UCCS Community

  • Current Students
  • Faculty Staff
  • Alumni & Friends
  • Parents & Families

Schools and Colleges

  • College of Business
  • College of Education

College of Engineering and Applied Science

  • College of Letters, Arts & Sciences
  • College of Public Service
  • Graduate School
  • Helen and Arthur E. Johnson Beth-El College of Nursing and Health Sciences

Quick Links

  • Search for Programs & Careers
  • Academic Advising
  • Ent Center for the Arts
  • Kraemer Family Library
  • Military and Veteran Affairs
  • myUCCS Portal
  • Campus Email
  • Microsoft 365
  • Mountain Lion Connect
  • Support Network: Students
  • Support Network: Faculty
  • Account Help
  • Status Board

Department of Computer Science

Computer science phd in security, computer science.

The College of Engineering and Applied Science at UCCS offers a new Security specialty in the Ph.D. Security degree program, starting in Fall 2008. The nation-wide unique specialty offers the security curriculum for students to study and conduct multi-disciplinary research in areas of cyber security, physical security, and homeland security, which have become critical and increasingly urgent in today's personal, business, and government operations. This new multi-disciplinary concentration integrates the existing curriculum and research initiatives, and meets the grand challenges of security with the quality expected from the University of Colorado.

The National Security Agency and the Department of Homeland Security have designated the University of Colorado, Colorado Springs as a National Center of Academic Excellence in Information Assurance Education ( CAE/IAE ). This designation covers academic years 2014 through 2021. More information about our IA programs and activities can be accessed at the Center of Information Assurance and Security Technology (CIAST) at UCCS.

The NSA (National Security Agency) Information Assurance Courseware Evaluation (IACE) Program has validated that University of Colorado at Colorado Springs courseware meets all of the elements of the Committee on National Security Systems (CNSS) National Training Standards for:

  • Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011

IACE Certification Related Courses:

  • CS3910 - System Administration and Security
  • CS4200-5200 - Computer Architecture
  • CS5220 - Computer Communications
  • CS5910 - Fundamentals of Computer/Network Security
  • CS5920 - Applied Cryptography
  • CS5020 - Software Security
  • CS6910 - Advanced System Security Design
  • CS6930 - Advanced Topics in Web Security and Privacy

Objectives:

  • Graduates of the PhD/Sec program lead software/system research projects in Universities or Research Labs.
  • Graduates of the PhD/Sec program produce independent innovative computer science security research results.
  • Graduates of the PhD/Sec program produce software packages/tools that significant benefit the society and industry.
  • Graduates of the PhD/Sec program practice lifelong learning and keep themselves up to date with emerging computer science security knowledge.
  • Graduates of the PhD/Sec program produce significant research results and contribute to Computer Science Journals and Conferences.
  • Students should know a broad knowledge of science, math and engineering.
  • Students become the leader in the specific area in which the thesis research is conducted.
  • Students are able to read, understand, and evaluate professional literature on advanced topics in engineering and applied science.
  • Students demonstrate the capability to make fundamental and significant contributions in the area of engineering and applied science, mathematics, and engineering disciplines, along with the tools of research, to perform analysis and synthesis and to visualize potential areas of application.
  • Students has developed effective communication skills and professionalism.

As this degree is housed in the Computer Science Department, knowledgeable background in the industry, or a closely related field is desired. This degree is on campus, attendance is required. Typically classes are offered Monday through Thursday for adult professionals after 4 p.m., however, classes may be scheduled at any time. The PhD committee will review all applicants for admission and will be looking for these specific classes:

  • CS 1150 Principles of Computer Science
  • CS 1450 Data Structures and Algorithms
  • CS 2080 Programming in UNIX
  • CS 2060 Programming in C
  • CS 2160 Computer Organization and Assembly Language Programming
  • CS 3160 Concepts of Programming Languages
  • CS 3300 Software Engineering
  • MATH 1350 Calculus 1
  • MATH 1360 Calculus 2
  • MATH 2150 Discrete Math
  • Any other Math class not already counted

A student can be admitted as a regular degree student if the student satisfies the following conditions:

  • The student holds a bachelor's degree or a master's degree in any of the branches of science, technology, engineering and mathematics (STEM), homeland security, or closely related field from a college or university of recognized standing. Depending on the PhD track, program candidates may be required to the complete prerequisite courses in STEM and/or homeland security policy. A student who is admitted without a master's degree may earn that degree as a part of the Ph.D. studies.
  • The student has at least a 3.3 grade point average (on a scale of 4.0) in the bachelor or master degree program attempted. Graduate students in the University's Homeland Defense Certificate program must complete the certificate with a 3.3 GPA or better prior to starting Security PhD studies.
  • U.S. resident applicants that have not graduated from a program of recognized standing, must take the Graduate Record Examination (GRE) with a minimum score of 148 (new grading scale) on the quantitative portion.
  • U.S. resident applicants with a GPA below 3.0 must provide a GRE.
  • International applicants must follow the international applicant requirements located on the 'How to Apply' page to include the GRE and proof of English proficiency either via the TOEFL examination with a minimum score of 80 (internet based), or IELTS with a minimum of 6.5 or Duolingo with a minimum score of 115; or have completed a degree at an accredited U.S. university; or complete an English as a Second Language program through level 5 or level 112 (depending on the program). 
  • Complete a personal statement and within that personal statement name a potential advisor and justify your choice. Please visit our faculty website for research interests.
  • Resume is required.
  • Three letters of recommendation.
  • Applicants with any foreign post-secondary course work should also submit a course-by-course evaluation by a NACES member.

International students applying for the program should have all application materials into the Admissions Office at UCCS by March 1st for Fall Semester and by October 1st for Spring Semester. Applications received later than these dates or incomplete by these dates may be considered for the following semester. It is the student's responsibility to follow up to make sure all materials are received on time.  

  • GRE Score of 148 or higher is required.
  • TOEFL or ILETS of 6.5 or higher is required for English Proficiency.  If a student has completed a degree in the US, this requirement may be waived.  
  • Course by Course Evaluation: Upon the successful completion of your online application, you will receive a private link to upload each foreign post-secondary transcript from institutions you have attended. These transcripts must include all courses and grades, must be issued in the original language, and be accompanied by certified English translations when applicable. This service is provided at no cost for UCCS applicants. More details will be communicated to you via email after we received your completed application. Please make sure to check your email for the uploading instructions.

Provisional Degree Students 

A student who does not meet requirements for admission as a regular student may be admitted as a provisional student upon recommendation of the Ph.D - Security Committee. Applicants will be evaluated on the strength of their academic background and experiences. With the concurrence of the chair(s) of Ph.D. Governance Committee, the Ph.D. - Security Committee may admit provisional students for a probationary period. After completing the noted provisional requirements, the provisional student will be considered for regular admission. If admission is denied at this time, the student will be dismissed from the program. Recommendation for change from provisional status to regular degree status will be based on grades received in all courses taken during provisional status. Credit earned while in provisional status will count towards the Ph.D. if and when the student moves from provisional to regular status.

For application information: How To Apply

For additional information, please contact the Computer Science Department.

Application Deadlines :

Domestic Students:      Fall Start - April 1st        Spring Start - November 1st

International Students: Fall Start - March 1st     Spring Start - October 1st

Our application deadline is April 1st. For scholarship consideration, we encourage you to apply by March 1st. If you are an international student who will need a visa, we recommend you complete the application process by March 1st to give enough time for application review and visa processing.

Click here for the PhD Security Guidelines

The Doctor of Philosophy is a degree that is conferred on a student who has demonstrated proficiency in some broad area of learning, and who has proven that he or she has the capability to evaluate work in the security field critically. In addition, the student must have demonstrated the ability to work independently and make original contributions to the field. No single prescribed set of courses can be established that, when completed, guarantee the student has attained this high level. Rather, the degree is conferred after the student has satisfied both a course work and an independent study requirement under the supervision of a committee. Minimum course work and independent study requirements and the composition of the advisory committee for the Ph.D. program are described below.

The program is research oriented with a strong self learning component. The plan of study is decided by the Ph.D. advisor and the Advisory Committee according to the student's specific research topic. Beyond the traditional learning component, the students in the program will be required to have at least 3 months of operational security experience, such as internship or training, as determined by the Advisory Committee. The second uniqueness of the program is the use of short intense workshops where students and faculty will meet to discuss emergent theories and techniques in security, and carry out exercises simulating critical security events. They will provide opportunities for students to apply what they learn in the self paced courses and to learn how to coordinate and cooperate in cyber war and homeland defense scenarios. Students have to come to the workshop at least once a year to report their research progress in the past year and the plan for the following year.

Credit Hours

A total of 60 credit hours is required for the degree.  For candidates entering the program with a bachelor's degree in STEM and/or homeland security, a minimum of 30 credit hours of course work at the 5000-level or above, including independent study, which may be taken as distance learning, is required. For candidates entering with an M.S. degree in STEM and/or homeland security, up to 24 credit hours of course work from a previously earned Master's degree may be transferred to the PhD program to meet the 30 credit hour course requirements. In all cases, 30 semester hours of dissertation credits are required. All PhD students will be required to take CS 6000, Intro to Computer Science Research. Beyond the traditional learning component, the students in the program will be required to have at least three months of operational security experience (as internship, training, etc.), as determined by the PESC. This requirement can be substituted with a peer-reviewed publication or by passing CISSP certificate examination.

The faculty of the UCCS Security specialty are involved with research programs in video surveillance and monitoring, biometrics, sensor and image processing, network security, intrusion detection, dependability and reliability in distributed systems, cryptographic algorithms and protocols, bioinformatics, space security, secure policy and management, risk analysis, and the integration of security techniques into specific applications. Many security related research projects are conducted at the following:

  • Vision And Security Technology Lab (VAST)
  • Network Security Lab (NetS)
  • Laboratory for Cybersecurity Dynamics (LCD)
  • Center for Homeland Security (CHS)
  • Distributed, Sustainable and Cloud Computing Lab (DISCO)
  • Language, Information and Computation Lab (LINC)

Security PhD Procedures and Requirements Graduation Requirements

Ready To Find Out More?

phd cyber security california

phd cyber security california

Explore your training options in 10 minutes Get Started

  • Graduate Stories
  • Partner Spotlights
  • Bootcamp Prep
  • Bootcamp Admissions
  • University Bootcamps
  • Coding Tools
  • Software Engineering
  • Web Development
  • Data Science
  • Tech Guides
  • Tech Resources
  • Career Advice
  • Online Learning
  • Internships
  • Apprenticeships
  • Tech Salaries
  • Associate Degree
  • Bachelor's Degree
  • Master's Degree
  • University Admissions
  • Best Schools
  • Certifications
  • Bootcamp Financing
  • Higher Ed Financing
  • Scholarships
  • Financial Aid
  • Best Coding Bootcamps
  • Best Online Bootcamps
  • Best Web Design Bootcamps
  • Best Data Science Bootcamps
  • Best Technology Sales Bootcamps
  • Best Data Analytics Bootcamps
  • Best Cybersecurity Bootcamps
  • Best Digital Marketing Bootcamps
  • Los Angeles
  • San Francisco
  • Browse All Locations
  • Digital Marketing
  • Machine Learning
  • See All Subjects
  • Bootcamps 101
  • Full-Stack Development
  • Career Changes
  • View all Career Discussions
  • Mobile App Development
  • Cybersecurity
  • Product Management
  • UX/UI Design
  • What is a Coding Bootcamp?
  • Are Coding Bootcamps Worth It?
  • How to Choose a Coding Bootcamp
  • Best Online Coding Bootcamps and Courses
  • Best Free Bootcamps and Coding Training
  • Coding Bootcamp vs. Community College
  • Coding Bootcamp vs. Self-Learning
  • Bootcamps vs. Certifications: Compared
  • What Is a Coding Bootcamp Job Guarantee?
  • How to Pay for Coding Bootcamp
  • Ultimate Guide to Coding Bootcamp Loans
  • Best Coding Bootcamp Scholarships and Grants
  • Education Stipends for Coding Bootcamps
  • Get Your Coding Bootcamp Sponsored by Your Employer
  • GI Bill and Coding Bootcamps
  • Tech Intevriews
  • Our Enterprise Solution
  • Connect With Us
  • Publication
  • Reskill America
  • Partner With Us

Career Karma

  • Resource Center
  • Bachelor’s Degree
  • Master’s Degree

What Are the Best Cyber Security Schools in California?

The best cyber security schools in California happen to also be some of the best in the academic institutions in the world. With the state being one of the largest tech hubs in the country, attending one of the top cyber security schools in California is a great way to boost your chances of securing a high-paying job at one of the largest tech companies in the world.

In this article, we’ve put together a detailed list of the best cyber security schools in California, their top programs, and the best-paid jobs you can get with them. Guided by US News & World Report and Times Higher Education’s school rankings, our California cyber security school rankings will help you learn about the wide range of educational institutions that can kickstart your career in cyber security.

Find your bootcamp match

How to choose a good cyber security school in california.

To choose the best cyber security school in California for you, you should consider your career goals, the school’s reputation, the specialization options available, the flexibility of its programs, and employment opportunities for graduates. Knowing what to look for before you even start looking will help you tremendously in the long run. Below is a breakdown of the factors you should consider.

