Edited By Christine Skopec
Review & Contribution By Kira McDonald
Pursue a Ph.D. in Cybersecurity to advance knowledge in protecting information systems and addressing emerging threats in today’s digital landscape through innovative research and solutions.
The growing number of Ph.D. programs in cybersecurity reflects the industry’s expansion. As the skillsets required for cybersecurity professionals evolve, so do the types of programs available—both online and on-campus. Beyond computer science, experts now receive training in law, politics, management, and strategy, as nearly all sectors rely on technological infrastructure for routine tasks. An online or on-campus Ph.D. in cybersecurity can lead to senior, responsible, and high-paying roles across various settings and offers excellent career prospects. For example, the employment of information security analysts is expected to expand by 33% [1], much faster than the average for all occupations.

Table Of Contents
Featured Online PhDs in Cybersecurity Programs
Find the Best Ph.D in Cybersecurity Programs
Almost every student aspires to pursue advanced studies at a prestigious university. However, finding the best colleges for an online Ph.D. in cybersecurity can be challenging, as several factors must be considered when ranking them. These factors include the school’s reputation, infrastructure, curriculum, accreditation, research facilities, availability of thesis mentors, affordability, and more. Using oura proprietary formula and methodology, FBD teams have identified some of the top schools offering Ph.D. programs in cybersecurity. The following is the ranking list:
Univ | Address | Tuition | Grad Rate |
Capitol Technology University | 11301 Springfield Rd, Laurel, Maryland 20708 | $11,340 | 51% |
Universities and programs are ranked by various factors, such as affordability, curriculum and coursework, reputation and availability, program length, statistics, the potential of employment, and return on investment for the students. For a more in-depth analysis, please read about our rankings methodology page.
What to Expect from a Ph.D in Cybersecurity Degree Program
Ph.D. in cybersecurity programs prepare students for high-level positions defending networks and computer systems from attacks. This doctoral study concentrates on advanced topics in research methodology, information assurance, leadership, and professional ethics. While every program is different, doctoral candidates typically complete their Ph.D. in cybersecurity in 4 to 5 years, taking an average of 60 credits.
Ph.D in Cybersecurity Online vs On-Campus Ph.D in Cybersecurity
A Ph.D. in cyber security can be pursued online or on-campus, with each format offering unique benefits. An online Ph.D. provides flexibility, allowing students to balance their studies with professional or personal commitments, and is ideal for working professionals. On-campus Ph.D. programs offer direct access to faculty, research labs, and collaborative opportunities, which can enhance hands-on learning experiences. Both options cover the same advanced topics, including cybersecurity research, risk management, and emerging security technologies. The decision between online and on-campus often depends on a student’s personal schedule, learning preferences, and access to university resources.
Program Structure, Coursework, and Dissertation
Many universities in the U.S. offer cybersecurity Ph.D. programs, also known as the Doctor of Philosophy in Cybersecurity. Additionally, some institutions provide alternatives such as Doctor of Science (DSc) or Doctor of Professional Studies (DPS) degrees. Students can choose from online, on-campus, or hybrid study formats. The curriculum typically includes courses in research methodology, electives, and dissertation writing. Some of the core courses they can expect in the program include but are not limited to:
- Professional Research Theory and Practice
- Managing Cybersecurity Risk
- Introduction to Software Security
- Advanced Computer Security
- Law, Policy, Ethics, and Compliance
- Network Security
- Hardware System Security
- Software Vulnerabilities and Security
In addition, students are required to pick electives from various tracks, such as:
Hardware Security: Compilers, Computer Architecture, Computer Hardware Security, etc.
Machine Learning: Deep Learning, Machine Learning in Cybersecurity and Privacy, Advanced Machine Learning, etc.
Network Security: Wireless Networks, Foundations of Distributed Systems, Mobile and Wireless Networking, etc.
Systems Security: Intensive Computer Systems, Computer System Security, Computer Architecture, etc.
Theory: Advanced Algorithms, Complexity Theory, Information Theory, etc.
Security & Privacy: Visualization for Network Science, Qualitative Methods, Statistical Analysis, etc.
Cybersecurity Policy: Evidence-Based Crime Policy, Security and Resilience Policy, Cyberconflict, etc.
Other critical components of the Ph.D. in cyber security program are (varies by institution):
Teaching:
In many instances, Ph.D. students must fulfill a teaching requirement. This criterion is met when the student works as a teaching assistant (TA) or instructor of record (IoR) for at least one semester.
