] online-*subject-masters-degrees<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the Difference Between a Cyber Security Master\u2019s Degree and PhD?<\/h2>\n\n\n\n<p>The differences between a cyber security master&#8217;s degree and a PhD are the entry requirements, the duration of the program, the courses taught, graduation requirements, and the number of credits required. Master\u2019s degrees require a bachelor\u2019s degree for acceptance, while PhD programs often require both a bachelor\u2019s and a master\u2019s.<\/p>\n\n\n\n<p>A master\u2019s degree program takes one to two years, requires 30 to 36 credits, and requires you to complete a capstone or thesis to be awarded your degree. A PhD in Cyber Security takes four to five years, requires 48 to 84 credit units, and requires students to complete a doctoral research dissertation to be awarded a degree.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Master\u2019s vs PhD in Cyber Security Job Outlook<\/h3>\n\n\n\n<p>According to the Bureau of Labor and Statistics (BLS), the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">job outlook for cyber security master\u2019s degree positions such as computer and information research scientist<\/a> is projected to grow by 22 percent, which is much faster than average. Meanwhile, the<a href=\"https:\/\/www.bls.gov\/ooh\/education-training-and-library\/postsecondary-teachers.htm\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\"> job outlook for PhD positions such as computer science professors<\/a> is projected to grow by 12 percent.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Difference in Salary for Cyber Security Master\u2019s vs PhD<\/h3>\n\n\n\n<p>As reported by PayScale, you can earn an <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Doctor_of_Philosophy_(PhD)%2C_Cybersecurity\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">average salary of $172,000 with a PhD in Cyber Security<\/a> in top roles in the field such as director of operations, education program director, head of business continuity planning, chief information security officer, and cyber security architect.<\/p>\n\n\n\n<p>PayScale also states that <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Master_of_Computer_Science_(MCS)%2C_Computer_Information_Systems_(CIS)\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">Master\u2019s Degree in Cyber Security holders can earn an average of $94,000<\/a> per year. Some cyber security master\u2019s degree positions include senior engineer, risk manager, and enterprise architecture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Related Cyber Security Degrees<\/h2>\n\n\n\n<p>[query_class_embed] https:\/\/careerkarma.com\/blog\/cyber-security-bachelors-degrees\/ https:\/\/careerkarma.com\/blog\/best-online-cyber-security-bachelors-degrees\/ https:\/\/careerkarma.com\/blog\/cyber-security-masters-degrees\/<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why You Should Get a PhD in Cyber Security<\/h2>\n\n\n\n<p>You should get a PhD in Cyber Security because you will develop the relevant technical skills and experience required to qualify for professional opportunities in this fast-growing industry. The outlook for jobs in this field grows is high and most of the relevant positions have very high salaries. PhDs in Cyber Security also allow you to do extensive research and make a difference in the field.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reasons for Getting a PhD in Cyber Security<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Job security. <\/strong>With the increase in cyber threats and attacks, the demand for professionals in the field of cyber security has far outpaced the supply. A position in this field gives you job security. Professionals in this field receive competing offers from multiple companies.<\/li><li><strong>High salary potential. <\/strong>Cyber security professionals are among the most highly-paid employees in the technology sector due to the severe shortage of skilled workers. According to PayScale, the <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Cyber_Security_Engineer\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">average salary of a cyber security engineer is $97,766<\/a>.<\/li><li><strong>Fast-growing career options. <\/strong>According to the Bureau of Labor Statistics, the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">job market for professionals in this field is growing<\/a> at a rate of 33 percent, which is faster than the average growth of other lines of work. It has vast opportunities with job openings in almost every sector.<\/li><li><strong>Research opportunities. <\/strong>A PhD in Cyber Security gives you an opportunity to focus on a particular research topic or question that is faculty-mentored. This allows you to chase your interests, challenge yourself, and hone your technical, research, and problem-solving skills.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Getting a PhD in Cyber Security: Cyber Security PhD Coursework<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"800\" src=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Cyber-Security-PhD-Coursework.jpg\" alt=\"A graduate student programming code on three computer screens\" class=\"wp-image-113364\"\/><figcaption><meta charset=\"utf-8\">Students who graduate from cyber security PhD programs are qualified for the highest-paid jobs in the tech field.