Doctor of Philosophy (PhD) in Cybersecurity
About
The program equips students with advanced expertise in protecting digital infrastructures and combating cyber threats. This rigorous program integrates theoretical foundations with hands-on research in cryptography, network security, and cyber forensics. Graduates emerge as thought leaders, driving advancements in cyber defense, policy-making, and strategic security across academia, industry, and government. This program is available both full-time (3-5 years) and part-time (4-8 years).
To earn the PhD, candidates must publish at least four research articles in Scopus-indexed journals under Lincoln affiliation. This requirement ensures that graduates contribute meaningful research to the evolving field of cybersecurity, reinforcing their expertise and impact on global cyber defense initiatives.
Key facts
Qualification | Doctoral Degree (PhD) |
Study mode | Full-time, Part-time |
Duration | 3 years |
Intakes | January, February, March, April, May, June, July, August, September, October, November, December |
Total estimated cost (local) | Data not available |
Total estimated cost (foreign) | ₹ 601,990 |
Subjects
-
Computer Science, IT
Duration
3 years
Tuition fees
Description | Local students | Foreign students |
---|---|---|
Tuition fee | Data not available | ₹ 601,990 |
Miscellaneous fees | Data not available | Data not available |
Total estimated cost of attendance | Data not available | ₹ 601,990 |
Estimated cost per year | Data not available | ₹ 200,720 |
Miscellanous fees explained
Local students
Description | Amount |
---|---|
Registration Fee | ₹ 9,598-₹ 19,196 |
Foreign students
Description | Amount |
---|---|
EMGS Processing Fee | ₹ 51,599 |
Registration & Administrative Fee | ₹ 111,798 |
Security Bond (refundable) | ₹ 34,399 |
Estimated cost as reported by the institution. There may be additional administrative fees. Please contact us for the latest information.
Every effort has been made to ensure that information contained in this website is correct. Changes to any aspects of the programmes may be made from time to time due to unforeseeable circumstances beyond our control and the Institution and EasyUni reserve the right to make amendments to any information contained in this website without prior notice. The Institution and EasyUni accept no liability for any loss or damage arising from any use or misuse of or reliance on any information contained in this website.
Admissions
Intakes
Entry Requirements
The students need to meet one of the following:
- A Master’s degree (Level 7, MQF) in the field of Computing or related fields as accepted by the Lincoln University College Senate; or
- A Master’s degree (Level 7, MQF) in non-Computing fields with a minimum of FIVE (5) years of working experience in the field of computing or related fields must undergo appropriate prerequisite courses as determined by Lincoln University College; or
- A Master’s degree (Level 7, MQF) in non-competing fields with less than FIVE (5) years of working experience in the field of computing or related fields must undergo appropriate prerequisite courses as determined by Lincoln University College and subject to rigorous internal assessment; or
- Other qualifications equivalent to a Master’s degree in the field of Computing or related fields recognized by the Government of Malaysia must undergo appropriate prerequisite courses as determined by Lincoln University College.
English Profiency Requirements (International Students):
International students must have proof of good proficiency in verbal and written English. For example, International English Language Testing System (IELTS) score of 6.0 or its equivalent.
If a student does not meet this requirement, HEPs must offer English proficiency courses to ensure that the student’s proficiency is sufficient to meet the needs of the program.
Curriculum
The following are the modules studied in the Doctor of Philosophy (PhD) in Cybersecurity program:
- Research Methodology
- Data Analysis and Thesis Writing
- Research Work
Tentative research areas*
- Cryptography and Cryptanalysis
- Network Security
- Information Assurance
- Cloud Security
- IoT (Internet of Things) Security
- Malware Analysis and Reverse Engineering
- Ethical Hacking and Penetration Testing
- Incident Response and Digital Forensics
- Machine Learning and AI in Cybersecurity