Earning an online doctorate information systems security degree prepares managers and executives for the ever-evolving challenges of protecting data and sensitive information from cybercriminals. A study from the Online Trust Alliance found that the rate of business-related cyberattacks doubled from 2016 to 2017; over 159,000 attacks were reported. Most of these attacks could have been prevented with better information security policies and employee training.
For more degree and career information, jump to:
Accredited Online Schools
Online Doctorate in Information Systems Security Programs
Download this Badge
Online Doctorate in Information Systems Degree Program Ranking Guidelines: We selected the degree programs based on the quality of program and range of courses provided, as well as school awards, rankings and reputation.
Our Methodology
Here at TheBestSchools.org, we take the trust and welfare of our readers very seriously. When making our
school and program rankings, our top priority is ensuring that our readers get accurate, unbiased
information that can help them make informed decisions about online education. That's why we've developed a
rigorous ranking methodology that keeps the needs of our readers front and center.
Our proprietary, multi-criteria ranking algorithm analyzes key data indicators — as collected by the
federal government — for each school or program. What data we use depends on the focus of each
specific ranking, but in all cases, our ranking methodology is impartial: Schools cannot buy better rankings at
TBS.
While specific criteria under consideration can vary by ranking, there are a few data points that we
value most highly. They are affordability, academic quality, and online enrollment. Below, we break
down our algorithm to help you understand what you're getting when you use one of our rankings.
Academics
Affordability
Online Enrollment
Data Sources
The data used in TBS rankings comes primarily from the federal government, and much of it is provided by the
schools themselves. We aggregate and analyze this data to build our rankings.
The Integrated
Postsecondary Education Data System (IPEDS) is our primary source. Its data comes from annual
surveys conducted by the U.S. Department of Education's National Center for Education Statistics (NCES). Every college,
university, or technical school with access to federal financial aid must participate in these surveys,
which include questions about enrollment, graduation rates, finances, and faculty qualifications. This is
publicly available data, which you can access yourself through the College
Navigator .
Additionally, because we value a personal touch and the professional experience of our staff and Academic
Advisory Board, we vet all results and adjust rankings as necessary based on our collected knowledge of
schools and degree programs. Depending on the ranking, we may obtain additional input from AcademicInfluence.com ,
subject matter experts, prior TBS ranking lists, or other
sources we deem relevant to a particular ranking.
Breakdown of Our Rankings Methodology
About Our Ranking Factors
Here at TBS, we value what you value: quality education, affordability, and the accessibility of online
education. These factors guide all of our program rankings.
Each of these factors are further broken down into weighted subfactors. For example, retention rates are
weighted more heavily than availability of program options because they are a better indicator of student
success.
We chose the following factors for our rankings because of their influence on learning experiences and
graduate outcomes. However, students should always balance our rankings against their personal priorities.
For instance, a learner who needs a fully online program may prioritize online flexibility more than our
rankings do. Our rankings are designed to help you make a decision — not to make a decision for you.
In all our school rankings and recommendations, we work for objectivity and balance. We carefully research
and compile each ranking list, and as stated in our advertising disclosure, we do NOT permit financial
incentives to influence rankings. Our articles never promote or disregard a school for financial gain.
If you have questions about our ranking methodology, please feel free to connect with our staff
through contact page .
We thank you for your readership and trust.
The Best Online Doctorates in Information Systems Security Programs
Located in central Virginia, Liberty University lies just east of the Blue Ridge Mountains in Lynchburg. As one of the country's largest private nonprofit universities, Liberty's enrollment includes more than 94,000 online students. Liberty offers 349 online programs, including 38 doctoral programs like the doctor of business administration (DBA) in information systems .
Liberty offers all courses in this 60-credit information security systems degree online, although students may take some intensive courses on campus. Liberty suggests students complete three years of consecutive coursework, followed by a year and a half of writing a dissertation, although students may finish the degree sooner. Liberty allows DBA students seeking an online doctorate in information systems security to transfer up to 15 credits. Core courses include topics such as research methods, strategic thinking, and human resource management. The DBA specialization in information systems consists of 12 hours of related coursework.
University of the Cumberlands
Located in the southeastern Kentucky city of Williamsburg, University of the Cumberlands was initially founded in 1888 by a group of Baptist ministers as the Williamsburg Institute. The school became University of the Cumberlands (UC) in 2005 and currently educates approximately 11,500 students, roughly two-thirds of whom are graduate students.
All courses in UC's 60-credit doctor of philosophy in information technology can be taken online at your own pace. The online doctorate in information systems security includes 18 hours of core courses, 18 hours of professional research including a dissertation, and 24 hours of content specialty courses such as cybersecurity. Students learn to use predictive analytics and identify cyberthreats. Students must have completed a master's degree and earned a GPA of 3.0 or above before applying for an information systems security degree online.
Dakota State University, a public university established in 1881, offers an online Ph.D. in information systems with an information assurance and computer security specialization . The program provides students with a fully online option to earn the advanced education they need for a variety of information security careers.
The online Ph.D. program requires a total of 88 credit hours of coursework that includes the following:
a blend of core and specialization courses research courses dissertation work a portfolio a comprehensive exam Students also engage with key concepts such as:
advanced network technology and management network security and intrusion detection cloud computing network services In the program, students develop the knowledge and skills necessary for successfully managing networks, evaluating and implementing security measures, and protecting valuable data.
For admission, students must have at least a bachelor’s degree in a relevant field and have graduated with a 3.0 GPA.