<\/figcaption><\/figure>\n\n\n\n<p>Getting a PhD in Cyber Security will require you to complete courses that will help you hone the necessary skills required for the job market ahead of you. The on-campus curriculum differs slightly from that of an online cyber security PhD. The PhD coursework consists of classes in information privacy, information security risk management, and information protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Information Privacy<\/h3>\n\n\n\n<p>This course typically covers common privacy issues and how they relate to information systems. Technological and theoretical-based systems may also be topics of discussion. Methods to maintain the necessary level of privacy for the purpose of the safety of systems will also be discussed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Research Seminar in Cyber Security Management<\/h3>\n\n\n\n<p>This course covers the basic research topics that are associated with cyber security. Relevant literature will also be reviewed and discussed by students in the course of study. It may also cover technical and human-centric topics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Information Protection<\/h3>\n\n\n\n<p>Students will be introduced to and discuss various threats and protections to host-based systems. The course also covers the various methods of malicious activity, with the discussion of networks and mobile systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Secure Systems Analysis and Design<\/h3>\n\n\n\n<p>Topics related to the analysis and assessment of security systems are covered in this course. The scope of the course will also cover vulnerabilities and potential threats. Research opportunities and possible future threats may also be looked at.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Information Security Risk Management<\/h3>\n\n\n\n<p>This course will cover theories of risk management in the IT field. Most times, the course is research-related and may cover topics such as theories, best practices, and frameworks in risk management. Students will learn about current issues and how to practically access what future directions may follow in the cyber security environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Master\u2019s Degrees<\/h2>\n\n\n\n<p>[query_class_embed] *subject-masters-degrees<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Get a PhD in Cyber Security: Doctoral Program Requirements<\/h2>\n\n\n\n<p>If you\u2019re wondering how to get a PhD in Cyber Security, find out more about graduation requirements below. The doctoral program requirements for cyber security include credit hour completion, satisfactory comprehensive examination performance, dissertation submission, and successful dissertation defense. Some schools may demand residency, publication in a journal, or paper submission.<\/p>\n\n\n<div id=\"accordions-113365\" class=\"accordions-113365 accordions\" data-accordions={&quot;lazyLoad&quot;:true,&quot;id&quot;:&quot;113365&quot;,&quot;event&quot;:&quot;click&quot;,&quot;collapsible&quot;:&quot;true&quot;,&quot;heightStyle&quot;:&quot;content&quot;,&quot;animateStyle&quot;:&quot;swing&quot;,&quot;animateDelay&quot;:1000,&quot;navigation&quot;:true,&quot;active&quot;:999,&quot;expandedOther&quot;:&quot;no&quot;}>\r\n                <div id=\"accordions-lazy-113365\" class=\"accordions-lazy\" accordionsId=\"113365\">\r\n                    <\/div>\r\n\r\n    <div class=\"items\"  style=\"display:none\" >\r\n    \r\n            <div post_id=\"113365\" itemcount=\"0\"  header_id=\"header-1655684761140\" id=\"header-1655684761140\" style=\"\" class=\"accordions-head head1655684761140 border-none\" toggle-text=\"\" main-text=\"Credit Completion\">\r\n                                    <span id=\"accordion-icons-1655684761140\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655684761140\" class=\"accordions-head-title\">Credit Completion<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655684761140 \">\r\n                <p><span style=\"font-weight: 400\">Before you are awarded a PhD in Cyber Security, you will be required to complete a certain number of credit hours. This depends on the school and program. The average is 66 credit hours. At some schools, you need to complete up to six research credit hours, 18 credit hours of core courses, and 12 credit hours of electives in interdisciplinary courses.<\/span><\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"113365\" itemcount=\"1\"  header_id=\"header-1655684868071\" id=\"header-1655684868071\" style=\"\" class=\"accordions-head head1655684868071 border-none\" toggle-text=\"\" main-text=\"Dissertation\">\r\n                                    <span id=\"accordion-icons-1655684868071\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655684868071\" class=\"accordions-head-title\">Dissertation<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655684868071 \">\r\n                <p><span style=\"font-weight: 400\">A core requirement for the graduation of all PhD in Cyber Security programs is a dissertation submission showing a high achievement in independent investigation and scholarship. Students will be assigned at least one research supervisor. After submission, a dissertation committee approves your dissertation proposal and scores you after your dissertation defense.