Residency:
Some schools require one year of continuous full-time study. During this time, the student is expected to make significant progress in preparing for the comprehensive examination.
Comprehensive Exam:
After completing the required curriculum, students can take a comprehensive exam. Most students opt to compose a manuscript on a chosen topic and defend it orally in front of a committee of departmental, school, and/or university teachers.
Dissertation & Defense:
A Ph.D. student must write and present a dissertation proposal to the dissertation committee. The research challenge, study plan, and possible impact on the field should all be identified in the proposal. The proposal will be presented in an open forum, and the student must successfully defend it before the dissertation committee following the public presentation. Examples of cybersecurity research subjects that could be made into dissertation topics include:
- Operation Security (OpSec) Strategy and Policy
- Internet Advertising Targeting and Privacy
- Cybersecurity Forensics and Enforcement
- Network Infrastructure and Defense
- Policies and Best Practices Around Passwords
- Policies Around Encryption and Privacy
- Ways to Defend Against the Rise of Bots
- Corporate Responsibility for Employee Security
- Cybersecurity Law and Policy
- The Role of Ethical Hacking
- The Vulnerabilities of Biometrics
- The New Frontier of Social Engineering Attacks
To understand more about Ph.D. programs, students can refer to the Guide to Ph.D. Programs.
Learning Outcomes and Skills Gained
Cybersecurity is one of the most in-demand professions and areas of study in computer science and IT. Almost every organization prioritizes information security due to the widespread adoption of computing. Even though they demand a sizable time and financial commitment, students with a Ph.D. in cybersecurity can benefit from the degree and access the highest levels of management, academic, and research positions in cybersecurity. Graduates acquire new skills, establish crucial professional relationships, and become eligible for higher-paying, more prestigious jobs.
Through a Ph.D. in cybersecurity, students can gain new knowledge and advance their technical skills to keep up with the rapid pace of technological change, for which cybersecurity professionals must constantly acquire new skills. They will have the opportunity to network with classmates, instructors, and other cybersecurity experts and use these connections to seek job opportunities in management, academic research, and teaching after graduation.
Highly qualified and experienced cybersecurity professionals are paid well. For example, the median annual salary for information security analysts was $120,360 in 2023[1], arguably making it a significant return on one’s educational investment in a Ph.D. in cyber security. Additionally, the skills that students can gain to help them advance and achieve higher salaries include the ability to:
- analyze resources, information, and procedures to improve security and promote resilience;
- assist in preventing the loss of important information resources in the present and the future;
- understand cybersecurity’s advanced theory and real-world applications;
- lower organizational cyber risk by evaluating threats and vulnerabilities both internally and externally;
- demonstrate knowledge and skill in the core areas of the discipline, such as networking, data analysis, and a disciplinary specialization pertinent to cyber studies;
- display research prowess and conduct research in line with the scholarly cyber security community;
- create cybersecurity policy, governance, risk, and compliance framework;
- write and submit scholarly papers to peer-reviewed conference proceedings and journals that will help others expand their understanding of cyber topics and
- create strategic thought leadership for issues with cybersecurity operations and architecture.