Career Goals

Having a solid idea of what your career goals are is extremely important when choosing a degree program. This is because it will help you determine whether or not the programs you are considering actually offer courses that will teach you the wide variety of foundational skills needed to work in a technical field like cyber security.

Reputation of School

Graduates from schools with a good reputation are more likely to become employed soon after and sometimes even before graduating. They are also more likely to earn higher wages and to have a higher acceptance rate in future programs. A number of reasons contribute to this, but this is primarily due to degrees from higher-ranked schools holding more value in the job market.

Specialization Options

There are many fields of specialization in cyber security. Whether you want to specialize in national security defense, cryptography, artificial intelligence, or the development of new technologies for online payments, you’ll want to make sure that the school you choose offers the specialization track you want.

Flexibility and Format

You can often save time and money by attending online courses instead of commuting to campus. If enrolling in an online program is ideal for you, pick a cyber security school that offers a distance learning option so that you can study remotely and on your own schedule. Some schools also offer flexible hybrid programs on top of on-campus and online programs.

Employment Opportunities

Cyber security professionals are in high demand but some schools offer a wider range of career services than others. Whether it’s through internship opportunities, career fairs, or partner programs, try to pick a cyber security school that has good connections to employers across both the state and country.

California Cyber Security School Rankings: What Schools Have the Best Cyber Security Programs in California?

California cyber security schools ranking methodology: how we ranked the best cyber security schools in california.

To rank the best cyber security schools in California, we used US News & World Report’s breakdown of the best computer science program as a guide. We also took into consideration the subject-specific rankings conducted by Times Higher Education, as well as factors such as graduation rate, acceptance rate, and affordability.

Best Cyber Security Schools in California Explained

In this section, you’ll find a detailed breakdown of the ten best cyber schools in California along with their top undergraduate and graduate academic programs. These universities are among the best computer science schools in the nation according to the US News & World Report.

Stanford University first opened its doors in 1891 and is currently home to around 17,000 students. Located in Silicon Valley, the school offers a wide variety of undergraduate and graduate degree programs as well as online college certificates. Stanford University has a five-to-one student-to-faculty ratio and has produced 20 Nobel laureates.

Stanford University Overview

  • School Type: Private
  • Accreditation: WASC Senior College and University Commission
  • Acceptance Rate: 5%
  • Graduation Rate: 96%
  • US News National Ranking: #6
  • Times Higher Education Ranking: #4 

Stanford University Cyber Security Overview

  • Cyber Security Degrees Offered: Bachelor’s, Master’s and PhDs
  • GRE Requirements for Cyber Security Grad Students: Not required
  • Cyber Security Undergraduate Tuition: $18,491/quarter (full-time, flat rate)
  • Cyber Security Graduate Tuition: $18,105/quarter (11 to 18 units, flat rate)
  • Cyber Security Acceptance Rate: N/A
  • US News Computer Science National Ranking: #2
  • Times Higher Education Computer Science World Ranking: #2

Stanford University Cyber Security Programs

  • Bachelor of Science in Computer Science. Students need to earn a total of 180 units from general, specialization, and major-specific coursework as well as a capstone project to complete this four-year program. The degree’s Theory Pathway offers classes in cryptography as well as computer and network security.
  • Master of Science in Computer Science. Part-time students take an average of three to five years to complete this graduate program’s required 45 units. Students interested in cyber security take the Computer and Network Security specialization. This program is available on-campus and online.
  • Doctor of Philosophy in Computer Science. Students must complete 135 units and successfully defend their dissertation to earn a PhD in Computer Science from Stanford University. Usually taking four to five years to complete, students interested in cyber security can choose Computer Security as their research focus.

The University of California-Berkeley was founded in 1868 and currently has around 42,300 students. Located in Silicon Valley, the school offers a wide range of bachelor’s, master’s, and PhD programs in the fields of science, technology, arts, and humanities. Science students at Berkeley often get the chance to participate in exciting NASA research projects.

University of California-Berkeley Overview

  • School Type: Public
  • Accreditation: WASC Senior College and University Commission 
  • Acceptance Rate: 17%
  • Graduation Rate: 93%
  • US News National Ranking: #22
  • Times Higher Education Ranking: #8 

University of California-Berkeley Cyber Security Overview

  • Cyber Security Undergraduate Tuition: $9,006.75/semester (in-state, full-time); $23,883.75/semester (out-of-state, full-time)
  • Cyber Security Graduate Tuition: $14,255.75/semester (in-state, full-time); $20,378.25/semester (out-of-state, full-time)
  • Cyber Security Acceptance Rate: N/A  
  • Times Higher Education Computer Science World Ranking: #8

University of California-Berkeley Cyber Security Programs

  • Bachelor of Science in Electrical Engineering & Computer Sciences (EECS). This undergraduate degree’s 120 required credits can be completed in four years when attending on a full-time basis. Some of its core courses include Computer Security, Cryptography, and Efficient Algorithms and Intractable Problems.
  • Master of Information and Cybersecurity (MICS). This is an online, part-time, graduate program for students who want to work in leadership positions in the tech industry or for military and government organizations. Students can complete the 27-credit program in 20 months. 
  • Master of Information and Data Science (MIDS). This online, part-time program teaches students how to gain insight from real-world data for better decision-making. Offering courses such as Behind the Data: Humans and Values, and Privacy Engineering, the program’s 27 required credits can be completed in 20 months.
  • Doctor of Philosophy in Information Management and Systems. This extremely competitive two-year program only accepts three to seven students per year. Students are required to complete 24 units of coursework, write a research paper and give a public presentation on a dissertation in order to graduate.

The California Institute of Technology , often referred to as CalTech, was founded in 1891 and currently has a student body of about 2,400 students. While CalTech offers a selection of great undergraduate degree programs, most of its students are enrolled in the school’s graduate programs.

California Institute of Technology Overview

  • Acceptance Rate: 7%
  • US News National Ranking: #9
  • Times Higher Education Ranking: #2 

California Institute of Technology Cyber Security Overview

  • Cyber Security Undergraduate Tuition: $56,364/year 
  • Cyber Security Graduate Tuition: $58,467/year
  • US News Computer Science National Ranking: #11
  • Times Higher Education Computer Science World Ranking: #13

California Institute of Technology Cyber Security Programs

  • Bachelor of Science in Computer Science. Students can complete this program in four years after earning 486 units. Some of the program’s courses include Quantum Cryptography, Error-Correcting Codes, and Introduction to Feedback Control Systems. This program is only offered on-campus.
  • Master of Science in Computer Science. This on-campus program requires two years of coursework and the presentation of a thesis. The program is meant to prepare students for the school’s computer science PhD program. Some of its courses include Power System Analysis and Control and Optimization of Networks.
  • Doctor of Philosophy in Computer Science. This PhD program typically requires at least three years to complete, the first two of which are primarily focused on coursework. Students learn different ways of addressing problems at the cutting-edge of computer science such as advanced methods for system protection.

Originally established in 1881, the University of California-Los Angeles currently offers an immense range of undergraduate and graduate academic programs as well as online college certificates to over 46,000 students. In 2018, Forbes ranked UCLA as the best value university in the country .

University of California-Los Angeles Overview

  • Accreditation: WASC Senior College and University Commission  
  • Acceptance Rate: 14%
  • Graduation Rate: 92%
  • US News National Ranking: #20
  • Times Higher Education Ranking: #20

University of California-Los Angeles Cyber Security Overview

  • Cyber Security Degrees Offered: Bachelor’s, Master’s, and PhDs
  • Cyber Security Undergraduate Tuition: $13,225/year (in-state); $42,217/year (out-of-state)
  • Cyber Security Graduate Tuition: $17,756/year (in-state); $32,858/year (out-of-state)
  • Cyber Security Acceptance Rate: 11% (Computer Science graduate programs)
  • Times Higher Education Computer Science World Ranking: #11

University of California-Los Angeles Cyber Security Programs

  • Bachelor of Science in Computer Science. Students can graduate from this on-campus program in four years after completing 180 units. This program begins by teaching them the foundations of computer science, allowing them to later specialize in systems and network security. 
  • Master of Science in Engineering – Computer Networking. Students can complete this program in two or three years. The program’s required 36 units include courses like Computer Security, Queuing Systems, and Intelligent Transportation Networks.
  • Doctor of Philosophy in Computer Science. The majority of students complete this program within 18 quarters, which is equivalent to six years, after passing both the oral and written examinations. The wide variety of courses offered in the program equip students with the skills needed to work as security vulnerability detection specialists.

The University of California-San Diego , often called UCSD, is a public research university that was founded in 1960 in La Jolla. UCSD has approximately 42,900 students enrolled in its various undergraduate and graduate programs. In 2021, UCSD received over $1.5 billion in sponsored research funding.

University of California-San Diego Overview

  • Acceptance Rate: 37%
  • Graduation Rate: 89%
  • US News National Ranking: #34
  • Times Higher Education Ranking: #34

University of California-San Diego Cyber Security Overview

  • Cyber Security Undergraduate Tuition: $15,276/year (in-state); $46,302/year (out-of-state)
  • Cyber Security Graduate Tuition: $17,005/year (in-state); $32,107/year (out-of-state)
  • Times Higher Education Computer Science World Ranking: #33

University of California-San Diego Cyber Security Programs

  • Bachelor of Science in Computer Science. Students can complete this 131-credit program in four years. Only offered on-campus, the program’s courses in security, cryptography, and computer architecture equip students with a solid foundation of essential computer science skills. 
  • Master of Science in Computational Science, Mathematics, and Engineering. This program’s required 38 credits can be completed in two years. Some of the courses offered in this program include Neural Networks for Pattern Recognition and Big Network Data. This program is offered on-campus only.
  • Doctor of Philosophy in Computational Science and Engineering. To earn this PhD, students need to complete the program’s course, breadth, elective, research exam, teaching assistant, dissertation, and defense requirements. This usually takes four years for full-time students.

The University of Southern California was founded in 1880 and today houses over 49,500 students. Located in the heart of Los Angeles the university offers a huge number of online and on-campus undergraduate and graduate programs across a wide range of fields of study. Accepted students from families earning $80,000 or less attend tuition-free.

University of Southern California Overview

  • Acceptance Rate: 16%
  • US News National Ranking: #27
  • Times Higher Education Ranking: #63

University of Southern California Cyber Security Overview

  • Cyber Security Undergraduate Tuition: $30,223/semester (full-time)
  • Cyber Security Graduate Tuition: $30,223/semester (full-time)
  • US News Computer Science National Ranking: #23
  • Times Higher Education Computer Science World Ranking: #43

University of Southern California Cyber Security Programs

  • Bachelor of Science in Computer Science. This four-year, on-campus program requires a total of 128 units to complete. Some of the program’s core courses include Cryptography as well as Secure Communication and Computation, which teach students some of the basic concepts of cyber security.
  • Master of Science in Computer Science (Computer Security). Students can typically complete this 32-credit program in less than two years. Available on-campus and online, this master’s degree offers a concentration in Cyber Security Engineering which further develops its students' understanding of the field.
  • Doctor of Philosophy in Computer Science. To earn this doctoral degree, students need to complete at least 60 units and maintain a 3.0 GPA. Students typically complete this program within four years and take courses such as Security and Game Theory as well as Security Systems. This program is offered on-campus only.

The University of California-Irvine , often shortened to UCI, is a public research institution that was founded in 1965. Currently, over 37,000 students are enrolled in its 222 degree programs. UCI’s Donald Bren School of Information and Computer Sciences has a Security, Privacy, and Cryptography research area.

University of California-Irvine Overview

  • Acceptance Rate: 30%
  • Graduation Rate: 87%
  • US News National Ranking: #36
  • Times Higher Education Ranking: #98

University of California-Irvine Cyber Security Overview

  • GRE Requirements for Cyber Security Grad Students: Required, no minimum score.
  • Cyber Security Undergraduate Tuition: $15,902.23/year (in-state); $45,656.23/year (out-of-state)
  • Cyber Security Graduate Tuition: $18,116.96/year (in-state); $33,218.96/year (out-of-state) 
  • Cyber Security Acceptance Rate: 25% (master’s programs); 20% (PhD programs)
  • US News Computer Science National Ranking: #28
  • Times Higher Education Computer Science World Ranking: #83

University of California-Irvine Cyber Security Programs

  • Bachelor of Science in Computer Science. Students in this four-year program are required to complete a total of 180 credits to graduate. The program’s curriculum covers topics such as bioinformatics, visual computing, architecture and embedded systems, and algorithms. 
  • Master of Science in Networked Systems. To earn this degree, students must complete 12 courses, two of which are related to their thesis research. This program, offered exclusively on-campus, can be completed in 2 years and offers courses in urban transportation networks, usable security, and privacy.
  • Doctor of Philosophy in Networked Systems. Students can earn this doctoral degree in six years by completing 13 courses and a dissertation. This is an on-campus program offering courses such as Applied Cryptography and Wireless Communications.

The University of California-Santa Barbara began its operations in 1921 and currently has around 26,200 students. The school offers more than 200 total majors, degrees, and credentials across the fields of biological sciences, fine arts, and engineering, among many others. UC Santa Barbara has six Nobel Prize laureates among its faculty.