Colorado Technical University
Location
Colorado Springs, CO
Colorado Technical University, a for-profit university founded in 1965, offers a wide selection of online degree programs. These degrees include an online doctor of computer science in cybersecurity and information assurance for students who seek advanced careers in the cybersecurity field.
The online doctorate program requires a total of 100 credit hours. Coursework focuses on theory, research and application of knowledge. The curriculum covers topics such as:
enterprise security architecture security management ethics and compliance information assurance innovation Students complete a blend of core courses, research, and dissertation work to develop mastery of the subject.
The program includes multiple start dates and may be completed in three years of study.
Capella University, an online, for-profit university established in 1993, offers a range of fully-online degrees. These degrees include an online doctor of information technology (DIT) degree and an online doctor in information technology (Ph.D.) degree , both which specialize in information assurance and cybersecurity.
Both programs provide curricula full of advanced knowledge in information assurance and cybersecurity. The Ph.D. program focuses on theory and research, while the DIT program focuses on practice and application. The Ph.D. consists of 90 quarter-credits that include the following:
14 core courses five specialization courses three residencies a comprehensive exam a dissertation The DIT requires 82 quarter-credits that include the following:
12 core courses four specialization courses three residencies a dissertation Both cover topics such as:
network security enterprise security risk management strategic planning and global thinking systems and application security
Northcentral University, an online, for-profit university established in 1996, offers an online Ph.D. in technology and innovation management with a cybersecurity specialization . Designed to meet the demands of the growing cybersecurity industry, the program’s students develop the advanced knowledge necessary for a variety of cybersecurity careers.
The online Ph.D. program requires 60 credit hours for completion. It consists of 20 courses that cover the following topics:
information assurance and security evaluation and implementation of security measures risk management cybersecurity ethics and compliance Weekly courses are delivered asynchronously, offer plenty of schedule flexibility and are taught by a 100% doctoral faculty.
Return to the top
Choosing an Online Doctorate in Information Systems Security Program
An information security systems degree integrates technical skills with policy creation and organizational leadership. Many schools require applicants to complete a graduate entrance exam (such as the GRE) and demonstrate professional experience in computer programming or information systems management. Most schools also require applicants to have a master’s degree; however, some schools do offer integrated master’s and doctoral programs.
The Ph.D. curriculum focuses on applied research in data security, which provides practical solutions to real-world problems. Students study advanced computer programming fieldwork, data analytics, and both quantitative and qualitative research methods. Many schools offer concentrations for specific careers, like healthcare information, human-computer interaction design and information assurance. One should expect to spend three to seven years completing upwards of 60 credits (this varies by program). Online programs often offer flexibility for working professionals, though some require on-campus or fieldwork components.
The dissertation provides a comprehensive evaluation of what students have learned and their ability to apply independent research to organizational challenges. Students often work with a team of mentors to develop a topic in their area of interest as well as conduct research and data analysis. It can take several terms to complete the dissertation, which is typically capped by an oral defense of a student’s research methodology, conclusions and communication skills.
Return to the top
Accredited Online Schools
What Else Can I Expect From an Online Doctorate in Information Systems Security Program?
While exact course requirements vary, earning an information systems security degree online builds upon one’s prior training in computer science and programming. Expect to study theoretical principles and demonstrate the practical application of those principles through projects, a dissertation and an oral defense.
Curriculum for an Online Doctoral Degree in Information Systems Security
Governance, Quality, Compliance, and Ethics: Students study information security regulations and the impact these regulations have on organizational processes. This course also delves into how organizations govern the use of their data, how they recognize when individuals undermine those policies an ethical issues of trust and privacy.
Cryptography: In this course, students learn about encryption protocols and the mathematical foundations of modern cryptography. Students also learn to build secure encryption protocols from cryptographic primitives.
Information Retrieval: Students in this class study the technology that powers internet search engines, which includes text analysis, ranking algorithms and data retrieval. They learn to establish metrics to determine effectiveness, classification and data clustering.
Security Management: In security management courses, students learn to create data security frameworks for organizations. In addition to data security, the course also examines risk mitigation for internal or external security breaches.
Information Assurance: Students in information assurance courses learn to audit organizational security plans and network architectures. They learn how to identify potential risks and develop mitigation strategies by aligning information security with business goals. Students often create a plan that incorporates policy, security standards and information compliance.
Return to the top
Careers With a Doctorate in Information Systems Security
An online information security degree prepares graduates for careers developing secure data networks and instituting proper security protocols for organizations like banks, federal agencies and technical consulting firms. Graduates with these advanced technical skills and data analytics knowledge take on leadership roles in any organization by leading technology security efforts.
Chief Information Officer : These executives focus on data processing, information networks and long-term information technology purchasing priorities. They often develop organization-wide policies to protect sensitive information from phishing or malware attacks and institute ongoing training to ensure that all staff understand how to prevent security breaches.
Median Annual Salary: $139,220
Projected Growth Rate: 12%
Computer Network Architect : Network architects determine the hardware and software needs of an organization and provide ongoing support to their company. They analyze data traffic and determine how to best meet both short-term and long-term information technology needs; they often present their findings to top-level executives. They provide training for staff and troubleshoot technical problems.
Median Annual Salary: $104,650
Projected Growth Rate: 6%
Network and Computer Systems Administrator : Systems administrators install and maintain hardware and software across internal networks. They implement network security policies and set up monitoring that provides early warnings of data breaches. They help determine future network needs and train employees to use new software.
Median Annual Salary: $81,100
Projected Growth Rate: 6%
Source: Bureau of Labor Statistics
Return to the top