<\/span><\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"113365\" itemcount=\"2\"  header_id=\"header-1655685111575\" id=\"header-1655685111575\" style=\"\" class=\"accordions-head head1655685111575 border-none\" toggle-text=\"\" main-text=\"Comprehensive Examinations\">\r\n                                    <span id=\"accordion-icons-1655685111575\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685111575\" class=\"accordions-head-title\">Comprehensive Examinations<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685111575 \">\r\n                <p><span style=\"font-weight: 400\">You will need to pass all comprehensive examinations to qualify for a PhD in Cyber Security. The exams are usually held after the second-year paper and during the Fall of your third year. The exams have both a written section and an oral component. <\/span><\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"113365\" itemcount=\"3\"  header_id=\"header-1655685123984\" id=\"header-1655685123984\" style=\"\" class=\"accordions-head head1655685123984 border-none\" toggle-text=\"\" main-text=\"Teaching Requirement\">\r\n                                    <span id=\"accordion-icons-1655685123984\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685123984\" class=\"accordions-head-title\">Teaching Requirement<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685123984 \">\r\n                <p><span style=\"font-weight: 400\">Some schools require that all cyber security PhD students satisfy the teaching requirement before they are awarded the degree. Students need to work as a teaching assistant (TA) or as an instructor of record (IoR) during a semester. The total duration of your teaching should be a minimum of three hours of classes and come at least one semester before the scheduling of your PhD defense.<\/span><\/p>\n            <\/div>\r\n    \r\n            <div post_id=\"113365\" itemcount=\"4\"  header_id=\"header-1655685134846\" id=\"header-1655685134846\" style=\"\" class=\"accordions-head head1655685134846 border-none\" toggle-text=\"\" main-text=\"Thesis for PhD in Cyber Security\">\r\n                                    <span id=\"accordion-icons-1655685134846\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685134846\" class=\"accordions-head-title\">Thesis for PhD in Cyber Security<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685134846 \">\r\n                <p><span style=\"font-weight: 400\">You will be required to submit a PhD thesis on cyber security before your graduation. The purpose of this research work is to showcase your knowledge and expertise in the field. The topic of your research should be centered on a certain problem and how to tackle it. It is a critically written scholarly research paper relevant to your field.\u00a0<\/span><\/p>\n            <\/div>\r\n    <\/div>\r\n\r\n\r\n\r\n            <\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Potential Careers With a Cyber Security Degree<\/h2>\n\n\n\n<p>[query_class_embed]\u00a0how-to-become-a-*profession<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PhD in Cyber Security Salary and Job Outlook<\/h2>\n\n\n\n<p>The Bureau of Labor Statistics projects that the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">job outlook for computer and information research scientists<\/a> will grow 22 percent from 2020 to 2030, which is faster than the average for all occupations. Due to the growing threat of hacking and the risk of data breaches, there is a growing demand for cyber security engineers to secure networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Can You Do With a PhD in Cyber Security?<\/h2>\n\n\n\n<p>With a PhD in Cyber Security, you can land senior-level and high-paying jobs in the field. Due to the surge in cyber attacks, you can also land openings in healthcare, government, software and networking, and financial services.<\/p>\n\n\n\n<p>A PhD qualifies you for jobs such as chief information security officer, cyber security architect, lead software security engineer, penetration tester, information security analyst, information security manager, information security director, and security researcher.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Best Jobs with a PhD in Cyber Security<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Chief Information Security Officer<\/li><li>Cyber Security Architect<\/li><li>Lead Software Security Engineer<\/li><li>Penetration Tester<\/li><li>Information Security Analyst<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the Average Salary for a PhD in Cyber Security?<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.payscale.com\/research\/US\/Skill=Cyber_Security\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">average salary for a PhD in Cyber Security<\/a> graduate is $91,000, according to PayScale. Professionals with this degree can earn between $51,000 and $154,000 per year. These numbers will vary depending on your level of expertise, position, location, and the company for which you work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Highest-Paying Cyber Security Jobs for PhD Grads<\/h2>\n\n\n\n<table class=\"course-info-table\">\n<thead>\n  <tr>\n    <th>Cyber Security PhD Jobs<\/th>\n    <th>Average Salary<\/th>\n  <\/tr>\n<\/thead>\n<tbody>\n  <tr>\n    <td>Chief Information Security Officer<\/td>\n    <td><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Chief_Information_Security_Officer\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">$168,687<\/a><\/td>\n  <\/tr>\n  <tr>\n    <td>Cyber Security Architect<\/td>\n    <td><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Security_Architect%2C_IT\/Salary\/e06a5fcd\/Cyber-Security\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">$129,870<\/a><\/td>\n  <\/tr>\n  <tr>\n    <td>Lead Software Security Engineer<\/td>\n    <td><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Cyber_Security_Engineer\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">$97,766<\/a><\/td>\n  <\/tr>\n  <tr>\n    <td>Penetration Tester<\/td>\n    <td><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Penetration_Tester\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">$88,376<\/a><\/td>\n  <\/tr>\n  <tr>\n    <td>Information Security Analyst<\/td>\n    <td><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Information_Security_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\" rel=\"nofollow\">$73,464<\/a><\/td>\n  <\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Cyber Security Jobs with a Doctorate<\/h2>\n\n\n\n<p>The best cyber security jobs <a href=\"https:\/\/careerkarma.com\/blog\/doctorate\/\">with a doctoral degree<\/a> include chief information security officer, cyber security architect, lead software security engineer, penetration tester, and information security analyst. They are jobs that require three to five years of experience. These roles are senior-level roles in the cyber security field.<\/p>\n\n\n<div id=\"accordions-113366\" class=\"accordions-113366 accordions\" data-accordions={&quot;lazyLoad&quot;:true,&quot;id&quot;:&quot;113366&quot;,&quot;event&quot;:&quot;click&quot;,&quot;collapsible&quot;:&quot;true&quot;,&quot;heightStyle&quot;:&quot;content&quot;,&quot;animateStyle&quot;:&quot;swing&quot;,&quot;animateDelay&quot;:1000,&quot;navigation&quot;:true,&quot;active&quot;:999,&quot;expandedOther&quot;:&quot;no&quot;}>\r\n                <div id=\"accordions-lazy-113366\" class=\"accordions-lazy\" accordionsId=\"113366\">\r\n                    <\/div>\r\n\r\n    <div class=\"items\"  style=\"display:none\" >\r\n    \r\n            <div post_id=\"113366\" itemcount=\"0\"  header_id=\"header-1655685303854\" id=\"header-1655685303854\" style=\"\" class=\"accordions-head head1655685303854 border-none\" toggle-text=\"\" main-text=\"Chief Information Security Officer | PhD Salary: $168,687\">\r\n                                    <span id=\"accordion-icons-1655685303854\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685303854\" class=\"accordions-head-title\">Chief Information Security Officer | PhD Salary: $168,687<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685303854 \">\r\n                <p><span style=\"font-weight: 400\">Chief information security officers (CISO) are responsible for maintaining a company\u2019s security systems. This is a senior-level executive in an organization. They overview the strategies and programs needed to protect the enterprise\u2019s security system.<\/span><b><\/b><\/p>\n<ul>\n<li><b>Salary with a Cyber Security PhD: <\/b><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Chief_Information_Security_Officer\/Salary\"><span style=\"font-weight: 400\">$168,687<\/span><\/a><\/li>\n<li><b>Job Outlook:<\/b> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\"><span style=\"font-weight: 400\">33% job growth from 2020 to 2030<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><b>Number of Jobs:<\/b><span style=\"font-weight: 400\"> 141,200<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Highest-Paying States:<\/b> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\"><span style=\"font-weight: 400\">California, New York, Maryland, Iowa, District of Colombia<\/span><\/a><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113366\" itemcount=\"1\"  header_id=\"header-1655685333040\" id=\"header-1655685333040\" style=\"\" class=\"accordions-head head1655685333040 border-none\" toggle-text=\"\" main-text=\"Cyber Security Architect | PhD Salary: $129,870\u00a0\">\r\n                                    <span id=\"accordion-icons-1655685333040\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685333040\" class=\"accordions-head-title\">Cyber Security Architect | PhD Salary: $129,870\u00a0<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685333040 \">\r\n                <p><span style=\"font-weight: 400\">Cyber security architects build, design, and maintain computer and network security systems in an organization. They also conduct testing to ensure that these systems keep working effectively.<\/span><b><\/b><\/p>\n<ul>\n<li><b>Salary with a Cyber Security PhD: <\/b><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Security_Architect%2C_IT\/Salary\/e06a5fcd\/Cyber-Security\"><span style=\"font-weight: 400\">$129,870<\/span><\/a><\/li>\n<li><b>Job Outlook:<\/b> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\"><span style=\"font-weight: 400\">33% job growth from 2020 to 2030<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><b>Number of Jobs:<\/b><span style=\"font-weight: 400\"> 141,200<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Highest-Paying States:<\/b> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\"><span style=\"font-weight: 400\">California, New York, Maryland, Iowa, District of Colombia<\/span><\/a><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113366\" itemcount=\"2\"  header_id=\"header-1655685354082\" id=\"header-1655685354082\" style=\"\" class=\"accordions-head head1655685354082 border-none\" toggle-text=\"\" main-text=\"Information Security Analyst | Average Salary: $102,600\">\r\n                                    <span id=\"accordion-icons-1655685354082\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685354082\" class=\"accordions-head-title\">Information Security Analyst | Average Salary: $102,600<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685354082 \">\r\n                <p><span style=\"font-weight: 400\">Similar to other professions, information security analysts make sure cyber attackers cannot access an organization\u2019s sensitive data. They prevent attacks and hackers and analyze security reports to fix any bugs. You need problem-solving and research skills to <\/span><a href=\"https:\/\/careerkarma.com\/careers\/information-security-analyst\/\"><span style=\"font-weight: 400\">become an information security analyst<\/span><\/a><span style=\"font-weight: 400\">.