University of California-Santa Barbara Overview

  • Graduation Rate: 85%
  • US News National Ranking: #28
  • Times Higher Education Ranking: #68

University of California-Santa Barbara Cyber Security Overview

  • Cyber Security Undergraduate Tuition: $14,416/year (in-state); $44,170/year (out-of-state)
  • Cyber Security Graduate Tuition: $13,581/year (in-state); $28,693/year (out-of-state)
  • Times Higher Education Computer Science World Ranking: #55

University of California-Santa Barbara Cyber Security Programs

  • Bachelor and Master of Science in Computer Science. UC Santa Barabara offers a joint bachelor’s and master’s program that can be completed in five years. The dual-degree program requires a total of 180 units to graduate and offers a wide range of courses covering advanced computer security topics.
  • Master of Science in Computer Science. This graduate program can be completed in two years. To earn the degree students, must earn a total of 42 units from graduate courses and defend a thesis. Students learn about contemporary network computing, access control, and privacy issues along the course of their studies.
  • Doctor of Philosophy in Computer Science. Students with only a bachelor’s degree can complete this on-campus program in five years, while those with a master’s degree can finish it in four. The program’s curriculum includes a comprehensive collection of courses on security and cryptography.

Founded in 1908, the University of California-Davis offers a total of 107 majors and 101 graduate degree programs to its over 38,300 students. The school is a research-oriented institution, providing its full-time students the opportunity to conduct research early into their undergraduate studies and often co-author papers published in professional journals. 

University of California-Davis Overview

  • Acceptance Rate: 46%
  • Graduation Rate: 88%
  • US News National Ranking: #38
  • Times Higher Education Ranking: #67

University of California-Davis Cyber Security Overview

  • Cyber Security Degrees Offered:  Bachelor’s, Master’s, and PhDs
  • Cyber Security Undergraduate Tuition: $13,104/year (in-state); $44,130/year (out-of-state)
  • Cyber Security Graduate Tuition: $40,309/year (in-state); $55,411/year (out-of-state)
  • Cyber Security Acceptance Rate: 10% (graduate)
  • US News Computer Science National Ranking: #43
  • Times Higher Education Computer Science World Ranking: #101-125

University of California-Davis Cyber Security Programs

  • Bachelor of Science in Computer Science. Full-time students can usually complete this 180-credit program in four years or less. The skills that students learn during their undergraduate studies allow them to work for large tech companies like Microsoft, IBM, and Lockheed Martin. 
  • Master of Science in Computer Science. This two-year graduate program requires students to earn a total of 36 units to graduate. The program offers a wide variety of classes on intrusion detection and information security taught by experienced professors.
  • Doctor of Philosophy in Computer Science. Students can earn this PhD in four to five years after completing their dissertation and passing the Qualifying Examination. The program requires students to take ten graduate courses and complete a total of at least 299 research units.

The University of California-Riverside was established in 1954 and currently has 26,000 students enrolled in its bachelor’s, master’s, and PhD programs which span a wide range of branches of study. UC Riverside computer science students have access to its Center for Research and Education in Cyber Security and Privacy (CRESP). 

University of California-Riverside Overview

  • Acceptance Rate: 66%
  • Graduation Rate: 79%
  • US News National Ranking: #83
  • Times Higher Education Ranking: #251–300

University of California-Riverside Cyber Security Overview

  • Cyber Security Undergraduate Tuition: $3,814/year (in-state); $13,732/year (out-of-state)
  • Cyber Security Graduate Tuition: $3,814/year (in-state); $8,848/year (out-of-state)
  • US News Computer Science National Ranking: #60
  • Times Higher Education Computer Science World Ranking: #176-200

University of California-Riverside Cyber Security Programs

  • Bachelor of Science in Data Science. Students can earn this four-year bachelor’s degree by completing a minimum of 180 units. Graduates from this program have been employed by organizations like IBM, Microsoft, and the Central Intelligence Agency.
  • Master of Science in Computer Science. This program is only offered on-campus and requires 48 units to complete. Students can earn their degree in two years after completing their thesis or a research project in addition to their core and elective courses.
  • Doctor of Philosophy in Computer Science. This on-campus doctoral program is typically completed within five years. A total of 44 units, which can be earned from courses such as Data Mining Techniques and Network Routing, are required for graduation.

Best Undergraduate Cyber Security Schools in California

The best undergraduate cyber security schools in California offer degree programs that allow students to successfully launch their careers as cyber security specialists. It takes around four years to complete a bachelor’s degree, while an associate degree can be earned in just two. Below is a list of the best cyber security associate and bachelor’s degree programs in California.

Best Cyber Security Associate Degree Schools in California

  • Cypress College | Cyber Defense Associate in Science. Students can earn this degree by completing a minimum of 60 units. The program teaches students how to identify cyber security threats and implement procedures for asset protection. This associate degree works well for part-time students due to its flexible schedule.
  • Long Beach City College | Associate of Science in Computer Security & Networking. Students in this 60-credit program learn how to install, configure and troubleshoot security and networking parameters through courses such as Ethical Hacking and Countermeasures, and Computer Forensics and Investigation.
  • Ohlone College | Associate of Science in Information Technology. Students need to earn at least 60 credits to complete this associate degree program. A great option for part-time students, the program includes courses like Oracle Database Administration and Cloud Security Fundamentals.
  • City College of San Francisco | Associate of Science in Computer Networking and Information Technology. The City College of San Francisco’s two-year, 60-credit program offers a specialization in cyber security that equips its students with the skills needed to work as network administrators and security specialists.
  • Coastline Community College  | Associate of Science in Cybersecurity. Students can earn this associate degree after completing 60 units. With this degree, graduates can get jobs as cyber security specialists and information security analysts.

Best Cyber Security Bachelor’s Degree Programs in California

  • Stanford University | Bachelor of Science in Computer Science. Stanford University offers this exclusive program at its Palo Alto campus. It offers a specialization pathway that includes cyber security courses like Introduction to Cryptography, and Computer and Network Security.
  • University of California-Berkeley | Bachelor of Science in Electrical Engineering & Computer Sciences (EECS). Students in this program acquire a variety of skills in computer science and cyber security engineering. Throughout their studies, they gain a deeper understanding of cyber security for large-scale infrastructures.
  • California Institute of Technology | Bachelor of Science in Computer Science. Students can earn this degree from CalTech in as little as four years. Graduates of this program have found employment in government agencies like the CIA and the Department of Homeland Security.
  • University of California-Los Angeles | Bachelor of Science in Computer Science. This bachelor’s degree program can be completed in four years. Students can who graduate from it can smoothly transition into UCLA’s computer science PhD program.
  • University of California-Riverside | Bachelor of Science in Data Science. Students from UC Riverside have access to the school’s Center for Research and Education in Cyber Security and Privacy (CRESP), which is located on its campus.

Best Online Associate Degrees

[query_class_embed] online-*subject-associate-degrees

Best Online Bachelor’s Degrees

[query_class_embed] online-*subject-bachelors-degrees

Best Graduate Schools for Cyber Security in California

The best graduate cyber security schools in California offer fantastic programs filled with courses in cryptography, network security, and intrusion detection that will equip you with the skills you need to excel in this competitive field. In the following section, you’ll find a list of the best schools for master’s and PhD programs for cyber security in California.

Venus profile photo

"Career Karma entered my life when I needed it most and quickly helped me match with a bootcamp. Two months after graduating, I found my dream job that aligned with my values and goals in life!"

Venus, Software Engineer at Rockbot

Best Schools for Master’s in Cyber Security in California

  • University of California-Berkeley | Master of Information and Cybersecurity (MICS). The Master of Information and Cybersecurity program offered by the University of California-Berkeley allows students to earn their graduate degree in less than two years. Its graduates can easily work for any of the top companies in the world.
  • University of California-Berkeley | Master of Information and Data Science (MIDS). Students can complete this two-year master’s program at their own pace through the school’s online learning platform. The program’s courses equip its graduates with the ability to adapt to a constantly evolving industry.
  • California Institute of Technology | Master of Science in Computer Science. The California Institute of Technology is home to one of the most well-known and prestigious computer science graduate programs in the entire world. Earning this degree can easily set you apart from the competition.
  • University of California-Los Angeles | Master of Science in Engineering – Computer Networking. This master’s program’s curriculum includes a wide range of advanced courses on network security and infrastructure integrity. Students can use the credits they earn from it towards the school’s PhD program.
  • University of Southern California | Master of Science in Computer Science (Computer Security). This Master’s Degree in Computer Science offers a computer security concentration option, making it one of the most specialized programs available for prospective cyber security professionals.

Best PhD in Cyber Security Universities in California

  • Stanford University | Doctor of Philosophy in Computer Science. Students can earn this doctoral degree by completing a total of 135 units. This program usually takes approximately four years to complete and can be tailored toward the study of cyber security.
  • University of California-Berkeley | Doctor of Philosophy in Information Management and Systems. Students in this program have the opportunity to join interdisciplinary research teams and work on the development of cutting-edge cyber security and regulation technology.
  • California Institute of Technology |  Doctor in Philosophy in Computer Science. CalTech doctoral students can graduate from this program after just three years of residence. PhD students in it learn the skills they’ll need to work the most demanding jobs in the field of cyber security.
  • University of California-San Diego | Doctor of Philosophy in Computational Science and Engineering. Graduates from this program have the ability to solve problems in cyber security, including cyber threats to urban infrastructure and critical online systems, using the latest cutting-edge technology.
  • University of California-Irvine | Doctor of Philosophy in Networked Systems. Graduates from this program are qualified to pursue a career in research, academia, or working in the cyber security divisions of large organizations to identify cyber vulnerabilities on large-scale networks.

Best Online Master’s Degrees

[query_class_embed] online-*subject-masters-degrees

Best Online PhD Programs

[query_class_embed] online-phd-in-*subject

Admission Requirements for Cyber Security Schools in California

The basic admission requirements for cyber security schools in California are different for undergraduate and graduate students. Freshman applicants often only require a high school diploma or its equivalent. Graduate programs typically require applicants to meet a minimum GPA requirement as well as submit letters of recommendation and a statement of purpose.

Cyber Security Schools in California: Undergraduate Admission Requirements

  • A high school diploma or its equivalent
  • Your official transcripts
  • A nonrefundable application fee
  • Completed online application
  • SAT and ACT scores have not been required during COVID-19

Cyber Security Schools in California: Graduate Admission Requirements

  • A statement of purpose or interest
  • Your official transcripts from all attended postsecondary institutions
  • Three letters of recommendation
  • A minimum GPA of 3.0
  • A bachelor’s degree
  • Nonrefundable application fee
  • A completed online application
  • GRE scores have not been required during COVID-19
  • A copy of your resume

Is It Hard to Get Into a School for Cyber Security in California?

Yes, it is hard to get into a school for cyber security in California. Schools like Stanford University and UC Berkley have some of the lowest acceptance rates in the country. There are a few schools with open admissions and good cyber security programs but a degree from one of them often has less value in the job market than one from a more prestigious institution.

Easiest Colleges to Get Into in California for Cyber Security

  • MiraCosta College | Acceptance Rate: 100%. MiraCosta College has an open admissions policy for Californian students and the tuition cost for its cyber security programs is very affordable. Its associate degree program can, in some cases, be completed in under a year.
  • Cypress College | Acceptance Rate: 100%. The credits earned from Cypress College’s cyber security associate degree can be transferred to the bachelor’s program offered by a university. The school’s tuition is also quite affordable.
  • Coastline Community College | Acceptance Rate: 100%. Credits from the cyber security associate degree program offered by Coastline College can easily be transferred toward a bachelor’s degree at another college. This college offers open admission to Californians.
  • Palomar College | Acceptance Rate: 100%. This school’s open admissions policy allows students of all types of backgrounds to further their education. Students who graduate from its cyber security associate degree program can take two years off of a bachelor’s degree program offered by a university.
  • California State Polytechnic University-Pomona | Acceptance Rate: 65%. This Californian university has one of the highest acceptance rates among four-year institutions in the state. The school offers a Bachelor of Science in Computer Science which can be completed in four years.

How to Get Into the Best Colleges and Universities

[query_class_embed] how-to-get-into-*school

Best Online Schools for Cyber Security in California

The best online schools for cyber security in California are Stanford University and the University of California-Berkeley. The table below includes a list of five of the best schools offering online cyber security programs in this state. Information concerning their graduation rates was sourced from the National Center for Education Statistics.

The Most Affordable Colleges for Cyber Security in California

The most affordable colleges for cyber security in California are MiraCosta College, Palomar College, Los Medanos College, and Coastline Community College. These accredited colleges offer programs in cyber security, some of which can be completed in less than a year.

Located in Oceanside, MiraCosta College offers over 600 hybrid and fully online programs. The Computer Science Department offers an Associate Degree in Computer Science which prepares its graduates to launch their careers in cyber security and online systems management.

Located in San Marcos, California, Palomar College has around 18,000 students enrolled in its various programs. The Computer Science and Information Technology Department offers an Associate of Science in Computer Science program. Students need to complete 60 total credits to earn this degree.

Home to almost 14,000 students, Cypress College offers a Cyber Defense Certificate and an Associate of Science in Cyber Defense. Students can earn this associate degree after completing a total of 60 credits, 27 of which come from core and elective courses. This is a great school for part-time students thanks to its flexible program schedules.

Los Medanos College offers degree and certificate programs in computer science such as an Associate of Science in Information Technology, which requires 60 credits to earn. Most of these credits can be earned through online courses. Most students at Los Medanos are enrolled as part-time students.

