Academic Requirements & Doctoral Curriculum Overview
The Doctoral Pathway in Cybersecurity is structured as a multi-stage research journey. It is designed to transition experienced practitioners into Scholar-Practitioners capable of producing original, peer-reviewed contributions to the field. The curriculum is divided into three distinct phases: Foundational Research Methodology, Candidacy & Proposal, and Dissertation Execution.
1.Admission & Candidacy Requirements
To maintain the highest academic standards, admission into the doctoral pathway is based on a comprehensive evaluation of professional and academic readiness.
- Academic Background: A Master’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (e.g., MBA with a technical focus).
- Professional Experience: Minimum of 8–10 years in a senior technical or strategic security role (CISO, Architect, Director).
- Research Aptitude: Submission of a Preliminary Research Statement outlining a potential area of inquiry and its relevance to the current body of knowledge.
- Methodological Readiness: Proficiency in high-level analytical writing and a foundational understanding of statistical or qualitative data analysis.
2. Alternative Entry: Recognition of Prior Learning (RPL)
While a Master’s degree is the standard prerequisite, the doctoral pathway recognizes that significant professional tenure can result in equivalent academic readiness. Candidates without a Master’s degree may be considered via the RPL Framework under the following criteria:
- Extended Domain Mastery: A minimum of 20 years of documented experience in cybersecurity, demonstrating a progression from technical execution to strategic oversight.
- Evidence of Higher-Order Synthesis: Candidates must provide a portfolio of work (e.g., published white papers, developed enterprise security frameworks, or legislative contributions) that demonstrates the ability to synthesize complex data at a level equivalent to a Level 7 (Master’s) qualification.
- Gap Analysis & Audit: An academic review will be conducted to ensure the candidate possesses the necessary theoretical foundation to undergo doctoral-level research.
- Case-by-Case Adjudication: Admission via RPL is not automatic; it requires a formal defense of professional experience before the admissions committee to ensure the candidate can meet the rigorous writing and analytical demands of a dissertation.
Phase I: Research Foundations & Skill Acquisition
Before beginning the dissertation, candidates must master the formal tools of academic inquiry. This phase focuses on the "Science of Research."
| Core Research Modules | Learning Objectives |
|---|---|
| Advanced Research Methodology | Analyzing Quantitative, Qualitative, and Mixed-Method approaches in a cyber context. |
| Epistemology of Cybersecurity | Understanding the philosophical foundations of digital trust, risk, and socio-technical systems. |
| Academic Writing & Publication | Developing the skills required for peer-reviewed journal submissions and conference proceedings. |
| Ethics & Institutional Review (IRB) | Navigating the ethical requirements of data collection, vulnerability disclosure, and human subjects. |
Phase II: The Research Prospectus (Candidacy)
The transition from a student to a Doctoral Candidate occurs upon the successful defense of the Research Prospectus.
- Literature Review: A systematic and exhaustive analysis of existing research to identify a specific "Knowledge Gap."
- Problem Statement: Defining a rigorous research question that is both academically significant and professionally applicable.
- Methodological Design: Formulating the specific plan for data collection, whether through empirical case studies, architectural modeling, or algorithmic testing.
- The Prospectus Defense: An oral presentation before a faculty committee to validate the feasibility and originality of the proposed research.
Phase III: Dissertation Research & Final Defense
The final phase is dedicated to the execution of the research plan and the documentation of original findings.
- Data Collection & Analysis: Implementing the approved methodology to gather and analyze primary or secondary data.
- The Doctoral Thesis: A comprehensive document (typically 40,000–60,000 words) that details the research journey, findings, and the resulting new framework or model.
- Original Contribution: The thesis must demonstrate a clear advancement in cybersecurity practice, governance, or resilience.
- The Viva Voce (Final Defense): A formal, rigorous examination where the candidate defends their findings before a panel of doctoral experts and external examiners.
Academic Standards & Quality Assurance
All doctoral work is governed by international standards of academic integrity.
- Peer Review Requirement: Candidates are encouraged or required to submit portions of their research to international conferences (e.g., IEEE, ACM) or recognized journals.
- Plagiarism Control: Strict adherence to citation standards (APA/IEEE) and verified through advanced originality reporting.
- Supervisory Oversight: Each candidate is paired with a Doctoral Supervisor (and often a second reader) to provide iterative feedback and methodological guidance.