<\/span><b><\/b><\/p>\n<ul>\n<li><b>Salary with a Cyber Security PhD: <\/b><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\"><span style=\"font-weight: 400\">$102,600<\/span><\/a><\/li>\n<li><b>Job Outlook:<\/b> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\"><span style=\"font-weight: 400\">33% job growth from 2020 to 2030<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><b>Number of Jobs:<\/b><span style=\"font-weight: 400\"> 141,200<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Highest-Paying States:<\/b> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\"><span style=\"font-weight: 400\">California, New York, Maryland, Iowa, District of Colombia<\/span><\/a><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113366\" itemcount=\"3\"  header_id=\"header-1655685369291\" id=\"header-1655685369291\" style=\"\" class=\"accordions-head head1655685369291 border-none\" toggle-text=\"\" main-text=\"Lead Software Security Engineer | PhD Salary: $97,766\">\r\n                                    <span id=\"accordion-icons-1655685369291\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685369291\" class=\"accordions-head-title\">Lead Software Security Engineer | PhD Salary: $97,766<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685369291 \">\r\n                <p><span style=\"font-weight: 400\">This head position is in charge of creating and maintaining security requirements, policies, and procedures. They work alongside and manage other experts in the field to prepare and perfect engineering designs for software solutions.<\/span><b><\/b><\/p>\n<ul>\n<li><b>Salary with a Cyber Security PhD: <\/b><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Cyber_Security_Engineer\/Salary\"><span style=\"font-weight: 400\">$97,766<\/span><\/a><\/li>\n<li><b>Job Outlook:<\/b> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/software-developers.htm#tab-1\"><span style=\"font-weight: 400\">22% job growth from 2020 to 2030<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><b>Number of Jobs:<\/b><span style=\"font-weight: 400\"> 1,847,900<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Highest-Paying States:<\/b> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151252.htm\"><span style=\"font-weight: 400\">California, Washington, Maryland, New York, Rhode Island<\/span><\/a><\/li>\n<\/ul>\n            <\/div>\r\n    \r\n            <div post_id=\"113366\" itemcount=\"4\"  header_id=\"header-1655685390104\" id=\"header-1655685390104\" style=\"\" class=\"accordions-head head1655685390104 border-none\" toggle-text=\"\" main-text=\"Penetration Tester | PhD Salary: $88,376\">\r\n                                    <span id=\"accordion-icons-1655685390104\" class=\"accordion-icons\">\r\n                        <span class=\"accordion-icon-active accordion-plus\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\r\n                        <span class=\"accordion-icon-inactive accordion-minus\"><i class=\"fas fa-chevron-right\"><\/i><\/span>\r\n                    <\/span>\r\n                    <span id=\"header-text-1655685390104\" class=\"accordions-head-title\">Penetration Tester | PhD Salary: $88,376<\/span>\r\n                            <\/div>\r\n            <div class=\"accordion-content content1655685390104 \">\r\n                <p><span style=\"font-weight: 400\">Penetration testers test various computer and network systems to find any bugs or issues that may make them susceptible to attacks. They are known as <\/span><a href=\"https:\/\/careerkarma.com\/blog\/how-to-become-an-ethical-hacker\/\"><span style=\"font-weight: 400\">ethical hackers<\/span><\/a><span style=\"font-weight: 400\"> because they hack into systems, but with the intent to help instead of harm.<\/span><b><\/b><\/p>\n<ul>\n<li><b>Salary with a Cyber Security PhD: <\/b><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Penetration_Tester\/Salary\"><span style=\"font-weight: 400\">$88,376<\/span><\/a><\/li>\n<li><b>Job Outlook:<\/b> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\"><span style=\"font-weight: 400\">33% job growth from 2020 to 2030<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><b>Number of Jobs:<\/b><span style=\"font-weight: 400\"> 141,200<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Highest-Paying States:<\/b> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\"><span style=\"font-weight: 400\">California, New York, Maryland, Iowa, District of Colombia<\/span><\/a><\/li>\n<\/ul>\n            <\/div>\r\n    <\/div>\r\n\r\n\r\n\r\n            <\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is a PhD in Cyber Security Worth It?<\/h2>\n\n\n\n<p>Yes, a PhD in Cyber Security is worth it. If you have a passion for the security of computer systems and are willing to put in the required time and dedication, you will find it challenging but exciting. Although you may run into a few hiccups, advisor support, dedication, and hard work will get you through.<\/p>\n\n\n\n<p>There are a wide variety of exciting opportunities for cyber security professionals. Companies are looking for cyber security engineers to secure their networks. A PhD in Cyber Security will help you develop a combination of soft skills and technical skills that will enable you to land a job in cyber security across different fields.