Frequently Asked Questions

Addressing common queries to build trust and migrate risks, providing clarity on your doctoral journey.

Institutional Standards and Recognition

This is a terminal academic qualification situated at Level 8 of the UK Regulated Qualifications Framework (RQF) and European Qualifications Framework (EQF). It carries the same academic weight as a traditional PhD and confers the title of “Doctor.”

While both are Level 8 terminal degrees, this Doctorate focuses on applied research—using rigorous academic methods to solve systemic, real-world problems in the cyber security industry.

The program is designed as a 36-month journey to accommodate the depth required for original doctoral-level research while respecting the schedules of working professionals.

For senior leaders with 15–20+ years of experience, we offer a comprehensive academic audit. If your professional portfolio (policies, strategy frameworks, or industry research) demonstrates sufficient mastery, you may be admitted to the Doctorate program even without a formal Master’s Degree. Please note that RPL is used for entry access; all candidates must complete the full 36-month research journey to ensure doctoral rigor.

Eligibility and Entry Requirements

No. We prioritize Cyber Security domain experience over purely technical skills. Research can focus on governance, ethics, law, risk management, or organizational strategy.

Ideal candidates possess 8–10+ years of progressive experience, typically currently serving in senior leadership or specialized strategic roles.

 While a Master’s degree is standard, candidates with exceptional professional seniority and high-level certifications (like CISO-level experience) may be considered through our equivalency audit.

The Research Experience

You are never in isolation. You are paired with an Academic Guide for structured, live interactions designed to interrogate your 

These are strategic live touchpoints throughout the four research phases where you receive individualized feedback to ensure your dissertation maintains scholarly coherence.

Strategic live sessions are built into each phase. However, you are not limited to these milestones; you may choose to have additional sessions with your guide to ensure your research remains on track

 Your research must focus on a "wicked problem" within the cyber security domain—one that requires original inquiry rather than just implementing a known solution.

 The journey follows a four-phase lifecycle: Discovery & Engagement, Methodology & Design, Empirical Execution, and Terminal Defense.

Commitment and Feasibility

The program is optimized for senior leaders, requiring approximately 5–6 hours per week. This is manageable within a 36-month timeframe.

No. Live interactions with your Academic Guide are scheduled collaboratively to fit your professional calendar.

We encourage "embedded research"—selecting a topic that aligns with your current organizational challenges so that your professional work and doctoral data collection overlap.

The program allows for a formal "Interruption of Study" for candidates facing significant professional changes, such as a merger or acquisition.

Methodology and Ethics

You will select and justify the most appropriate tools for your study—be it qualitative (interviews), quantitative (data modeling), or mixed methods.

 Phase 2 includes a dedicated Ethical Considerations 

Completion and Beyond

This is an oral defense of your dissertation before a committee of experts. It marks your final transition from a doctoral candidate to an independent scholar.

 Beyond the title of "Doctor," the degree signifies a transition into a Scholar-Practitioner, capable of influencing national policy, board-level strategy, and industry standards.