PhD IT Concentration in Information Security and Assurance
Students may designate a concentration in information security in their doctoral degree title.
In that case the transcript of a graduating student would be "PhD in Information Technology
with Concentration in Information Security." Students may also pursue such doctoral studies
without designating a concentration in their degree title.
Students seeking this concentration must satisfy all the requirements for
the PhD in Information Technology. In addition, the following
requirements must be met.
Plan of Study
All decisions concerning the student's course requirements and plan of study
must be approved by the advisor or director, with the consent of the Senior Associate Dean.
Doctoral Supervisory Committee
The composition of the doctoral supervisory committee is to be approved by the
Volgenau School Senior Associate Dean
Permission for the comprehensive examination and
the dissertation defense is requested from the Volgenau School Senior Associate Dean on the basis
of a written request and plan that has been approved by the supervisory committee.
Note for PhD pre-defense and final defense:
It is the University policy that the final defense can only occur
at least two weeks after the pre-defense.
The Volgenau School's policy requires that the final defense for the
PhD in IT degree can only occur at least four weeks after the
pre-defense. Under very special circumstances, the minimum two-week
period determined by the University policy may be approved by the
Senior Associate Dean.
Students in the PhD in IT degree program must submit
Approval to Defend Dissertation form [PDF]
along with a copy of the written dissertation to
Lisa Nolder after successfully passing their pre-defense.
Students should also submit to the Associate Dean (via e-mail):
(a) a copy of the title and abstract of the dissertation,
(b) a list of publications resulting from the dissertation, and
(c) information on future employment after graduation.
Students are responsible for providing an electronic version of the
announcement to be posted at various places within the university to the
staff person in charge of coordinating their respective PhD degrees.
Failure to do so will delay the date of the final defense.
To satisfy the breadth requirement of the PhD degree, each student must pass a set of qualifying
examinations designed to test a student's fundamental knowledge. The general PhD IT requirement
is that each student must take four exams from three different master's programs.
The exams for the Information Security track are:
- Information Security and Assurance
One exam from Operating Systems or
- Two exams from the following, at most one from each master's program:
Advanced Emphasis Requirement
In addition to courses taken to prepare for the Qualifying Exam, students
must take at least 8 courses (24 credit hours) including:
In addition to courses taken to prepare for the Qualifying Exam, students must take at least eight courses (24 credit hours) including:
Students must select at least four courses (12 credits) from the following:
- ISA 862 - Models for Computer Security
Where appropriate, one or two relevant courses may be substituted with courses
from other Volgenau School departments. The student's overall coursework must satisfy
the University requirement for the PhD.
- ISA 640 - Programming Language Security
- ISA 650 - Security Policy
- ISA 652 - Security Audit and Compliance Testing
- ISA 656 - Network Security
- ISA 673 - Operating Systems Security
- ISA 674 - Intrusion Detection
- ISA 681 - Secure Software Design
- ISA 685 - Emerging Topics in Cyber Security
- ISA 697 - Topics in Information Security
- ISA 763 - Security Protocol Analysis
- ISA 764 - Security Experimentation
- ISA 765 - Database and Distributed Systems Security
- ISA 767 - Secure Electronic Commerce
- ISA 796 - Directed Readings in Information Security
- ISA 863 - Advanced Topics in Computer Security
- SWE 781 - Secure Software Design and Programming
- INFS 865 - Networks and Distributed Systems Security