Located in Fountain Valley, Coastline Community College has approximately 7,700 students. It offers associate of science degree programs in the fields of computer networking and of cybersecurity. Graduates from this college can become computer security consultants and digital forensics specialists thanks to the skills and knowledge they acquire.

How to Attend the Top Cyber Security Schools in California With Financial Aid

There is financial aid available for students who want to enroll at the top cyber security schools in California. The federal and Californian governments offer different types of financial aid, including loans, grants, and work-study programs. There are also numerous cyber security scholarships available for students in California. Below are examples of some of these scholarships.

Best Cyber Security Scholarships for California Students

  • CyberCorps: Scholarship for Service (SFS) | Amount: Three years of tuition and a $25,000 yearly stipend. This scholarship is for full-time students in a bachelor’s or master’s degree program related to cyber security. Recipients can be awarded the scholarship up to three times.
  • DoD Cyber Scholarship Program | Amount: Tuition, books, and a stipend to cover room and board. Applicants must be enrolled in a participating cyber security program on a full-time basis. This scholarship covers the tuition, books, and expenses of students interested in working for the US Department of Defense after graduation.
  • CIA Undergraduate Scholarship Program | Amount: Up to $32,733. This scholarship is given to students demonstrating financial need. Applicants must be full-time students willing to work during their summer breaks for the CIA.

California Employment Outlook for Cyber Security

The California Employment Outlook for cyber security jobs is extremely positive, as it’s one of the fastest-growing industries in the country. The increasing reliance on online systems and networks keeps the demand for cyber security specialists growing much faster than the average for all jobs, making a degree in this field highly worthwhile.

Most jobs in cyber security allow professionals to work remotely and offer a high salary. Cyber security professionals are in high demand across all industries, including state and federal government agencies. These professionals are required to commit to a lifelong learning mindset due to cyber technology developing at an increasingly fast pace.

Highest-Paying Cyber Security Careers in California

Best cyber security jobs in california explained.

The best cyber security jobs in California include computer and information systems managers, information security analysts, software quality assurance analysts, database administrators, and network and systems administrators. In the following section, you’ll find a detailed breakdown of their responsibilities, what they earn, and more.

Computer and information systems managers ensure that the information systems of an organization stay online and functional. They prevent unauthorized access and create policies for information management. Attending a cyber security school in California to get a Master of Information and Cybersecurity will help you meet the minimum requirements for the job.

  • Average Salary in California: $193,500
  • Employment in California: 92,880
  • Overall Job Growth: 11%
  • Best California Cyber Security Program: Master of Information and Data Science (MIDS) at the University of California-Berkeley.

Information security analysts assess, manage, and solve security risks for systems and are responsible for making sure that there are no information leaks or data corruption issues in said systems. Attending a cyber security school in California to earn a Master’s Degree in Computer Science will help you meet the requirements for this job.

  • Average Salary in California: $135,200
  • Employment in California: N/A 
  • Overall Job Growth: 33%
  • Best California Cyber Security Program: Master of Information and Cybersecurity (MICS) at the University of California-Berkeley.

Software quality assurance analysts make sure that digital products and services don’t compromise the privacy and safety of their users and providers. They ensure compliance of these products with privacy and safety industry standards. While a bachelor’s degree is the minimum requirement for this position, a master’s degree can give you a leg up.

  • Average Salary in California: $115,420
  • Employment in California: 34,050
  • Overall Job Growth: 22%
  • Best California Cyber Security Program: Master of Science in Computer Science (Computer Security) at the University of Southern California.

Database administrators organize the digital information of organizations and departments. They ensure that this information is well-organized and easy to access for the users that need it. Earning a computer science bachelor's or master’s degree in computer science will allow you to meet the education requirements for this job.

  • Average Salary in California: $106,250
  • Employment in California: 8,200
  • Overall Job Growth: 8%

Network and computer systems administrators are tasked with the installation, management, and updating of the wide range of data communication systems used by organizations. Professionals in this field of work typically only need to have a bachelor’s degree in order to qualify for this job. 

  • Average Salary in California: $105,770
  • Employment in California: 28,790
  • Overall Job Growth: 5%
  • Best California Cyber Security Program: Bachelor of Science in Computer Science at the California Institute of Technology.

Does It Matter What Cyber Security School in California I Go To?

Yes, it does matter what school in California you go to for cyber security. While some schools take a holistic approach to computer security, others lean towards cyber security engineering and infrastructure, the early identification of threats and data breaches, or the development of policies and standards for cyber security.

In addition to having different areas of specialization being offered by different schools, some schools are more prestigious than others and can place you above other applicants when on the job hunt. These schools often have better-equipped facilities, professors with more industry recognition, and more student services.

Additional Reading About Cyber Security

[query_class_embed] https://careerkarma.com/blog/best-major-for-cybersecurity/ https://careerkarma.com/blog/cyber-security-certifications/ https://careerkarma.com/blog/fastest-online-cyber-security-degree/

Best Cyber Security Schools in California FAQ

No, you don’t need to go to college to learn cyber security. The best cyber security bootcamps offer you the theoretical knowledge and hands-on experience needed to get a job in cyber security without a college degree. That being said, getting a college education is usually held in higher regard by employers in the tech industry.

You typically have to go to school for four years for cyber security. A four-year bachelor’s degree is the minimum requirement for most positions in this field, but many choose to extend their studies and earn a master’s so that they can open themselves up to a higher earning potential.

The main skills you need to get a job in cyber security are a basic understanding of computer science and database management. You also need strong analysis, problem-solving, and programming skills in order to work in this field.

The essential skills a cyber security analyst needs to have are the ability to quickly identify and eliminate threats and data breaches. Other skills they need often depend on the type of cyber security jobs they occupy.

About us: Career Karma is a platform designed to help job seekers find, research, and connect with job training programs to advance their careers. Learn about the CK publication .

What's Next?

icon_10

Get matched with top bootcamps

Ask a question to our community, take our careers quiz.

Jose Salgado

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Apply to top tech training programs in one click

Computer Science & Engineering

Computer Science & Engineering Department

Doctoral Programs in Computer Science and Engineering

Updated January 2023

PhD Program Overview

The following requirements are for students who entered the program starting Fall 2018 or later. If you entered Doctoral Program  prior to Fall 2018  see our  Former Curriculum Requirements .

CSE offers Doctor of Philosophy degrees in Computer Science and in Computer Engineering, providing a research-oriented education in preparation for a research, industrial, or entrepreneurial career. These programs explore both the fundamental aspects and application of computation, spanning theory, software, hardware, and applications.

The 37-unit coursework requirement is intended to ensure that students are exposed to (1) fundamental concepts and tools, (2) advanced, up-to-date views in topics outside their area (the breadth requirement), and (3) a deep, up-to-date view of their research area (the elective requirement). Doctoral students are expected to complete the breadth and elective requirements within the first three years of the program. All required coursework must be taken for a letter grade, with the exception of CSE 292 (Faculty Research Seminar), which is only offered S/U.

To access the CSE PhD Program Course Planner worksheet:   click here

Units obtained from a single course cannot count towards both the breadth and the elective requirements; they may only be applied towards one or the other. Doctoral students who have taken similar courses elsewhere may petition for a waiver of the required courses or for substitution by alternative courses.

The breadth requirement ensures that doctoral students share knowledge of fundamental concepts and tools from across broad areas of computer science and computer engineering. Each doctoral student must take each of these courses for a letter grade and maintain an overall breadth course GPA of 3.3 (except for CSE 292, for which a letter grade is not assigned). A student will typically complete all breadth courses within the first two years of graduate study.  Breadth courses are categorized into ten areas and are listed here alphabetically:

  • Artificial Intelligence 
  • Bioinformatics
  • Computer Engineering
  • Computer Systems & Security
  • Database Systems
  • Graphics & Vision
  • Human-computer Interaction 
  • Programming Languages, Compilers, and Software Engineering
  • Theoretical Computer Science

To fulfill the breadth requirement, students will select four out of the ten areas and take a single course from each of these four areas.

For courses approved to fulfill the breadth requirement, please see the CSE Graduate Course Structure for PhD Students.

Additionally, students are required to take CSE 292, a 1-unit Faculty Researcher Seminar, where CSE faculty present one-hour seminars of their current research work in their areas of interest.  This course is only taught in Fall quarters and offered for S/U grade only.

The elective requirement ensures that doctoral students acquire some depth of knowledge in a general research area early in their career, but it also does not preclude them from pursuing a breadth of topics, if it serves their research interests. The elective requirement is designed to be flexible and nimble enough to respond to the rapidly and constantly evolving dynamic disciplines of computer science and computer engineering. 

The elective requirement is also designed with heavy faculty mentorship in mind.  Students will consult with their faculty advisors to develop an academic plan that will include four courses from the aforementioned four separate breadth areas and five elective courses that may be selected from an approved set of courses featured in the  CSE Graduate Course Structure for PhD Students.

Units obtained in the CSE 209 series, 229 series, 239 series, 249 series, 259 series, 269 series, 279 series, 289 series, 219, 290, 292, 293, 294, 298, 299, 500, and 599 do not count toward the elective requirement.

The research exam in the first milestone in the Ph.D. program.  It has three goals:

  • Depth . The research exam verifies the student's ability to identify challenges and open problems in a focused area.  The exam should teach students how to navigate, acquire depth of knowledge, and perform critical analysis in a given research area; the exam should verify such abilities.
  • Communication . The research exam will verify the student's ability to communicate past and proposed research, orally and in writing.
  • Provide diverse feedback . The research exam provides the student with feedback on their research synthesis, analysis, and communication skills from CSE faculty beyond their advisor and outside their immediate research area.

As part of the exam, the student prepares and makes a presentation to their research exam committee.  The presentation can present results of their research and must also place that work in the context of related work in the field.

The exam committee comprises three faculty members (not including the student’s advisor), and the committee evaluates the student based on the goals above.

Student should complete the exam before the end of their second year of study.

Teaching is an important part of a doctoral student’s training. All students enrolled in the doctoral program must have one quarter of training as a teaching assistant. This is a formal degree requirement and must be completed before the student is permitted to graduate. The requirement is met by serving as a 50 percent teaching assistant and taking CSE 500 (Teaching Assistantship). CSE 599 (Teaching Methods in Computer Science) examines theoretical and practical communication and teaching techniques particularly appropriate to computer science, and students usually take it prior to or concurrent with the teaching assistantship.

The qualifying examination is a requirement for advancement to candidacy. Prior to taking the qualifying examination, a student must have satisfied the departmental course and research exam requirements and must have been accepted by a CSE faculty member as a doctoral thesis candidate. All doctoral students are expected to advance to candidacy by the end of their third year, and advancement is mandatory by the end of the fourth year. The examination is administered by a doctoral committee appointed by the dean of the Graduate Division and consists of faculty from CSE and other departments. More information on the composition of the committee can be obtained from the CSE graduate office. The examination is taken after the student and his or her adviser have identified a topic for the dissertation and an initial demonstration of feasible progress has been made. The candidate is expected to describe his or her accomplishments to date as well as future work.

The dissertation defense is the final doctoral examination. A candidate for the doctoral degree is expected to write a dissertation and defend it in an oral examination conducted by the doctoral committee. 

Students must be advanced to candidacy by the end of four years. Total university support cannot exceed seven years. Total registered time at UC San Diego cannot exceed eight years.

PhD students may obtain an MS Degree along the way or a terminal MS degree by completing the PhD coursework requirements (see details in the section “Doctoral Degree Program”); AND completing four units of CSE 299/298/293 OR an additional 4-unit, letter-graded, approved course from the CSE Graduate Course Structure; AND passing the PhD Research Exam.  Please note that completion of CSE 292 is not required for PhD students to earn the MS along the way or a terminal MS.

Financial support is available to qualified graduate students in the form of fellowships, loans, and assistantships. For questions about financial support, please see our website: http://cse.ucsd.edu/graduate/financial-opportunities .

  • Skip to Content
  • Berkeley Academic Guide Home
  • Institution Home

Berkeley Berkeley Academic Guide: Academic Guide 2023-24

Information and cybersecurity: mics.

University of California, Berkeley

About the Program

The Master of Information and Cybersecurity (MICS) is an online, part-time professional degree program that provides the technical skills and contextual knowledge students need to assume leadership positions in private sector technology companies as well as government and military organizations. The interdisciplinary program offers students mastery of core technical skills and fluency in the business, political, and legal context for cybersecurity, as well as managing cyber risk in the service of strategic decision making.

Students attend weekly live ("synchronous") sessions with classmates and instructors via an online platform as well as engaging with online ("asynchronous") videos and assignments on their own time. 

The core MICS curriculum includes cryptography, secure programming, systems security, and the ethical, legal, and economic framework of cybersecurity. In addition, students may select from a wide variety of electives covering topics such as privacy engineering, managing cyber risk, and usable security. MICS features a project-based approach to learning and encourages the pragmatic application of a variety of different tools and methods to solve complex problems.

Graduates of the program will be able to:

  • Understand the ethical and legal requirements associated with cybersecurity and data privacy;
  • Know how to build secure systems and applications;
  • Prepare to lead, manage, and contribute to building cybersecurity solutions; and
  • Gain hands-on, practical cybersecurity experience.

The I School also offers a master's in  Information and Data Science  (MIDS), a master's in  Information Management and Systems  (MIMS), and a doctoral degree  (PhD) program in Information Science .