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Additional Reading About Cyber Security<\/h2>\n\n\n\n<p>[query_class_embed] https:\/\/careerkarma.com\/blog\/introduction-to-cyber-security\/ https:\/\/careerkarma.com\/blog\/cyber-security-best-practices\/ https:\/\/careerkarma.com\/blog\/how-to-get-a-job-in-cyber-security\/<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PhD in Cyber Security FAQ<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1655685479277\"><strong class=\"schema-faq-question\">Does a cyber security PhD require coding?<\/strong> <p class=\"schema-faq-answer\">Yes, a cyber security PhD will require prior knowledge in coding. As a bachelor\u2019s or master\u2019s degree is required for a PhD in Cyber Security, it is likely you will have already learned those skills in your previous degrees.<br\/><br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1655685488774\"><strong class=\"schema-faq-question\">Is cyber security high in demand?<\/strong> <p class=\"schema-faq-answer\">Yes, cyber security is in high demand. Not only will this degree prepare you for the highest-paying jobs in the field, but these skills are also transferable to a multitude of career paths. Graduates are sure to find a stable job after school.<br\/><br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1655685496119\"><strong class=\"schema-faq-question\">Should I study cyber security?<\/strong> <p class=\"schema-faq-answer\">If you\u2019re interested in protecting your data, defending computer systems, and staying up to date on the latest in cyber protection, then you should get a PhD in Cyber Security. Learning cyber security opens up several career opportunities, many of which are in high demand and very lucrative.<br\/><br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1655685503550\"><strong class=\"schema-faq-question\">Is cyber security harder than programming?<\/strong> <p class=\"schema-faq-answer\">Cyber security can sometimes be more difficult than programming because it includes many different elements, including programming itself. Students must understand how to code, infiltrate code, and prevent infiltration. This is one of the most difficult aspects of cyber security.<\/p> <\/div> <\/div>\n","protected":false},"excerpt":{"rendered":"With the growing rate of cyber attacks, the demand for cyber security professionals and their services has increased. The Bureau of Labor Statistics (BLS) projects that there will be a 33 percent growth rate for information security analysts within the decade. Earning one of the best PhDs in Cyber Security is the best way to&hellip;","protected":false},"author":158,"featured_media":113359,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25395],"tags":[],"class_list":{"0":"post-113358","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-degrees"},"acf":{"post_sub_title":"","sprint_id":"May 2","query_class":"phd-in-*subject","school_sft":"","parent_sft":"","school_privacy_policy":"","has_review":null,"is_sponser_post":"","is_guest_post":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Best PhDs in Cyber Security<\/title>\n<meta name=\"description\" content=\"Acquiring a PhD in Cyber Security is an assured way to kickstart a successful career. Check out this article to find out about the best cyber security PhD programs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries\" \/>\n<meta property=\"og:description\" content=\"Acquiring a PhD in Cyber Security is an assured way to kickstart a successful career. Check out this article to find out about the best cyber security PhD programs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Career Karma\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/careerkarmaapp\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T00:40:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T00:40:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hollins Esegba\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"A #PhD in #CyberSecurity will make you eligible for the highest-paying jobs in the field. Check out this article for the best cyber security PhDs to #KickstartYourCareer\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HollinsEsegba?s=09\" \/>\n<meta name=\"twitter:site\" content=\"@career_karma\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hollins Esegba\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\"},\"author\":{\"name\":\"Hollins Esegba\",\"@id\":\"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/326374f43bcc6542552e44f0887d20e4\"},\"headline\":\"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries\",\"datePublished\":\"2022-06-20T00:40:48+00:00\",\"dateModified\":\"2022-06-20T00:40:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\"},\"wordCount\":2703,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg\",\"articleSection\":[\"Degrees\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#respond\"]}]},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\",\"url\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\",\"name\":\"Best PhDs in Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg\",\"datePublished\":\"2022-06-20T00:40:48+00:00\",\"dateModified\":\"2022-06-20T00:40:51+00:00\",\"author\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/326374f43bcc6542552e44f0887d20e4\"},\"description\":\"Acquiring a PhD in Cyber Security is an assured way to kickstart a successful career. Check out this article to find out about the best cyber security PhD programs.