Academic Requirements & Doctoral Curriculum Overview

The Doctoral Pathway in Cybersecurity is structured as a multi-stage research journey. It is designed to transition experienced practitioners into Scholar-Practitioners capable of producing original, peer-reviewed contributions to the field. The curriculum is divided into three distinct phases: Foundational Research Methodology, Candidacy & Proposal, and Dissertation Execution.

1.Admission & Candidacy Requirements  

To maintain the highest academic standards, admission into the doctoral pathway is based on a comprehensive evaluation of professional and academic readiness.

  • Academic Background: A Master’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (e.g., MBA with a technical focus).
  • Professional Experience: Minimum of 8–10 years in a senior technical or strategic security role (CISO, Architect, Director).
  • Research Aptitude: Submission of a Preliminary Research Statement outlining a potential area of inquiry and its relevance to the current body of knowledge.
  • Methodological Readiness: Proficiency in high-level analytical writing and a foundational understanding of statistical or qualitative data analysis.

 

2. Alternative Entry: Recognition of Prior Learning (RPL)

While a Master’s degree is the standard prerequisite, the doctoral pathway recognizes that significant professional tenure can result in equivalent academic readiness. Candidates without a Master’s degree may be considered via the RPL Framework under the following criteria:

  • Extended Domain Mastery: A minimum of 20 years of documented experience in cybersecurity, demonstrating a progression from technical execution to strategic oversight.
  • Evidence of Higher-Order Synthesis: Candidates must provide a portfolio of work (e.g., published white papers, developed enterprise security frameworks, or legislative contributions) that demonstrates the ability to synthesize complex data at a level equivalent to a Level 7 (Master’s) qualification.
  • Gap Analysis & Audit: An academic review will be conducted to ensure the candidate possesses the necessary theoretical foundation to undergo doctoral-level research.
  • Case-by-Case Adjudication: Admission via RPL is not automatic; it requires a formal defense of professional experience before the admissions committee to ensure the candidate can meet the rigorous writing and analytical demands of a dissertation.

Phase I: Research Foundations & Skill Acquisition

Before beginning the dissertation, candidates must master the formal tools of academic inquiry. This phase focuses on the "Science of Research."

Core Research ModulesLearning Objectives
Advanced Research MethodologyAnalyzing Quantitative, Qualitative, and Mixed-Method approaches in a cyber context.
Epistemology of CybersecurityUnderstanding the philosophical foundations of digital trust, risk, and socio-technical systems.
Academic Writing & PublicationDeveloping the skills required for peer-reviewed journal submissions and conference proceedings.
Ethics & Institutional Review (IRB)Navigating the ethical requirements of data collection, vulnerability disclosure, and human subjects.

 

Phase II: The Research Prospectus (Candidacy)

The transition from a student to a Doctoral Candidate occurs upon the successful defense of the Research Prospectus.

  1. Literature Review: A systematic and exhaustive analysis of existing research to identify a specific "Knowledge Gap."
  2. Problem Statement: Defining a rigorous research question that is both academically significant and professionally applicable.
  3. Methodological Design: Formulating the specific plan for data collection, whether through empirical case studies, architectural modeling, or algorithmic testing.
  4. The Prospectus Defense: An oral presentation before a faculty committee to validate the feasibility and originality of the proposed research.

 

Phase III: Dissertation Research & Final Defense

The final phase is dedicated to the execution of the research plan and the documentation of original findings.

  • Data Collection & Analysis: Implementing the approved methodology to gather and analyze primary or secondary data.
  • The Doctoral Thesis: A comprehensive document (typically 40,000–60,000 words) that details the research journey, findings, and the resulting new framework or model.
  • Original Contribution: The thesis must demonstrate a clear advancement in cybersecurity practice, governance, or resilience.
  • The Viva Voce (Final Defense): A formal, rigorous examination where the candidate defends their findings before a panel of doctoral experts and external examiners.

Academic Standards & Quality Assurance

All doctoral work is governed by international standards of academic integrity.

  • Peer Review Requirement: Candidates are encouraged or required to submit portions of their research to international conferences (e.g., IEEE, ACM) or recognized journals.
  • Plagiarism Control: Strict adherence to citation standards (APA/IEEE) and verified through advanced originality reporting.
  • Supervisory Oversight: Each candidate is paired with a Doctoral Supervisor (and often a second reader) to provide iterative feedback and methodological guidance.