VISIT PROGRAM SITE

Masters Degree Requirements (MICS)

Unit requirements.

The Master of Information and Cybersecurity is designed to be completed in 20 months. Students will complete 27 units of course work over five terms, taking two courses (6 units) per term for four terms and a one 3-unit capstone course in their final term. MICS classes are divided into foundation courses (9 units), a systems security requirement (3 units), advanced courses (12 units), and a synthetic capstone (3 units). Students will also complete an immersion at the UC Berkeley campus.

As a Master of Information and Cybersecurity (MICS) student, the immersion is your opportunity to meet faculty and peers in person on the UC Berkeley campus. You will have the opportunity to gain on-the-ground perspectives from faculty and industry leaders, meet with cybersecurity professionals, and soak up more of the School of Information (I School) culture. Offered twice a year, each four- to five-day immersion will be custom-crafted to deliver additional learning, networking, and community-building opportunities.

Please refer to the cybersecurity@berkeley website for more information.

Applying for Graduate Admission

Thank you for considering UC Berkeley for graduate study! UC Berkeley offers more than 120 graduate programs representing the breadth and depth of interdisciplinary scholarship. A complete list of graduate academic departments, degrees offered, and application deadlines can be found on the Graduate Division website .

Prospective students must submit an online application to be considered for admission, in addition to any supplemental materials specific to the program for which they are applying. The online application can be found on the Graduate Division website .

Admission Requirements

The minimum graduate admission requirements are:

A bachelor’s degree or recognized equivalent from an accredited institution;

A satisfactory scholastic average, usually a minimum grade-point average (GPA) of 3.0 (B) on a 4.0 scale; and

Enough undergraduate training to do graduate work in your chosen field.

For a list of requirements to complete your graduate application, please see the Graduate Division’s Admissions Requirements page . It is also important to check with the program or department of interest, as they may have additional requirements specific to their program of study and degree. Department contact information can be found here .

Where to apply?

Visit the Berkeley Graduate Division application page .

Admission to the Program

Applications are evaluated holistically on a combination of prior academic performance, work experience, essays, letters of recommendation, and goals that are a good fit for the program.

The UC Berkeley School of Information seeks students with the academic abilities to meet the demands of a rigorous graduate program.

To be eligible to apply to the  Master of Information and Cybersecurity  program, applicants must meet the following requirements:

  • A bachelor’s degree or its recognized equivalent from an accredited institution.
  • Superior scholastic record, normally well above a 3.0 GPA.
  • A high level of quantitative ability as conveyed by significant work experience that demonstrates your quantitative abilities and/or academic coursework that demonstrates quantitative aptitude
  • A high level of analytical reasoning ability and a problem-solving mindset as demonstrated in academic and/or professional performance.
  • An understanding of – or, a proven aptitude for and commitment to learning – data structures and discrete mathematics which can be demonstrated by at least one of the following qualifications: ​ Completed coursework in data structures and discrete mathematics; w ork experience that demonstrates understanding of data structures and discrete mathematics; proven technical aptitude, demonstrated by high level technical work experience or academic coursework; and/or proven commitment to learning concepts, demonstrated by review of MICS self-assessment and preparatory resources, and clear indication in application of progress made towards gaining this foundational knowledge.
  • The ability to communicate effectively, as demonstrated by academic performance, professional experience, and/or strong essays that demonstrate effective communication skills.
  • Knowledge of at least one, and ideally two, programming languages, such as C, C++, Python, Java, Javascript, or machine/assembly language as demonstrated by work experience or coursework. Applicants who lack this experience in their academic or work background but meet all other admission requirements will be required to take the Programming Fundamentals for Cybersecurity course in their first term.
  • Not Required :  Official Graduate Record Examination (GRE)  General Test or  Graduate Management Admission Test (GMAT)  scores. As of Fall 2020, we have eliminated the GRE/GMAT requirement. We recommend you put your time and effort towards the required application materials.
  • Official Test of English as a Foreign Language (TOEFL)  scores for applicants whose academic work has been in a country other than the US, UK, Australia, or English-speaking Canada.

For more information and application instructions, prospective MICS students should visit the cybersecurity@berkeley Admissions Overview .

Related Courses

Cyber 200 beyond the code: cybersecurity in context 3 units.

Terms offered: Spring 2024, Fall 2023, Summer 2023 This course explores the most important elements beyond technology that shape the playing field on which cybersecurity problems emerge and are managed. The course emphasizes how ethical, legal, and economic frameworks enable and constrain security technologies and policies. It introduces some of the most important macro-elements (such as national security considerations and interests of nation-states) and micro-elements (such as behavioral economic insights into how people understand and interact with security features). Specific topics include policymaking, business models, legal frameworks, national security considerations, ethical issues, standards making, and the roles of users, government, and industry. Beyond the Code: Cybersecurity in Context: Read More [+]

Rules & Requirements

Prerequisites: MICS students only

Hours & Format

Fall and/or spring: 14 weeks - 3 hours of lecture per week

Summer: 14 weeks - 3 hours of lecture per week

Additional Format: Three hours of lecture per week for fourteen weeks. Three hours of lecture per week for fourteen weeks.

Additional Details

Subject/Course Level: Cybersecurity/Graduate

Grading: Letter grade.

Formerly known as: Information and Cybersecurity W200

Beyond the Code: Cybersecurity in Context: Read Less [-]

CYBER 202 Cryptography for Cyber and Network Security 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 This course focuses on both mathematical and practical foundations of cryptography. The course discusses asymmetric and symmetric cryptography, Kerchkoff’s Principle, chosen and known plaintext attacks, public key infrastructure, X.509, SSL/TLS (https), and authentication protocols. The course will include an in-depth discussion of many different cryptosystems including the RSA, Rabin, DES, AES, Elliptic Curve, and SHA family cryptosystems. This course also introduces advanced topics of applied cryptography, including a brief introduction to homomorphic encrypted computation and secure multi-party computation to protect sensitive data during arbitrary computation, cryptocurrency and its cryptographic building blocks, and quantum computing. Cryptography for Cyber and Network Security: Read More [+]

Prerequisites: MICS students only. CYBER 206

Credit Restrictions: Students will receive no credit for CYBER W202 after completing CYBER 202 . A deficient grade in CYBER W202 may be removed by taking CYBER 202 .

Formerly known as: Information and Cybersecurity W202

Cryptography for Cyber and Network Security: Read Less [-]

CYBER 204 Software Security 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 The course presents the challenges, principles, mechanisms and tools to make software secure. We will discuss the main causes of vulnerabilities and the means to avoid and defend against them. The focus is on secure programming practice, including specifics for various languages, but also covering system-level defenses (architectural approaches and run-time enforcement). We will also apply software analysis and vulnerability detection tools in different scenarios. Software Security: Read More [+]

Objectives & Outcomes

Course Objectives: *Apply and manage secure coding practices throughout software project development *Gain a good comprehension of the landscape of software security vulnerabilities, with specifics for various programming languages and types of software applications *Gain the ability to analyze the security of a software system and convincingly advocate about the significance of vulnerabilities *Know representative tools for software security analysis and testing, use them in practice and understand their capabilities and limitations *Recognize insecure programming patterns and know how to replace them with secure alternatives

Student Learning Outcomes: Students will be able to apply and manage secure coding practices throughout software project development Students will be able to recognize insecure programming patterns and know how to replace them with secure alternatives Students will gain a good comprehension of the landscape of software security vulnerabilities, with specifics for various programming languages and types of software applications Students will gain the ability to analyze the security of a software system and convincingly advocate about the significance of vulnerabilities Students will know representative tools for software security analysis and testing, use them in practice and understand their capabilities and limitations

Credit Restrictions: Students will receive no credit for CYBER W204 after completing CYBER 204 . A deficient grade in CYBER W204 may be removed by taking CYBER 204 .

Formerly known as: Information and Cybersecurity W204

Software Security: Read Less [-]

CYBER 206 Programming Fundamentals for Cybersecurity 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 This course is designed to provide students with the foundational math and programming skills required to be successful in the Master of Information and Cybersecurity (MICS) program. Upon completion of this course, students will be able to write programs in Python and will gain experience reading and interpreting C programs. Students will receive a comprehensive overview of algebraic principles and will explore quantitative concepts needed for cryptography. Additionally, this course will prepare students to apply logical thinking and decompose complex problems to create programmatic solutions. Programming Fundamentals for Cybersecurity: Read More [+]

Formerly known as: Information and Cybersecurity W206

Programming Fundamentals for Cybersecurity: Read Less [-]

CYBER 207 Applied Machine Learning for Cybersecurity 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 Machine learning is a rapidly growing field at the intersection of computer science and statistics concerned with finding patterns in data. It is responsible for tremendous advances in technology, from personalized product recommendations to speech recognition in cell phones. This course provides a broad introduction to the key ideas in machine learning, with a focus on applications and concepts relevant to cybersecurity. The emphasis will be on intuition and practical examples rather than theoretical results, though some experience with probability, statistics, and linear algebra will be important. Applied Machine Learning for Cybersecurity: Read More [+]

Credit Restrictions: Students will receive no credit for CYBER W207 after completing CYBER 207 . A deficient grade in CYBER W207 may be removed by taking CYBER 207 .

Formerly known as: Information and Cybersecurity W207

Applied Machine Learning for Cybersecurity: Read Less [-]

CYBER 210 Network Security 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 Introduction to networking and security as applied to networks. Exercises cover network programming in a language of the student's choice, understanding and analyzing packet traces using tools like wireshark and mitmproxy, as well as applying security principles to analyze and determine network security. After this course, the student will have a fundamental understanding of networking, TLS and security as it applies to networked systems. Network Security: Read More [+]

Credit Restrictions: Students will receive no credit for CYBER W210 after completing CYBER 210 . A deficient grade in CYBER W210 may be removed by taking CYBER 210 .

Formerly known as: Information and Cybersecurity W210

Network Security: Read Less [-]

CYBER 211 Operating System Security 3 Units

Terms offered: Fall 2023, Summer 2023, Spring 2023 This survey of operating system security compares approaches to security taken among several modern operating systems. The course will teach how to conceptualize design issues, principles, and good practices in securing systems in today’s increasingly diverse and complex computing ecosystem, which extends from things and personal devices to enterprises, with processing increasingly in the cloud. We will approach operating systems individually and then build on them so that students learn techniques for establishing trust across a set of interoperating systems. Operating System Security: Read More [+]

Prerequisites: MICS students only. CYBER 200

Credit Restrictions: Students will receive no credit for CYBER W211 after completing CYBER 211 . A deficient grade in CYBER W211 may be removed by taking CYBER 211 .

Formerly known as: Information and Cybersecurity W211

Operating System Security: Read Less [-]

CYBER 215 Usable Privacy and Security 3 Units

Terms offered: Summer 2023, Fall 2022 Security and privacy systems can be made more usable by designing them with the user in mind, from the ground up. In this course, you will learn many of the common pitfalls of designing usable privacy and security systems, techniques for designing more usable systems, and how to evaluate privacy and security systems for usability. Through this course, you will learn methods for designing software systems that are more secure because they minimize the potential for human error. Usable Privacy and Security: Read More [+]

Credit Restrictions: Students will receive no credit for CYBER W215 after completing CYBER 215 . A deficient grade in CYBER W215 may be removed by taking CYBER 215 .

Formerly known as: Information and Cybersecurity W215

Usable Privacy and Security: Read Less [-]

CYBER 220 Managing Cyber Risk 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 This course offers valuable perspective for both the non-technical business manager and the technical cybersecurity or IT manager. It is the vital connector between the technical world of threats, vulnerabilities, and exploits, and the business world of board-level objectives, enterprise risk management, and organizational leadership. Now more than ever, managers have a need and responsibility to understand cyber risk. Just as financial risks and other operational risks have to be effectively managed within an organization, cyber risk has to be managed. It spans far beyond information technology, with broad implications in the areas of organizational behavior, financial risk modeling, legal issues, and executive leadership. Managing Cyber Risk: Read More [+]

Student Learning Outcomes: Compare and employ approaches to cyber risk management and measurement. Develop a basic cybersecurity strategic plan and understand how it aligns with the core business value of the company. Navigate corporate structures to create a strong cyber security program and obtain senior leadership buy-in. Understand security product verticals, identify common use cases for those products, and define requirements for acquiring solutions relevant to a business use case. Understand the basic principles and best practices of responding to a cybersecurity incident

Credit Restrictions: Students will receive no credit for CYBER W220 after completing CYBER 220 . A deficient grade in CYBER W220 may be removed by taking CYBER 220 .

Formerly known as: Information and Cybersecurity W220

Managing Cyber Risk: Read Less [-]

CYBER 233 Privacy Engineering 3 Units

Terms offered: Spring 2024, Fall 2023, Spring 2023 This course surveys privacy mechanisms applicable to systems engineering, with a particular focus on the inference threat arising due to advancements in artificial intelligence and machine learning. We will briefly discuss the history of privacy and compare two major examples of general legal frameworks for privacy from the United States and the European Union. We then survey three design frameworks of privacy that may be used to guide the design of privacy-aware information systems. Finally, we survey threat-specific technical privacy frameworks and discuss their applicability in different settings, including statistical privacy with randomized responses, anonymization techniques, semantic privacy models, and technical privacy mechanisms. Privacy Engineering: Read More [+]

Student Learning Outcomes: Students should be able to implement such privacy paradigms, and embed them in information systems during the design process and the implementation phase. Students should be familiar with the different technical paradigms of privacy that are applicable for systems engineering. Students should develop critical thinking about the strengths and weaknesses of the different privacy paradigms. Students should possess the ability to read literature in the field to stay updated about the state of the art.