\",\"breadcrumb\":{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685479277\"},{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685488774\"},{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685496119\"},{\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685503550\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage\",\"url\":\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg\",\"contentUrl\":\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg\",\"width\":1200,\"height\":800,\"caption\":\"A PhD student decrypting code\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/careerkarma.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Degrees\",\"item\":\"https:\/\/careerkarma.com\/blog\/degrees\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/careerkarma.com\/blog\/#website\",\"url\":\"https:\/\/careerkarma.com\/blog\/\",\"name\":\"Career Karma\",\"description\":\"Latest Coding Bootcamp News &amp; Career Hacks from Industry Insiders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/careerkarma.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/326374f43bcc6542552e44f0887d20e4\",\"name\":\"Hollins Esegba\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/04\/Hollins-2.png\",\"contentUrl\":\"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/04\/Hollins-2.png\",\"caption\":\"Hollins Esegba\"},\"description\":\"Hollins is an expert content writer, transcriptionist, and proofreader. With internship experience as a finance data analyst at Chevron, he has worked as a proofreader and editor in journalism. He also has a background in technology publishing on WordPress. Hollins an Upper Credit in Petroleum Marketing Technology from the Petroleum Training Institute.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/hollins-esegba-640629162\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/HollinsEsegba?s=09\"],\"url\":\"https:\/\/careerkarma.com\/blog\/author\/hollins-esegba\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685479277\",\"position\":1,\"url\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685479277\",\"name\":\"Does a cyber security PhD require coding?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes, a cyber security PhD will require prior knowledge in coding. As a bachelor\u2019s or master\u2019s degree is required for a PhD in Cyber Security, it is likely you will have already learned those skills in your previous degrees.<br\/><br\/>\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685488774\",\"position\":2,\"url\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685488774\",\"name\":\"Is cyber security high in demand?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes, cyber security is in high demand. Not only will this degree prepare you for the highest-paying jobs in the field, but these skills are also transferable to a multitude of career paths. Graduates are sure to find a stable job after school.<br\/><br\/>\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685496119\",\"position\":3,\"url\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685496119\",\"name\":\"Should I study cyber security?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"If you\u2019re interested in protecting your data, defending computer systems, and staying up to date on the latest in cyber protection, then you should get a PhD in Cyber Security. Learning cyber security opens up several career opportunities, many of which are in high demand and very lucrative.<br\/><br\/>\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685503550\",\"position\":4,\"url\":\"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685503550\",\"name\":\"Is cyber security harder than programming?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Cyber security can sometimes be more difficult than programming because it includes many different elements, including programming itself. Students must understand how to code, infiltrate code, and prevent infiltration. This is one of the most difficult aspects of cyber security.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best PhDs in Cyber Security","description":"Acquiring a PhD in Cyber Security is an assured way to kickstart a successful career. Check out this article to find out about the best cyber security PhD programs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries","og_description":"Acquiring a PhD in Cyber Security is an assured way to kickstart a successful career. Check out this article to find out about the best cyber security PhD programs.","og_url":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/","og_site_name":"Career Karma","article_publisher":"http:\/\/facebook.com\/careerkarmaapp","article_published_time":"2022-06-20T00:40:48+00:00","article_modified_time":"2022-06-20T00:40:51+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg","type":"image\/jpeg"}],"author":"Hollins Esegba","twitter_card":"summary_large_image","twitter_description":"A #PhD in #CyberSecurity will make you eligible for the highest-paying jobs in the field. Check out this article for the best cyber security PhDs to #KickstartYourCareer","twitter_creator":"@https:\/\/twitter.com\/HollinsEsegba?s=09","twitter_site":"@career_karma","twitter_misc":{"Written by":"Hollins Esegba","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#article","isPartOf":{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/"},"author":{"name":"Hollins Esegba","@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/326374f43bcc6542552e44f0887d20e4"},"headline":"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries","datePublished":"2022-06-20T00:40:48+00:00","dateModified":"2022-06-20T00:40:51+00:00","mainEntityOfPage":{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/"},"wordCount":2703,"commentCount":0,"image":{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg","articleSection":["Degrees"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#respond"]}]},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/","url":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/","name":"Best PhDs in Cyber Security","isPartOf":{"@id":"https:\/\/careerkarma.