Areas of Specialization for Ph.D in Cybersecurity Students
Specializations are an excellent way to study a niche topic within the subject domain. Some PhD in cyber security programs include concentrations that allow students to focus on a specific area of the field related to their career goals or personal interests. Here are some examples of online Ph.D. cybersecurity specializations:
Area of Specialization | Description | Career Options |
---|---|---|
General and Technology | This specialization equips scholars to tackle complex cybersecurity challenges. This specialization combines theoretical foundations with practical applications, covering network security, risk management, and emerging technologies. Graduates contribute to the field through innovative research, policy development, and cybersecurity education. | • Cybersecurity Analyst • Network Security Engineer • Risk Management Consultant • Cybersecurity Researcher |
Global Strategy and Operations | This specialization prepares students to address cybersecurity challenges in an interconnected world. This program emphasizes strategic planning, risk assessment, and operational resilience across global networks. Graduates enhance organizational security while aligning cybersecurity initiatives with broader business strategies and international standards. | • Chief Information Security Officer (CISO) • Global Security Strategist • Cybersecurity Operations Manager • Business Continuity Manager |
Governance Risk and Compliance | This specialization focuses on the frameworks and policies that guide organizational cybersecurity practices. This program equips scholars with expertise in risk management, regulatory compliance, and governance structures. Graduates develop strategies to ensure organizations effectively manage risks while adhering to legal and ethical standards. | • Compliance Officer • Risk Management Analyst • Cybersecurity Policy Advisor • Information Security Auditor |
Secure Cloud Computing | This specialization examines the security challenges and solutions associated with cloud environments. This program emphasizes advanced encryption techniques, access control, and data protection strategies. Graduates design secure cloud architectures and contribute to policies that enhance trust and safety in cloud-based systems. | • Cloud Security Architect • Cloud Solutions Engineer • Data Protection Officer • Security Consultant for Cloud Services |
Full-Time and Part-Time Ph.D. Programs
Here, a Ph.D. in cybersecurity will “take 3.5 “or 7 years to complete, though some programs can be finished in as little as three years, while others may take as long as eight years. Ph.D. students’ research and writing are typically extensive and focused on their chosen field of study, whether in an online or on-campus setting; thus, the time spent on it will influence the overall duration of the program. Therefore, students must consider their time commitment before enrolling in a Ph.D. in cybersecurity program. The time commitment for a doctor of philosophy in cybersecurity looks like this:
- Minimum time required for a full-time Ph.D. in cyber security: about 3.5 years.
- The maximum time required for a Ph.D. in cyber security is up to 8 years.
- The typical time frame to complete a Ph.D. in cyber security is about 3.5 to 7 years.
Accelerated Ph.D in Cybersecurity Programs
In most cases, students who take advantage of accelerated learning opportunities can complete their studies sooner. A Ph.D. in cybersecurity can be earned in as few as three years through a streamlined doctoral program; however, completing the dissertation may take an additional year after finishing the required coursework. At some institutions, master’s degree students may enter a doctoral program, allowing them to “upgrade” their master’s thesis to the doctoral dissertation level. Prospective students should consult with faculty members to explore options for progressing quickly through their Ph.D. in cyber security program.
Doctor of Philosophy in Cybersecurity
A Doctor of Philosophy in Cybersecurity is a highly specialized program that prepares experts to address advanced cybersecurity challenges. Students in this program conduct rigorous research in areas such as network security, cryptography, data protection, and cyber risk management. Typically requiring around 4 to 5 years, the program combines extensive coursework with independent research, often culminating in a dissertation that advances knowledge in a specific cybersecurity domain. Graduates gain critical skills in problem-solving, analytical thinking, and advanced technical expertise, positioning them for leadership roles in academia, government, and industry. This degree prepares professionals to contribute to policy development, cybersecurity infrastructure, and emerging technologies in a rapidly evolving field.
Requirements for Getting into a Ph.D in Cybersecurity Program
Admission requirements for doctoral programs in cyber security typically include a master’s degree from a regionally accredited institution or an equivalent degree from an internationally recognized institution. On top of that, a GPA of 3.0 or higher (on a 4.0 scale) is usually required. Applicants to some schools may also need to identify a faculty member willing to act as an academic advisor or mentor for their studies. Other frequent admissions requirements for a Ph.D. in cyber security program include:
- Online Application & Application Fee: Completing an online application and paying the prescribed application fee.
- Academic Transcripts: An official copy of academic transcripts from each college/university attended.
- Undergraduate/Graduate Degree + Grade Point Average: An undergraduate and/or graduate degree and Grade Point Average (GPA) of 3.2 or more.
- Graduate Record Examination (GRE) or Graduate Management Admission Test (GMAT) Scores: An official copy of GRE scores no older than five years.
- Graduate Résumé or Curriculum Vitae: The latest résumé or CV that provides personal information and work experience.
- Personal Statement or Statement of Purpose: A statement outlining how the program relates to the applicant’s career goals.
- Letters of Recommendation: At least three letters of recommendation from those who can provide a thorough evaluation of the applicant’s abilities at the graduate level.
- Proof of English proficiency: A document proving proficiency in English (for non-native English speakers).