Credit Restrictions: Students will receive no credit for CYBER W233 after completing CYBER 233 . A deficient grade in CYBER W233 may be removed by taking CYBER 233 .

Formerly known as: Information and Cybersecurity W233

Privacy Engineering: Read Less [-]

CYBER 242 New Domains of Competition: Cybersecurity and Public Policy 3 Units

Terms offered: Spring 2024, Summer 2023, Spring 2023 Cybersecurity is a primary national security and public policy concern. The government, military and private sector have various roles and responsibilities with regard to the protection of the cyber domain. In this course, students critically evaluate these roles and responsibilities, the manner in which government networks, systems, and data are secured, and the ability of national and international cybersecurity strategies and partnerships to mitigate the security risks introduced by society’s increased reliance on information. New Domains of Competition: Cybersecurity and Public Policy: Read More [+]

Course Objectives: Critically assess national and international cybersecurity strategies Describe and evaluate national and international public-private partnerships. Discuss the developments in the cyber domain and and its protection within the context of national security. Identify lessons learned and recommend ways to improve national and international approaches to cybersecurity. Identify the roles and responsibilities of the military, government, and the private sector in cybersecurity. Utilize an evidence-based approach to analyze the security of government networks and systems and privacy of retained data.

Credit Restrictions: Students will receive no credit for CYBER W242 after completing CYBER 242 . A deficient grade in CYBER W242 may be removed by taking CYBER 242 .

Formerly known as: Information and Cybersecurity W242

New Domains of Competition: Cybersecurity and Public Policy: Read Less [-]

CYBER 252 Security Operations 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 This course will focus on understanding key areas within Security Operations from a management perspective. Upon completion of this course, students will understand implementation and maintenance best practices for security operations services such as incident response, internal investigations, security analysis, threat intelligence and digital forensics. Students will not only get hands-on experience within each discipline but will also understand how to recruit and train others within a security operations center or security team. Security Operations: Read More [+]

Course Objectives: Demonstrate data analysis as it pertains to identifying and responding to cyber-attacks. Effectively apply knowledge in simulated real-world conditions to protect and defend complex networks and infrastructures, including in the cloud. Implement incident response and digital forensics techniques.

Prerequisites: MICS students only. CYBER 200 , CYBER 204 , and CYBER 210

Security Operations: Read Less [-]

CYBER 284 Web Application Security Assessment 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 Web applications play a vital role in every modern organization. If an organization does not properly test its web applications to identify security flaws, adversaries may be able to compromise these applications damaging functionality and accessing sensitive data. The focus of this course is on developing practical web application security testing skills required to assess a web application's security posture and convincingly demonstrate the business impact of discovered vulnerabilities, if exploited. The course includes both lectures and a variety of demonstrations and hands-on exercises in finding web application security vulnerabilities. During the course, students learn about assessment tools and methodologies. Web Application Security Assessment: Read More [+]

Course Objectives: Develop skills in writing web application security assessment reports Discover and exploit key web application flaws Gain a good comprehension of web application security vulnerabilities Learn to apply a repeatable methodology to deliver enterprise-level web application security assessment Learn to explain potential impact of web application vulnerabilities

Prerequisites: MICS students only. CYBER 204

Repeat rules: Course may be repeated for credit with instructor consent.

Web Application Security Assessment: Read Less [-]

CYBER 289 Public Interest Cybersecurity: The Citizen Clinic Practicum 3 Units

Terms offered: Spring 2024, Fall 2023, Spring 2023 This course provides students with real-world experience assisting politically vulnerable organizations and persons around the world to develop and implement sound cybersecurity practices. In the classroom, students study basic theories and practices of digital security, intricacies of protecting largely under-resourced organizations, and tools needed to manage risk in complex political, sociological, legal, and ethical contexts. In the clinic , students work in teams supervised by Clinic staff to provide direct cybersecurity assistance to civil society organizations. We emphasize pragmatic, workable solutions that take into account the unique needs of each partner organization. Public Interest Cybersecurity: The Citizen Clinic Practicum: Read More [+]

Credit Restrictions: Students will receive no credit for CYBER W289 after completing CYBER 289 . A deficient grade in CYBER W289 may be removed by taking CYBER 289 .

Formerly known as: Information and Cybersecurity W289

Public Interest Cybersecurity: The Citizen Clinic Practicum: Read Less [-]

CYBER 290 Special Topics 3 Units

Terms offered: Fall 2022, Summer 2022, Fall 2021 Specific topics, may vary from section to section, year to year. Special Topics: Read More [+]

Repeat rules: Course may be repeated for credit when topic changes. Students may enroll in multiple sections of this course within the same semester.

Special Topics: Read Less [-]

CYBER 295 Capstone 3 Units

Terms offered: Spring 2024, Fall 2023, Summer 2023 This capstone course will cement skills and knowledge learned throughout the Master of Information and Cybersecurity program: core cybersecurity technical skills, understanding of the societal factors that impact the cybersecurity domain and how cybersecurity issues impact humans, and professional skills such as problem-solving, communication, influencing, collaboration, and group management – to prepare students for success in the field. The centerpiece is a semester-long group project in which teams of students propose and select a complex cybersecurity issue and apply multi-faceted analysis and problem-solving to identify, assess, and manage risk and deliver impact. Capstone: Read More [+]

Student Learning Outcomes: Engage in a highly collaborative process of idea generation, information sharing, and feedback that replicates key aspects of managing cybersecurity in an organizational setting. Learn or reinforce communication, influencing, and management skills. Practice using multi-faceted problem-solving skills to address complex cybersecurity issues.

Prerequisites: MICS students only. CYBER 200 , CYBER 202 , CYBER 204 , CYBER 206 , and CYBER 210 . Must be taken in final term of the MICS program

Formerly known as: Information and Cybersecurity W295

Capstone: Read Less [-]

Contact Information

School of information.

Phone: 510-642-1464

Fax: 510-642-5814

Senior Director of Student Affairs

Siu Yung Wong

[email protected]

Phone: 855-860-5259

[email protected]

Print Options

When you print this page, you are actually printing everything within the tabs on the page you are on: this may include all the Related Courses and Faculty, in addition to the Requirements or Overview. If you just want to print information on specific tabs, you're better off downloading a PDF of the page, opening it, and then selecting the pages you really want to print.

The PDF will include all information unique to this page.

Doctor of Philosophy in Cybersecurity

Description of program.

The Doctor of Philosophy in Cybersecurity (PhD-CY) program takes an applied approach to cybersecurity theory and research. Students will get hands on experience, explore advanced topics, learn the very latest concepts, and prepare for anticipated risks. The degree is designed to prepare researchers and technology strategies applicable to leading positions in private and public sectors. Students will explore governance, compliance, leading frameworks, models, and standards to reduce threats and vulnerabilities. Students will build portfolio of valuable capabilities, addressing internal and external issues through the intelligent manipulation of data while completing their doctoral studies.

Click here  for potential career opportunities using the PhD-CY.

Learning Outcomes

  • Advance theory and practical applications of cybersecurity. 
  • Formulate cybersecurity governance, policy, risk, and compliance. 
  • Devise strategic thought leadership for challenges in cybersecurity architecture and operations. 
  • Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.
  • Evaluate tools, data, and processes to enhance protection and foster resilience. 
  • Facilitate the protection of critical information resources from current and future loss.

Basis for Admissions

Admission to Doctor of Philosophy in Cybersecurity program requires a master’s degree from a regionally or nationally accredited academic institution.

Degree Requirements

The University may accept a maximum of 12 semester credit hours in transfer toward the doctoral degree for graduate coursework completed at an accredited college or university with a grade of “B” or better.

The PhD-CY degree programs have the following graduation requirements:

  • A minimum of 48 credit hours of graduate instructions must be completed through NCU.
  • GPA of 3.0 (letter grade of “B”) or higher.
  • Satisfactory completion of the PhD-CY university approved Dissertation Manuscript and Oral Defense completed.
  • Submission of approved final dissertation manuscript to the University Registrar, including the original unbound manuscript and an electronic copy.
  • Official transcripts on file for all transfer credit hours accepted by the University.
  • All financial obligations must be met before the student will be issued their complimentary diploma and/or degree posted transcript.

Fundamental Competencies

All PhD-CY students are required to demonstrate competency in these areas:

  • Graduate-Level Research Methods Competency– PhD-CY students are required to complete ( TIM-7221    and  TIM-7225    ), OR ( TIM-7231    and TIM-7235    ), OR ( TIM-7241    and  TIM-7245    ) at NCU
  • Graduate-Level Statistics Competency – PhD-CY students are required to complete  TIM-7101 - Statistics with Technology Applications    at NCU.
  • Computer Competency - Doctoral students are required to have computer skills necessary for completing a dissertation. Students must be able to prepare documents using advanced word processing skills (e.g., creation of tables and figures, headers and footers, page breaks, tables of contents, hanging indents). Students must use computer programs for the statistical analysis of data (e.g., SAS). Students must produce a computer-based presentation (e.g., PowerPoint) for their dissertation oral examination.

Dissertation Completion Pathway

The NCU mission is dedicated to assisting students in achieving their academic aspirations and helping them become valuable contributors to their community and profession. To support our mission, NCU now offers a dissertation completion pathway for students who have successfully completed their doctoral coursework and achieved doctoral candidacy at a previous institution but were unable to complete their dissertation.  NCU’s Dissertation Completion Pathway (DCP) offers a unique opportunity for students to complete their doctorate in one of the doctoral programs offered at NCU (excluding the PhD in MFT, DMFT, DNP, and DHA). Students successfully meeting the entrance and application requirements will complete a minimum of 23 credit hours to earn their doctorate.

Click below for more information on the Dissertation Completion Pathway   .

Time to Completion

NCU allows 7 years to complete all doctoral programs of 60 credits or less.

The median time to completion for this program is 44 months.

Time to completion varies depending upon the pace in which a student completes courses and the number of transfer credits accepted. As most NCU students are working adults, balancing educational, professional, and personal commitments, our academic and finance advisors will work with you to develop a program schedule that works best for your needs.

Students following the preferred schedule designed by the Dean for this program, and applying no transfer credits, can expect to finish in as little as 40 months.

Dissertation Process

Faculty assists each NCU Doctoral student to reach this high goal through a systematic process leading to a high-quality completed dissertation. A PhD dissertation is a scholarly documentation of research that makes an original contribution to the field of study. This process requires care in choosing a topic, documenting its importance, planning the methodology, and conducting the research. These activities lead smoothly into the writing and oral presentation of the dissertation.

A doctoral candidate must be continuously enrolled throughout the series of dissertation courses. Dissertation courses are automatically scheduled and accepted without a break in scheduling to ensure that students remain in continuous enrollment throughout the dissertation course sequence. If additional time is required to complete any of the dissertation courses, students must re-enroll and pay the tuition for that course. Continuous enrollment will only be permitted when students demonstrate progress toward completing dissertation requirements. The Dissertation Committee determines progress.

Course Sequence

The PhD program requires a minimum of 60 credits. Additional credit hours may be allowed as needed to complete the dissertation research. If granted, additional courses will be added to the student degree program in alignment with the SAP and Academic Maximum Time to Completion policies. Students who do not complete their program in accordance with these policies may be dismissed.

The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours. 

*Students select one pair of research methods and directed research courses based on their own research proposal. 

The PhD in Cybersecurity requires the following courses for every specialization:

  • TIM-7010 - Computer Networks & Mobile Computing
  • TIM-8301 - Principles of Cybersecurity
  • TIM-8305 - Cyber Risk, Contingencies, and Incidents
  • TIM-8315 - Cyber Automation, Artificial Intelligence, and Machine Learning
  • TIM-8330 - Advanced Risk Management
  • Specialization Course 1
  • Specialization Course 2
  • Specialization Course 3
  • TIM-7101 - Statistics with Technology Applications
  • TIM-8350 - Cyber Critical Infrastructure Protection, Information Warfare, & Cyber Terrorism
  • TIM-7211 - Introduction to Research Design and Methodology for Technology Leaders
  • Specialization Course 4
  • Specialization Course 5
  • CMP-9701CY - PhD Cybersecurity Pre-Candidacy Prospectus
  • DIS-9901A - Components of the Dissertation
  • DIS-9902A - The Dissertation Proposal
  • DIS-9903A - Institutional Review Board (IRB) and Data Collection
  • DIS-9904A - The Dissertation Manuscript and Defense

General and Technology Specialization

The Doctor of Philosophy in Cybersecurity (PhD-CY), General and Technology specialization degree builds on the core computing principles and cybersecurity best practices, frameworks, and models. The degree provides a broad overview, adding governance and strategic views to compliment forensic, software development cloud, and systems certification content. Students use firsthand experience, explore advanced topics, learn the latest and anticipated concepts, consider the evolution of risks and mitigation, advanced threat detection, and propose their own research. The degree is designed to prepare researchers, consultants, and technology strategists capable of leadership roles and executive positions in private and public sectors. 