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg","datePublished":"2022-06-20T00:40:48+00:00","dateModified":"2022-06-20T00:40:51+00:00","author":{"@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/326374f43bcc6542552e44f0887d20e4"},"description":"Acquiring a PhD in Cyber Security is an assured way to kickstart a successful career. Check out this article to find out about the best cyber security PhD programs.","breadcrumb":{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685479277"},{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685488774"},{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685496119"},{"@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685503550"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#primaryimage","url":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg","contentUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/06\/Best-Doctorates-in-Cyber-Security.jpg","width":1200,"height":800,"caption":"A PhD student decrypting code"},{"@type":"BreadcrumbList","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/careerkarma.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Degrees","item":"https:\/\/careerkarma.com\/blog\/degrees\/"},{"@type":"ListItem","position":3,"name":"Best Doctorates in Cyber Security: Top PhD Programs, Career Paths, and Salaries"}]},{"@type":"WebSite","@id":"https:\/\/careerkarma.com\/blog\/#website","url":"https:\/\/careerkarma.com\/blog\/","name":"Career Karma","description":"Latest Coding Bootcamp News &amp; Career Hacks from Industry Insiders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/careerkarma.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/326374f43bcc6542552e44f0887d20e4","name":"Hollins Esegba","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/careerkarma.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/04\/Hollins-2.png","contentUrl":"https:\/\/careerkarma.com\/blog\/wp-content\/uploads\/2022\/04\/Hollins-2.png","caption":"Hollins Esegba"},"description":"Hollins is an expert content writer, transcriptionist, and proofreader. With internship experience as a finance data analyst at Chevron, he has worked as a proofreader and editor in journalism. He also has a background in technology publishing on WordPress. Hollins an Upper Credit in Petroleum Marketing Technology from the Petroleum Training Institute.","sameAs":["https:\/\/www.linkedin.com\/in\/hollins-esegba-640629162\/","https:\/\/x.com\/https:\/\/twitter.com\/HollinsEsegba?s=09"],"url":"https:\/\/careerkarma.com\/blog\/author\/hollins-esegba\/"},{"@type":"Question","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685479277","position":1,"url":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685479277","name":"Does a cyber security PhD require coding?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, a cyber security PhD will require prior knowledge in coding. As a bachelor\u2019s or master\u2019s degree is required for a PhD in Cyber Security, it is likely you will have already learned those skills in your previous degrees.<br\/><br\/>","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685488774","position":2,"url":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685488774","name":"Is cyber security high in demand?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, cyber security is in high demand. Not only will this degree prepare you for the highest-paying jobs in the field, but these skills are also transferable to a multitude of career paths. Graduates are sure to find a stable job after school.<br\/><br\/>","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685496119","position":3,"url":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685496119","name":"Should I study cyber security?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If you\u2019re interested in protecting your data, defending computer systems, and staying up to date on the latest in cyber protection, then you should get a PhD in Cyber Security. Learning cyber security opens up several career opportunities, many of which are in high demand and very lucrative.<br\/><br\/>","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685503550","position":4,"url":"https:\/\/careerkarma.com\/blog\/phd-in-cyber-security\/#faq-question-1655685503550","name":"Is cyber security harder than programming?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Cyber security can sometimes be more difficult than programming because it includes many different elements, including programming itself. Students must understand how to code, infiltrate code, and prevent infiltration. This is one of the most difficult aspects of cyber security.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/posts\/113358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/users\/158"}],"replies":[{"embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/comments?post=113358"}],"version-history":[{"count":0,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/posts\/113358\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/media\/113359"}],"wp:attachment":[{"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/media?parent=113358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/categories?post=113358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/careerkarma.com\/blog\/wp-json\/wp\/v2\/tags?post=113358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}