No GRE Ph.D in Cybersecurity Programs
The GRE (Graduate Record Examination) is a standardized test used for admissions to graduate schools, assessing verbal reasoning, quantitative reasoning, and analytical writing. Many universities have begun waiving the GRE requirement due to various factors, such as recognizing systemic biases in standardized testing, focusing on holistic admissions processes, and the desire to increase accessibility for diverse student populations. Schools may also evaluate applicants based on GPA, work experience, and letters of recommendation instead. Students must check with the admissions office of their chosen college for exact information. National University[2] and Northeastern University [3]are examples of universities that offer a doctor of philosophy in cybersecurity with No GRE.
How to Ensure a Ph.D in Cybersecurity Program Is Accredited
Cybersecurity is one of the fastest-growing industries in the world. Employers prefer to put their money into employees who prove to be dependable, skilled, and qualified. Companies would hire candidates with legitimate degrees in cyber security rather than those with questionable credentials. Therefore, choosing a reputable university with an online Ph.D. in cyber security program is crucial. Independent organizations recognized by the U.S. Department of Education (USDE)[4] and the Council for Higher Education Accreditation (CHEA)[5], which includes the following six regional accreditation agencies, can grant accreditation to colleges:
- New England Commission of Higher Education (NECHE)
- Middle States Commission on Higher Education (MSCHE)
- Higher Learning Commission (HLC)
- Southern Association of Colleges and Schools Commission on Colleges (SACSCOC)
- Northwest Commission on Colleges and Universities (NWCCU)
- Western Association of Schools and Colleges (WASC) Senior College and University Commission (WSCUC)
Some cyber security programs may also carry additional accreditation beyond the institution’s. Certification from the National Security Agency (NSA) or other similar organizations may be displayed on the websites of colleges offering PhD in cyber security programs that have met their standards and are part of the Centers of Academic Excellence (CAE)[6] list.
To understand more about accreditation, read the Guide to College Accreditation.
Where to Find Free Online Courses for Ph.D. in Cybersecurity Students
The vast majority of free online courses available over the internet are non-credit and unaccredited. Nevertheless, they can be useful in exam preparation or providing additional input for assignments and research. Here are a few websites where students pursuing an online Ph.D. cybersecurity can find free courses:
Course | Description | Provided by |
---|---|---|
Certified Social Media (Network) Cyber Security & Analysis: Level 1[7] | This course equips learners with essential skills to investigate and monitor social media platforms. It focuses on gathering social media intelligence (SOCMINT), an aspect of Open-Source Intelligence (OSINT), from platforms like Facebook, Twitter, and Instagram to enhance cybersecurity efforts. | Alison |
Cybersecurity Incident Response Planning & Management[8] | This course teaches how to develop and implement a Cyber Incident Response Plan (CIRP) to handle cyber attacks effectively. It covers IT Service Management (ITSM) aspects, crisis management, communication strategies, and the five key components of a CIRP, ensuring organizational readiness during incidents. | Alison |
Diploma in Digital Forensic Investigation[9] | This course provides beginners and intermediates with essential skills for conducting forensic investigations. It covers key processes like data acquisition, malware analysis, and network forensics. These in-demand skills will enhance your expertise and give you a competitive edge in pursuing job opportunities in the cybersecurity field. | Alison |
Ways to Pay for a Ph.D in Cybersecurity Degree
The cost of earning a Ph.D. in cyber security is substantial. According to Education Data[10], the average cost of a Ph.D. in the United States is $133,340. Some prospective online students may find the high tuition and research expenses unaffordable, even without additional out-of-pocket school costs. However, the following external funding opportunities are available for students pursuing an online Ph.D. cyber security, helping to cover some of the expenses:
Scholarships are awarded to individuals who have demonstrated academic and personal excellence. They are the students ‘ first choice because they do not require repayment and are relatively easy to obtain.
Unlike a loan, funding provided through a grant does not need to be paid back. Grants are typically awarded to students who demonstrate a financial need, as opposed to scholarships, which are more commonly awarded for academic achievement.
Student Loans
Ph.D. students can apply for and receive a student loan to cover their education costs. Loans for higher education are available from various sources, including private lenders and the government. Taking out a loan will increase educational expenditures due to the interest charged on borrowed funds. Understand how one can apply for loan forgiveness to avoid repaying student loans by reading about Donors for Student Loans and Grants for Student Loans.
Graduate Assistantships
Graduate assistantships are available to students who work with faculty in a teaching or research capacity. Volunteering students often receive a monetary stipend or a reduction in their tuition fees for their efforts.