Specialization Courses - 15 credit hours

  • TIM-8310 - Cyber Forensics
  • TIM-8325 - Cloud and Systems Certification & Accreditation
  • TIM-8340 - Secure Software Development
  • TIM-8335 - Governance, Laws, Privacy, and Compliance
  • TIM-8390 - Strategic Management of Cybersecurity: General and Technology

Computer Science and Engineering

WE ENGINEER EXCELLENCE

Cybersecurity

a student listens to a lecture

PhD in Cybersecurity

The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy, and human behavior influence the design and implementation of security measures. Whether your background and interests are in academia, industry, or government, you’ll graduate as a high-demand professional ready for a successful career.

  • Explore plan of study
  • View program requirements
  • How to apply
  • Request info

phd cyber security california

PhD students at Khoury College gain deep knowledge and invaluable experience—preparing them for a career in academia as well as research.

phd cyber security california

Our flagship campus in Boston is just minutes away from esteemed universities, exciting start-ups, and leaders in tech, finance, health care, and more.

phd cyber security california

Research Projects

December 15, 2023

Khoury Graduate Admissions Team

  • Financial support

January 1, 1066

January 1, 1492

Khoury Align Admissions Team

  • How to Apply
  • Cost & Financial Aid

Northeastern University - Khoury College of Computer Sciences

Khoury Social

Khoury College youtube link

Contact Khoury

phd cyber security california

I'm seeking information for

phd cyber security california

Associate Director of Informatics: Clifford Neumann, PhD

The Master of Science in Cyber Security Engineering is intended for: a) graduate students who desire to obtain jobs in which computer security knowledge and skills are required; b) graduate students who wish to continue on a path toward enrollment for a doctoral degree focusing on information security; c) individuals in degree programs or job fields that have responsibility for information security. The typical admitted student will have the following qualifications:

  • an undergraduate degree in computer science, electrical engineering or information security;
  • programming capability;
  • understanding of computer networking and computer operating systems.
  • desire to learn information security techniques and tools that are directly applicable to current information security challenges; and
  • above average mathematical foundation.

During completion of the program, students will learn the fundamentals of developing, engineering and operating secure information systems. They will become versed in the challenges and problems of secure operating systems, secure applications, secure networking, database security and privacy, use of cryptography and key management. They will learn to develop a security policy and how policy drives technology decisions. Students will gain the knowledge and skills necessary to administer environments that require high levels of information security, both from the standpoint of the principles of information protection and the role application technology has in meeting information protection needs. Students will understand the value of assets, the business model of threats, the threat matrix, mitigation strategies and how this integrates with the core organizational mission. They will understand why information security plans succeed or fail.

Students will have hands-on experience simulating real-world scenarios with extensive laboratory work that is designed by current and former information security practitioners.

For Admission Requirements, refer to  Viterbi Graduate Degrees and Requirements .

Requirements for completion (28 units minimum).

Required courses.

  • CSCI 530 Security Systems Units: 4
  • DSCI 519 Foundations and Policy for Information Security Units: 4
  • DSCI 523 Computer Systems Assurance Units: 4
  • DSCI 529 Security and Privacy Units: 4

At least two of the following:

(8 units minimum)

  • CSCI 531 Applied Cryptography Units: 4
  • DSCI 525 Trusted System Design, Analysis and Development Units: 4
  • DSCI 526 Secure Systems Administration Units: 4
  • DSCI 528 Computer Forensics Units: 4

Plus an additional 4 units that may be composed of items from the above list or

  • DSCI 590 Directed Research Units: 1, 1.5, 2, 2.5, 3, 3.5, 4, 4.5, 5, 6, 7, 8, 9, 10, 11, 12 **
  • PTE 519 Integrated Physical and Cyber Security for Oil and Gas Operations Units: 3

**A maximum of 2 units of DSCI 590     may be applied.

Other courses may be approved in consultation with the department adviser, including classes in the student’s proposed problem domain. 

  • Request Information
  • Find Faculty & Staff
  • Info For Toggle Info Return to Menu Menu
  • Search Open Search Close Search
  • Message from the Chair
  • Department Directory
  • Undergraduate Studies
  • Graduate Studies
  • Co-op & Experiential Learning
  • Research Areas
  • Research Centers and Institutes
  • Faculty and Staff Directory
  • Part-Time Faculty
  • Annual Reports
  • Honors & Distinctions
  • Faculty Hiring
  • Student Groups
  • ECE Diversity, Equity and Inclusion
  • Industrial Advisory Board
  • Resources for Current Students
  • In the Media
  • ECE Student Stories

student touching computer screen

PhD in Cybersecurity

A research-based, interdisciplinary Doctor of Philosophy (PhD) in  Cybersecurity  combines a strong security technical foundation with a security policy and social sciences perspective.   It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.   The interdisciplinary nature of the program distinguishes it from traditional doctoral degree programs in computer science, engineering, or social sciences and makes it unique in the Boston area.

Innovative Curriculum - Cybersecurity PhD

Students who choose the PhD in  Cybersecurity  program have a strong desire to purse academic research solving critical cybersecurity challenges facing today’s society.   The PhD program is a natural path for students in the  Master of Science in Cybersecurity program who want to pursue research and students with bachelor’s degrees and an interest in research-focused careers.   Students who pursue careers in advancing the state of the art of cybersecurity have an opportunity to gain:

  • A strong technical foundation in cybersecurity and an interdisciplinary perspective based on policy and social science
  • A path to a research-focused career coupled with depth in information assurance research at a leading institution, one of the earliest designees by NSA/DHS as a   National Center of Academic Excellence   in Information Assurance Research, Information Assurance/Cyber Defense, and Cyber Operations
  • The opportunity to work with and learn from faculty who are recognized internationally for their expertise and contributions in information assurance from Northeastern’s  Khoury College of Computer Sciences , the Department of Electrical and Computer Engineering, and the College of Social Sciences and Humanities
  • The   Institute of Information Assurance (IIA) , an interdisciplinary research center overseen by both the  Khoury  College of Computer  Sciences  and the department of Electrical and Computer Engineering in the College of Engineering and the recipient of a National Science Foundation grant to train the country’s next generation of cybercorps
  • The   International Secure Systems Lab , affiliated with Northeastern, a collaborative effort of European and U.S. researchers focused on web security, malware and vulnerability analysis, intrusion detection, and other computer security issues
  • The   ALERT Center , where Northeastern is the lead institution, a multiuniversity Department of Homeland Security Center of Excellence involved in research, education, and technology related to threats from explosives
  • Learn more.

Experiential Learning

Northeastern combines rigorous academics with experiential learning and research to prepare students for real-world engineering challenges. The Cooperative Education Program , also known as a “co-op,” is one of the largest and most innovative in the world, and Northeastern is one of only a few that offers a Co-op Program for Graduate Students. Through this program students gain industry experience in a wide variety of organizations, from large companies to entrepreneurial start-ups, while helping to finance their education. Students also have the option to participate in the university’s Experiential PhD program .

two women working at computer

Academic Advising

The Academic Advisors in the Graduate Student Services office can help answer many of your questions and assist with various concerns regarding your program and student record. Use the link below to also determine which questions can be answered by your Faculty Program Advisors and OGS Advisors.

  • Graduate Student Services

Admissions & Aid

Ready to take the next step? Review degree requirements to see courses needed to complete this degree. Then, explore ways to fund your education. Finally, review admissions information to see our deadlines and gather the materials you need to Apply.

  • Degree Requirements
  • Degree Requirements - Advanced Entry
  • Tuition & Financial Aid
  • Admissions Information

M.S. in National Cybersecurity Studies (NCSS)

We are one of a few graduate programs in the country that is devoted to the study of U.S. national cybersecurity, and the second in the California State University system. The program was founded in 2015.

Our fully accredited Master’s program (M.S.) provides a comprehensive curriculum with foundations in strategy and strategic studies for students interested in pursuing careers in service for the U.S. government (USG). NCSS alumni serve in many different career fields, including defense, security, and intelligence. Federal service includes the various agencies of the U.S. Intelligence Community such as:

  • Air Force Intelligence Agency (AFIA),
  • Central Intelligence Agency (CIA),
  • Defense Intelligence Agency (DIA),
  • Department of Homeland Security (DHS),
  • Federal Bureau of Investigation (FBI),
  • National Geospatial-Intelligence Agency (NGA),
  • Office of Naval Intelligence (ONI), and
  • National Security Agency (NSA)

In addition, alumni serve in the Government Accountability Office (GAO), branches of the U.S. Armed Forces, the Congress, the Department of Defense (DOD), and the Department of State (DOS).

Other alumni have pursued careers in law enforcement, including federal agencies such as the Drug Enforcement Administration (DEA), the FBI, Border Patrol, and Immigration and Customs Enforcement (ICE), as well as state and local agencies, with some appointed to their area Joint Terrorism Task Force (JTTF).

Please peruse the site for additional information about our programs, admissions requirements, and news. Thank you for your time and consideration to learn more about NCSS.

UC Berkeley School of Information - home

  • Certificate in Applied Data Science
  • What is Cybersecurity?
  • MICS Class Profile
  • What Is Data Science?
  • Careers in Data Science
  • MIDS Class Profile
  • Study Applied Statistics
  • International Admissions
  • Fellowships
  • Student Profiles
  • Alumni Profiles
  • Video Library
  • Apply Now External link: open_in_new

Home / Cybersecurity

The Master of Information and Cybersecurity Delivered Online from UC Berkeley The Master of Information and Cybersecurity Delivered Online from UC Berkeley The Master of Information and Cybersecurity Delivered Online from UC Berkeley

Request more information.

phd cyber security california

Earn Your Master’s Degree in Cybersecurity Online

The UC Berkeley School of Information’s (I School) Master of Information and Cybersecurity (MICS) is an accredited online program that prepares students with the cybersecurity skills needed to assume leadership positions in private-sector technology companies as well as government and military organizations.

Our holistic approach to cybersecurity develops students’ understanding of information security technologies as well as the economic, legal, behavioral, and ethical impacts of cybersecurity. Students graduate as competitive candidates in the job market with connections to UC Berkeley alumni and professionals in the San Francisco Bay Area technology hub.

Why UC Berkeley

Requirements

Back to Top

phd cyber security california

A Leadership-Focused Curriculum

The interdisciplinary MICS curriculum provides students hands-on practical experience with secure systems and applications, an understanding of the legal requirements associated with cybersecurity, and the ability to lead, manage, and contribute to building cybersecurity solutions.

Students master core technical skills and become fluent in the business, political, and legal context of cybersecurity. They can expect to graduate with a comprehensive understanding of the following:

  • Secure coding
  • Government and national security
  • Network and web security
  • Usable privacy and security
  • Cryptography
  • Operating system security
  • Security in context: legal, behavioral, and ethical issues
  • Privacy engineering

The curriculum includes the following courses:

Beyond the Code: Cybersecurity in Context

Network Security

Software Security

Cryptography for Cyber and Network Security

Operating System Security

Managing Cyber Risk

Government, National Security, and the Fifth Domain

Usable Privacy and Security

Privacy Engineering

The online MICS program is nine courses (27 units) and can be completed in 20 months. Students complete foundation courses, electives, and a capstone project. They also attend one in-person immersion on the UC Berkeley campus or in another location relevant to cybersecurity.

Featured Courses

Students learn about the mathematical and practical foundations of cryptography and the many different cryptosystems.

Students compare approaches to security taken among several modern operating systems and learn techniques for establishing trust across a set of interoperating systems.

Students survey privacy mechanisms applicable to systems engineering, with a particular focus on the inference threat arising due to advancements in artificial intelligence and machine learning.

View the full curriculum and course descriptions.

Become Certified in Applied Data Science

Students earning their Master of Information and Cybersecurity online have the option to apply to our Certificate in Applied Data Science. The program introduces the tools, methods, and conceptual approaches used to support modern data analysis and decision making in professional and applied research settings.

Learn more about the Certificate in Applied Data Science.

Become an Expert in Cybersecurity

Earn Your Master of Information and Cybersecurity Online

Why a Master’s in Cybersecurity from UC Berkeley?

Cybersecurity permeates almost all aspects of the human experience. Individuals, organizations, and societies are protected from cyber threats constantly without even realizing they occur. This is thanks to professionals who understand the  complex relationship between human behaviors and advanced technology in securing information .

UC Berkeley is where the  brightest minds from across the globe come together  to explore, ask questions, and improve the world. Our MICS program does more than create experts in information security; it shapes  leaders who understand the implications of cybersecurity  across all industries and want to drive the future of innovation in cybersecurity.

Developed by faculty from the School of Information and the College of Engineering, the interdisciplinary MICS curriculum focuses on  the intersection of technical, social, political, economic, legal, military, and ethical  components of cybersecurity. Students graduate with versatile knowledge needed to lead cybersecurity in private, public, or philanthropic sectors and with connections to nearby technology hub Silicon Valley.

Learn more about UC Berkeley’s cybersecurity perspective.

Interactive Online Learning

Students in the online master’s in cybersecurity program attend classes and complete course work online. The program features:

  • Live online classes taught by I School and College of Engineering faculty
  • Self-paced course content accessible 24/7
  • In-person immersions with classmates and faculty
  • Personalized support from admission to graduation
  • Career resources, including personalized coaching, job-search tools, industry connections, and company visits

I School Community

The I School is a graduate research and education community committed to expanding access to information and improving its usability, reliability, and credibility while preserving security and privacy. We are dedicated to preparing our students with the skills needed to design and understand the systems that will shape the way humans live and interact in the future.

