EasyUni logo

false

Doctor of Philosophy (PhD) in Cybersecurity

About

The program equips students with advanced expertise in protecting digital infrastructures and combating cyber threats. This rigorous program integrates theoretical foundations with hands-on research in cryptography, network security, and cyber forensics. Graduates emerge as thought leaders, driving advancements in cyber defense, policy-making, and strategic security across academia, industry, and government. This program is available both full-time (3-5 years) and part-time (4-8 years).

To earn the PhD, candidates must publish at least four research articles in Scopus-indexed journals under Lincoln affiliation. This requirement ensures that graduates contribute meaningful research to the evolving field of cybersecurity, reinforcing their expertise and impact on global cyber defense initiatives.

Key facts

Statistics
Qualification Doctoral Degree (PhD)
Study mode Full-time, Part-time
Duration 3 years
Intakes January, February, March, April, May, June, July, August, September, October, November, December
Total estimated cost (local) Data not available
Total estimated cost (foreign) ₹ 601,990

Subjects

  • Computer Science, IT

Duration

3 years

Tuition fees

Description Local students Foreign students
Tuition fee Data not available ₹ 601,990
Miscellaneous fees Data not available Data not available
Total estimated cost of attendance Data not available ₹ 601,990
Estimated cost per year Data not available ₹ 200,720

Miscellanous fees explained

Local students

Description Amount
Registration Fee ₹ 9,598-₹ 19,196

Foreign students

Description Amount
EMGS Processing Fee ₹ 51,599
Registration & Administrative Fee ₹ 111,798
Security Bond (refundable) ₹ 34,399

Estimated cost as reported by the institution. There may be additional administrative fees. Please contact us for the latest information.

Every effort has been made to ensure that information contained in this website is correct. Changes to any aspects of the programmes may be made from time to time due to unforeseeable circumstances beyond our control and the Institution and EasyUni reserve the right to make amendments to any information contained in this website without prior notice. The Institution and EasyUni accept no liability for any loss or damage arising from any use or misuse of or reliance on any information contained in this website.

Admissions

Intakes

Entry Requirements

The students need to meet one of the following:

  1. A Master’s degree (Level 7, MQF) in the field of Computing or related fields as accepted by the Lincoln University College Senate; or
  2. A Master’s degree (Level 7, MQF) in non-Computing fields with a minimum of FIVE (5) years of working experience in the field of computing or related fields must undergo appropriate prerequisite courses as determined by Lincoln University College; or
  3. A Master’s degree (Level 7, MQF) in non-competing fields with less than FIVE (5) years of working experience in the field of computing or related fields must undergo appropriate prerequisite courses as determined by Lincoln University College and subject to rigorous internal assessment; or
  4. Other qualifications equivalent to a Master’s degree in the field of Computing or related fields recognized by the Government of Malaysia must undergo appropriate prerequisite courses as determined by Lincoln University College.

English Profiency Requirements (International Students):

International students must have proof of good proficiency in verbal and written English. For example, International English Language Testing System (IELTS) score of 6.0 or its equivalent.

If a student does not meet this requirement, HEPs must offer English proficiency courses to ensure that the student’s proficiency is sufficient to meet the needs of the program.

Curriculum

The following are the modules studied in the Doctor of Philosophy (PhD) in Cybersecurity program:

  • Research Methodology
  • Data Analysis and Thesis Writing
  • Research Work

Tentative research areas*

  • Cryptography and Cryptanalysis
  • Network Security
  • Information Assurance
  • Cloud Security
  • IoT (Internet of Things) Security
  • Malware Analysis and Reverse Engineering
  • Ethical Hacking and Penetration Testing
  • Incident Response and Digital Forensics
  • Machine Learning and AI in Cybersecurity

This website uses cookies to ensure you get the best experience. By using this site, you acknowledge that you have read and understand our Cookie Policy , Privacy Statement and Terms & Conditions .

Chat on WhatsApp