The Free Application For Student Aid or FAFSA is an application for federal financial aid that all prospective and current college students must complete to check if they are eligible for aid and receive the best financial aid package possible. The FAFSA Student Aid guide explains more.
Work-Study Programs
College students who participate in work-study programs can earn money for their education while still enrolled in classes. Various work-study opportunities provide meaningful connections between classroom learning and real-world experience while bringing in some money.
Fellowships
Predoctoral fellowships, or Ph.D. fellowships, are grants to doctoral students. Accepting a fellowship as a Ph.D. student frequently comes with strings attached, such as a required project or the use of funds. Several awards and fellowships are available to assist in retaining or recruiting the most promising students.
Read about what financial aid is and find out everything there is to know about college funding in the How to Pay for College guide.
Fully Funded Ph.D in Cybersecurity
Finding a university with a fully funded Ph.D. program in cybersecurity can be challenging. Doctoral programs are among the most specialized, requiring universities to offer excellent research facilities and state-of-the-art equipment. However, many institutions cover tuition costs for exceptionally bright and hardworking students. Some schools also offer “minimum tuition support,” where students pay only a percentage of the tuition. Additionally, various organizations provide scholarships to cybersecurity Ph.D. students, helping to reduce the program’s overall cost. Examples of such scholarships are:
Career Opportunities and Salaries After Graduating With a Ph.D in Cybersecurity
Organizations and cyber adversaries are locked in an ongoing intellectual and technological “arms race.” As malicious hackers, criminal organizations, and nation-states become more sophisticated, the demand for cybersecurity specialists grows in government, industry, and military sectors worldwide. The need for cybersecurity experts outpaces the availability of skilled candidates for mission-critical roles. A doctorate in cybersecurity can lead to senior positions and higher pay in both private and government sectors.
A cybersecurity professional with a doctorate will likely work in senior management or as a research scientist, with salaries varying widely depending on their expertise and employer. Below are examples of cybersecurity employment, median annual salaries, and projected job growth from the U.S. Bureau of Labor Statistics (BLS). Note that the listed salaries are more representative of what graduates with a bachelor’s or master’s degree in cybersecurity may earn. Those with a doctorate, given their advanced knowledge and experience, typically command higher compensation.
Some of the specific job roles that students can expect to be employed in include:
Occupation | Skills Required | Median Annual Salary | Job Growth (up to 2032) | Job Description |
---|---|---|---|---|
Top Executives[13] | Communication, decision-making, detail-oriented, interpersonal, and proficiency in HRIS software and hardware management. | $103,840 | 6% (faster than average) | Top executives develop strategies and policies to ensure organizations meet their goals. They oversee financial activities, manage operations, consult with other leaders, and appoint department heads. In small organizations, they handle hiring and supervision, while in larger organizations, they focus on strategic planning and delegate daily operations to general managers. |
Computer and Information Research Scientists[14] | Analytical skills, communication skills, business skills, decision-making skills, leadership skills | $145,080 | 26% (much faster than average) | Computer and information research scientists design innovative uses for technology and solve complex computing problems across various fields. They develop theories, collaborate with engineers, and create new tools like software systems and computing languages. Their work enhances hardware efficiency, improves algorithms, and contributes to advancements in machine learning and cloud computing. |
Information Security Analysts[1] | Communication skills, decision-making skills, leadership skills, organizational skills, and interpersonal skills | $120,360 | 33% (much faster than average) | Information security analysts protect an organization’s computer networks and systems by implementing and monitoring security measures. They detect and investigate breaches, maintain security software, assess vulnerabilities, and research the latest IT security trends. Additionally, they develop disaster recovery plans, recommend security enhancements, and assist users with new security products and procedures to ensure organizational protection. |
Computer and Information Systems Managers[15] | Business skills, collaboration skills, communication skills, critical thinking skills, decision-making skills, instructional skills, and leadership skills | $169,510 | 17% (much faster than average) | Computer and information systems managers, or IT managers, oversee an organization’s technology needs by planning, coordinating, and directing computer-related activities. They analyze system requirements, ensure network security, manage IT personnel, and implement hardware and software upgrades. They also assess project costs, negotiate with vendors, and ensure technology aligns with organizational goals, varying by firm size. |
Certifications and Licensing for Ph.D in Cybersecurity Graduates
A cyber security certification is a valuable addition to anyone’s resume. These more advanced certifications demonstrate that the holder has reached an expert level in a particular subfield of cyber security. Even though a doctorate is supposed to be strong evidence of one’s knowledge and ability, having additional credentials can make one more marketable to potential employers. Many companies and groups offer different certifications, including general, vendor-specific, and vendor-neutral (third-party). Here are a few examples:
GIAC Certified Forensic Analyst (GCFA)[16]
The GIAC Certified Forensic Analyst (GCFA) certification validates expertise in advanced digital forensics, emphasizing threat detection, incident response, and evidence analysis. It is designed for professionals investigating cyberattacks, intrusions, and breaches, showcasing their ability to conduct thorough forensic investigations and respond effectively to security incidents.