This requires the insights of scholars from varied fields — information and computer science, design, social sciences, management, law, and policy. We bring together this diverse group of faculty to teach the online MICS curriculum and to prepare students from around the world to become leaders in the field of cybersecurity.

Center for Long-Term Cybersecurity

The Center for Long-Term Cybersecurity (CLTC) is a research hub housed at the I School. Founded with a grant from the Hewlett Foundation in 2015, the center seeks to create dialogue among industry, academia, policy makers, and practitioners around a future-oriented conceptualization of cybersecurity. The CLTC serves as a resource for students and faculty interested in cybersecurity and is committed to bringing practitioners and scholars to campus for an ongoing dialogue about cybersecurity.

Global Alumni Network

As of 2017, I School alumni are working in 35 states and 39 countries around the world. They can be found in all industries, from traditional to emerging, as well as in public service and academia. Alumni are engaged and involved in the I School community, both on campus and worldwide.

Gain the Skills Needed to Shape the Future of Cybersecurity

phd cyber security california

Requirements for the Master’s in Cybersecurity Online Program

When evaluating applicants, we consider both qualitative and quantitative factors to determine if they can meet the demand of the rigorous MICS program. This includes:

  • Academic course work and performance
  • Work experience
  • Statement of Purpose
  • Letters of recommendation
  • Graduate Record Examination (GRE) or Graduate Management Admission Test (GMAT) score —  optional

View additional application requirements.

What Can You Do with a Master’s in Cybersecurity?

Cybersecurity’s growth is turning it into a massive market with an increased demand for skilled cybersecurity labor.  Due to constant evolution and escalation of threats, cybersecurity has become one of the most important and exciting career fields of the 21st century.

The United States Bureau of Labor Statistics (BLS) projects employment of information security analysts to grow 33% from 2020 to 2030, equating to an average of 16,300 new positions each year. 1

The cybersecurity industry is met with the challenge of not only filling the growing demand and talent shortage but with finding highly skilled professionals who can be trusted to effectively protect information systems. This creates an opportunity for graduates of the MICS program to enter the in-demand market as competitive cybersecurity experts.

Career Opportunities in Cybersecurity

No organization that operates online can ignore cybersecurity. With cyber threats growing and constantly changing, businesses, governments, and not-for-profit organizations are making significant investments in cyber defenses and hiring increasingly large numbers of cybersecurity professionals.  As a result, the employment of information security analysts is projected to grow 33 percent in computer systems design and related services from 2020 to 2030, according to the Bureau of Labor Statistics. 1

MICS graduates are poised to enter this market in leadership roles with the requisite multifunctional skill sets and strong network provided by the MICS program.

Cybersecurity Salaries

As cyber and information professionals gain more education and experience, the compensation numbers become even more attractive, as shown by the CareerOneStop median salaries for the following positions: 2

Software developer

Computer information systems manager

Learn more about the program and meet MICS faculty during online or in-person events.

Attend an Upcoming Event

Application Deadlines

There are three program start dates throughout the year, and applications are reviewed on a rolling basis. The final deadline for the September 2024 cohort is  May 22, 2024 .

See Upcoming Deadlines

Admissions Requirements

Applicants should have a strong computational background and a desire to become a specialized professional in the field of cybersecurity.

Review Admissions Requirements

Fill the Skilled Cybersecurity Professional Shortage

Take the next step and earn your Master of Information and Cybersecurity from UC Berkeley.

LinkedIn logo

Return to footnote reference 1 Information Security Analysts.  Accessed October 2021. arrow_upward Return to footnote reference Return to footnote reference 2 https://www.careeronestop.org .  Accessed October 2021. arrow_upward Return to footnote reference

JavaScript seems to be disabled in your browser. For the best experience on our site, be sure to turn on Javascript in your browser.

Center for Technology & Management Education

  • Create an Account

Caltech Cyber Bootcamp

Image of Cyber Analyst Working in Security Operations Center

Who Should Attend

This program is ideal for entry-level analysts and professionals eager to start a career as a cyber professional or transition from an adjacent information technology field. Technologists, business and forensic analysts, researchers, consultants, engineers, and creative thinkers with 1–5 years of experience in data collection, accounting, and reporting are welcome. In addition, the Caltech Cybersecurity Bootcamp is perfect for small teams and groups who need to build a comprehensive and uniform set of skills and capabilities.

Picture of CTME Executive Director Rick Hefner

IMAGES

  1. Top 10 UNIVERSITIES in CALIFORNIA FOR CYBER SECURITY

    phd cyber security california

  2. fully funded phd in cyber security in usa

    phd cyber security california

  3. Cybersecurity Graduate Programs 2024+

    phd cyber security california

  4. University of San Diego Cyber Security Masters Programs

    phd cyber security california

  5. 10 Best PhD in Cyber Security Online [2024 Guide]

    phd cyber security california

  6. PHD Support

    phd cyber security california

VIDEO

  1. Start Your Coding Journey: Certified Junior Software Developer Training

  2. WebAppAttackVectorEnumerator 1.0

  3. Smart Phone Security

  4. Dr Sridhar Adepu

  5. Stanford Seminar

  6. MEng Cyber Security, University of Limerick #StayCurious

COMMENTS

  1. Cybersecurity Degree Programs in California

    Cybersecurity PhD degrees in California. A PhD degree, or a doctoral degree in cybersecurity, is designed for people looking to develop research expertise in the field. Often PhD recipients work in specialized niches within cybersecurity such as in academia, in government-supported research institutions, or at technical executive roles within ...

  2. Computer Science PhD in Security

    PhD in Security. The College of Engineering and Applied Science at UCCS offers a new Security specialty in the Ph.D. Security degree program, starting in Fall 2008. The nation-wide unique specialty offers the security curriculum for students to study and conduct multi-disciplinary research in areas of cyber security, physical security, and ...

  3. Earning A Ph.D. In Cybersecurity: Everything You Need To Know

    A Ph.D. in cybersecurity prepares graduates for advanced, high-level job opportunities, including roles in research, education and management. Cybersecurity Ph.D. programs allow students and ...

  4. Best Cyber Security Schools In California

    The best graduate cyber security schools in California offer fantastic programs filled with courses in cryptography, network security, and intrusion detection that will equip you with the skills you need to excel in this competitive field. In the following section, you'll find a list of the best schools for master's and PhD programs for ...

  5. Doctoral Programs in Computer Science and Engineering

    Updated January 2023. PhD Program Overview. The following requirements are for students who entered the program starting Fall 2018 or later. If you entered Doctoral Program prior to Fall 2018 see our Former Curriculum Requirements. CSE offers Doctor of Philosophy degrees in Computer Science and in Computer Engineering, providing a research-oriented education in preparation for a research ...

  6. Cybersecurity Degree Programs at USD

    As cyber attacks threaten the security, prosperity and privacy of the United States and its citizens, the University of San Diego launched its Center for Cyber Security Engineering and Technology (CCSET) to address these challenges through education and training. A collaboration between USD's Shiley-Marcos School of Engineering and Professional ...

  7. Doctoral Degrees in Cybersecurity

    Cybersecurity doctorates offer two programs — the Ph.D. (doctor of philosophy degree) or the D.Sc. (doctor of science degree). The Ph.D. focuses on research and theory while the D.Sc. emphasizes application and action. Students who earn a Ph.D. generally want to add to the body of research or teach at the postsecondary level.

  8. Cybersecurity Graduate Programs in California 2024+

    Cybersecurity graduate programs are specialized postgraduate degrees that focuses on the study and practice of cybersecurity. These programs may focus on network security, information systems security, digital forensics, data protection, ethical hacking, network security, cryptography, forensics, risk management, and more.

  9. Information and Cybersecurity: MICS

    The Master of Information and Cybersecurity is designed to be completed in 20 months. Students will complete 27 units of course work over five terms, taking two courses (6 units) per term for four terms and a one 3-unit capstone course in their final term. MICS classes are divided into foundation courses (9 units), a systems security ...

  10. UCSD CSE -- Security and Cryptography

    Welcome to the web page for security and cryptography research in the Department of Computer Science and Engineering at the University of California at San Diego.Our group conducts research in areas spanning from theory to practice: we work on the theoretical foundations of cryptography; the development and analysis of cryptographic protocols and algorithms; and on applied cryptography ...

  11. List of Online Cybersecurity PhD Degree Program Options

    All figures below are based on out-of-state tuition rates. $32,940 is the most affordable online PhD program and its available at the University of Cumberlands. $56,004 is the average cost of the 14 online cybersecurity PhD programs. $85,248 is the highest tuition and is at the University of North Texas.

  12. Cybersecurity, General and Technology Specialization, PhD

    The Doctor of Philosophy in Cybersecurity (PhD-CY), General and Technology specialization degree builds on the core computing principles and cybersecurity best practices, frameworks, and models. The degree provides a broad overview, adding governance and strategic views to compliment forensic, software development cloud, and systems ...

  13. Cybersecurity

    University of California, Riverside. 900 University Ave. Riverside, CA 92521. Tel: (951) 827-1012

  14. Doctor of Philosophy in Cybersecurity (PhD-CY)

    As a graduate of National University's Doctor of Philosophy in Cybersecurity (PhD-CY), you'll be able to: Advance theory and practical applications of cybersecurity. Formulate cybersecurity governance, policy, risk, and compliance. Assess internal and external threats and vulnerabilities to reduce organizational cyber risk.

  15. PhD in Cybersecurity

    Using technology for a more secure world. The PhD in Cybersecurity program prepares students to advance the reliability and security of data networks and information systems as researchers, faculty members, and policy advisors. In addition to focusing on the use of technology to address global threats, the program investigates how law, policy ...

  16. Online PhD in Cybersecurity

    PhD in Cybersecurity Program Outcomes. Formulate solutions to cybersecurity problems. Evaluate the scope and impact of emerging technologies in cybersecurity on a local and global scale. Manage legal, ethical, and security risks in technology-based systems. Explain concepts and arguments associated with cybersecurity.

  17. Cyber Security Engineering (MS)

    Associate Director of Informatics: Clifford Neumann, PhD The Master of Science in Cyber Security Engineering is intended for: a) graduate students who desire to obtain jobs in which computer security knowledge and skills are required; b) graduate students who wish to continue on a path toward enrollment for a doctoral degree focusing on information security; c) individuals in degree programs ...

  18. Cybersecurity, PhD Degree

    Overview. A research-based, interdisciplinary Doctor of Philosophy (PhD) in Cybersecurity combines a strong security technical foundation with a security policy and social sciences perspective. It seeks to prepare graduates to advance the state of the art of security in systems networks and the internet in industry, academia, and government.

  19. M.S. in National Cybersecurity Studies (NCSS)

    We are one of a few graduate programs in the country that is devoted to the study of U.S. national cybersecurity, and the second in the California State University system. ... National Security Studies and National Cyber Security Studies Program Office Email: [email protected]. Footer Region. California State University, San Bernardino 5500 ...

  20. Master's in Cyber Security

    Interactive Online Learning. Students in the online master's in cybersecurity program attend classes and complete course work online. The program features: Live online classes taught by I School and College of Engineering faculty. Self-paced course content accessible 24/7. In-person immersions with classmates and faculty.

  21. CTME

    Program Overview. The Caltech Cybersecurity Bootcamp, powered by Simplilearn, helps you keep your job while learning the skills you need to grow your career as a cyber defender over 26 weeks—or commit to a full-time program and earn your certificate in only three months. With Simplilearn, which also operates the Caltech Data Analytics ...

  22. 8 Cybersecurity Fellowships at All Career Levels

    8 Cybersecurity Fellowships at All Career Levels. Sep 02, 2022. As technology continues to advance, there's a growing demand for cybersecurity specialists and analysts. Pursuing cybersecurity fellowships is a great way to build skills and get your foot in the door of this rapidly growing industry. Recent research suggests that a rise in major ...

  23. Everything You Should Know About Earning A Master's In Cybersecurity

    You can tailor your graduate curriculum to fill marketwide skill gaps, such as cloud computing security, as reported in the 2023 ISC2 Cybersecurity Workforce Study. Opt for a master's program ...

  24. How To Become A Cybersecurity Engineer: Salary, Education and ...

    According to Payscale, these engineers make an average base cybersecurity salary of over $101,000. Their wages are likely to increase as they gain experience and earn certifications. Junior ...

  25. Cybersecurity and Data Policy Intern (Infosys InStep Flagship Summer

    Infosys InStep - Open to Freshmen, Sophomores, and Juniors (and select MS and PhD interns) Ranked No.1 in the world, InStep is an internship that gives students the opportunity to work on challenging projects in trending technology areas such as AI, Big Data, Analytics, Machine Learning, Cyber Security, Machine Modernization, IT, IoT, Mobile ...

  26. Cybersecurity Certifications For Beginners: Everything You Need To Know

    The cost of a cybersecurity certification ranges from about $250 to around $980. Certifications with lab requirements may cost $1,500 or more. Generally speaking, cybersecurity employers do not ...

  27. MSP Cyberattacks Part Of US Accusations Against Chinese Group

    As part of the campaign, the group of alleged cyber attackers targeted and gained access to the networks of seven unnamed MSPs in New York, California, Massachusetts, Colorado, Idaho and overseas ...