Cybersecurity (PhD program)
Overview

This program aims to prepare specialized sociotechnical academics who can perform leading-edge research and teaching in the academia or industry, and help governments in policymaking in the area of cybersecurity. The objectives of the program are achieved through a combination of coursework, seminars and a research thesis. The PhD in Cybersecurity program includes graduate-level courses, a seminar course, a thesis proposal and candidacy exam, a dissertation and final defence. The Program welcomes students from a broad range of backgrounds including computer science, information technology, business and management, social and political science.
Admissions
Admissions
In addition to the , PhD in Cybersecurity applicants must meet the following program-specific requirements:
- Students would normally be expected to have completed a four-year undergraduate degree and a thesis-based Masters degree in a relevant field from a Canadian university, or its equivalent from a recognized institution, with an overall academic standing of at least 3.5 on a 4.0/4.3 scale or its equivalent in their last two years of study.
MITS Pathway: Graduates of Â鶹´«Ã½ University Master of IT Security (MITS) program can apply to the Ph.D. program If they have completed the MITS program with an overall academic standing of at least 3.5/4.3. - A minimum of two letters of reference from persons having direct knowledge of the applicant's academic competence. Academic references are preferred; however professional references will be accepted. Letters of reference should come from individuals under whom the applicant has worked closely or studied. The quality of the letters will be assessed by the Graduate Committee to make sure relevant requirements have been met.
- Proof of English proficiency is needed from those applicants whose first language is not English, as per university regulations.
- Applicants must find a prospective faculty supervisor from among the list of graduate faculty members of the PhD in Cybersecurity program and receive formal acceptance of the faculty member to supervise their research. No applicant will be accepted to the program without having an approved prospective supervisor in advance.
- As part of the application form, students are required to provide a minimum 3000-word long personal research statement, outlining their area of interest in cybersecurity, their proposed academic research plan, and identify the faculty supervisor who has agreed to supervise their research.
- Students admitted to the program must demonstrate their broad proficiency in the area of cybersecurity through evidence of completing or having completed graduate-level coursework in the fields of theory, applications, legal and governance issues of cybersecurity. Students who do not demonstrate appropriate background in research methods and cybersecurity fundamentals and/or ethics will be required to complete the following additional/prerequisite courses within the first 18 months of the program:
- Cybersecurity: The following courses are required for students who do not have prior background in IT security.
INFR 5010G - Fundamentals of IT security (6 Credits)
INFR 5100G - Law and Ethics of IT Security (3 Credits) - Research methods: The following prerequisite is required for students who have not completed a previous thesis-based Master’s program in a relevant field.
CSCI 5010G – Survey of Computer Science Research Topics and Methods (3 Credits)
Please see for specific dates. Note that the application deadlines listed are for both the online application and all supporting documentation.
Applications for admission to all graduate studies programs are submitted online. There are five steps you must go through to complete the application process. See for step-by-step instructions.
Many of our graduate programs are extremely competitive; the number of qualified applicants normally exceeds the number of seats available for each intake. Satisfaction of minimum entry requirements does not ensure admission.
Additional information
INFR 6020G – Usable Security
INFR 6030G – Information Trust
INFR 6040G – Infrastructure and Cyberphysical Security
INFR 6050G – Advanced Topics in Cybersecurity
INFR 6110G – Global Cybersecurity Threats
INFR 6120G – Cybersecurity Leadership
INFR 6130G – CyberCrime
MITS 5600G – Security Policies and Risk Management
MITS 6900G – Blockchain Fundamentals and Technologies
Internal awards and funding
Applicants are strongly encouraged to connect with a potential supervisor in advance of submitting an application, to discuss research project opportunities and Graduate Research Assistantship (GRA) funding. GRAs typically form the core of a funding package and are usually supervisor-dependent. Applicants to research-based graduate programs who are studying full-time are automatically considered for some types of funding at the time of admission.
Types of funding that do not require an application:
- Entrance scholarships
- Minimum funding packages
- Teaching assistantships, research assistantships
For more information on these funding opportunities, visit . Please note that part-time students are not eligible for these opportunities.
External awards and funding
Graduate program applicants are encouraged to apply for external awards to help finance their education. The application process differs for each competition, so review the information carefully to determine where and when you must apply. Please note that the majority of these awards are for domestic or permanent residents only.
Tuition fees for graduate programs are charged on a flat-fee or fee-per-credit basis and vary by program and student status.
For current, specific fees and details on flat-fee versus fee-per-credit programs, please see .
Contact the program:
Faculty of Business and Information Technology
905.721.8668 ext. 2830
fbitgrad@ontariotechu.ca
Contact the School of Graduate and Postdoctoral Studies:
905-721-3190
connect@ontariotechu.ca