Certified Information Security Manager [17]
The Certified Information Security Manager (CISM) certification is a globally recognized credential for professionals managing and overseeing enterprise-level information security programs. It demonstrates risk management, governance, incident response, and security strategy expertise. CISM is ideal for leadership roles, highlighting their ability to align security practices with business objectives.
The American Board of Criminalistics [18]
The American Board of Criminalistics (ABC) offers certification for forensic professionals, validating their expertise in various areas of criminalistics. This certification demonstrates a commitment to high standards and ethical practices in forensic science, enhancing credibility and career advancement opportunities for professionals in criminal justice.
Additional Resources for Ph.D in Cybersecurity Graduates
Developing and maintaining relationships with other IT and cyber security professionals is critical for career advancement. Membership in a professional organization can benefit graduates and working professionals by providing access to relevant journals and publications, keeping up to date on the latest developments in their field and cyber threats, and establishing professional connections that can lead to the discovery of innovative solutions. Here are some resources to consider for those who have already earned an online Ph.D. cyber security:
International Association of Computer Science and Information Technology (IACSIT)
The International Association for Computer Science and Information Technology (IACSIT) uses many different methods to advance computer science and information technology. It is a registered international scientific organization made up of experts in computer science and information technology who work together to promote and do research on cutting-edge methods and technologies in their fields.
National Cybersecurity Society (NCSS)
The National Cybersecurity Society (NCSS) is a non-profit group that works to educate, raise awareness of, and advocate for the cybersecurity needs of small businesses. The NCSS helps small businesses figure out their cybersecurity risk, tells owners about threats, and tells them what services they need to stay safe online.
International Association of Privacy Professionals (IAPP)
The International Association of Privacy Professionals (IAPP) is a resource for professionals seeking career advancement by assisting their organizations with risk management and data protection. IAPP asserts to be the world’s largest and most comprehensive information privacy community.
Center for Cyber Safety and Education
Formerly known as the (ISC)² Foundation, the Center for Cyber Safety and Education is a charitable organization committed to making the Internet safer for everyone. Through educational programs, scholarships, and research, the organization strives to ensure a positive and secure online experience for people all over the world.
Information Systems Security Association (ISSA)
The Information Systems Security Association, Inc. (ISSA) is a non-profit international association of practitioners and professionals in information security. It provides its members with publications, educational forums, and opportunities for peer interaction to enhance their knowledge, skills, and professional development.
FAQs About Ph.D in Cybersecurity Programs
Is there PhD in cyber security online?
Yes. Several universities offer online Ph.D. programs in cybersecurity. These programs provide flexibility for working professionals while covering advanced topics like cyber defense, risk management, and research in security technologies. Online Ph.D. programs typically require research, coursework, and a dissertation, with occasional on-campus residencies or exams depending on the institution.
How long does it take to complete a Ph.D. in cyber security program?
Is a Ph.D in cyber security online degree worth it?
What can I do with a Ph.D. in cyber security?
Can I work while pursuing my Ph.D. in cyber security online program?
Does a Ph.D. in cyber security offer on-campus programs?
Are there opportunities for networking and professional development?
Citations:
U.S. Bureau of Labor Statistics: Occupational Outlook for Information Security Analysts
Council for Higher Education Accreditation
Centers of Academic Excellence
Alison- Certified Social Media (Network) Cyber Security & Analysis: Level 1
Alison- Cybersecurity Incident Response Planning & Management
Alison- Diploma in Digital Forensic Investigation
NorthEastern University College of Engineering
U.S. Bureau of Labor Statistics: Occupational Outlook for Top Executives
U.S. Bureau of Labor Statistics: Occupational Outlook for Computer and Information Systems Managers
GIAC Certified Forensic Analyst (GCFA)