{"id":1823,"date":"2025-05-01T15:05:30","date_gmt":"2025-05-01T19:05:30","guid":{"rendered":"https:\/\/wwwcp.umes.edu\/cset\/?page_id=1823"},"modified":"2025-07-17T14:49:58","modified_gmt":"2025-07-17T18:49:58","slug":"phd-in-applied-computing-and-engineering-program-cybersecurity-engineering","status":"publish","type":"page","link":"https:\/\/wwwcp.umes.edu\/cset\/phd-in-applied-computing-and-engineering-program-cybersecurity-engineering\/","title":{"rendered":"PhD in Applied Computing and Engineering Program &#8211; Cybersecurity"},"content":{"rendered":"\n<p class=\"has-header-secondary-bg-color-color has-text-color\" style=\"font-size:33px\"><strong>Graduate Programs<\/strong> (Online)<\/p>\n\n\n\n<p style=\"font-size:26px\">MENU LINKS<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"#programinformation\">Program Information<\/a><\/li>\n\n\n\n<li>Student Performance and Achievement Information<\/li>\n\n\n\n<li><a href=\"#programoutcomes\">Program Outcomes<\/a><\/li>\n\n\n\n<li><a href=\"#learningoutcomes\">Program Learning Competencies\/Outcomes&nbsp;<\/a><\/li>\n\n\n\n<li><a href=\"#admissioncriteria\">Admission Criteria<\/a><\/li>\n\n\n\n<li><a href=\"#applicationdeadlines\">Application Deadlines<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"#courserequirementsforgraduation\">Course Requirements for Graduation<\/a><\/li>\n\n\n\n<li><a href=\"#totalnumberofcredits\">Total Number of Credits and Their Distribution<\/a><\/li>\n\n\n\n<li><a href=\"#curriculumoverview\">Curriculum Overview<\/a><\/li>\n\n\n\n<li>Course Descriptions<\/li>\n\n\n\n<li>Cybersecurity Program Flyer<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-header-secondary-bg-color-color has-text-color\" id=\"programinformation\">Program Information<\/h2>\n\n\n\n<p>The cybersecurity concentration in the PhD in Applied Computing and Engineering offers prospective students a graduate program with strong foundations in theory and practice to meet the needs of technical professionals, including but not limited to those on the Eastern Shore of Maryland, with more advanced learning in the specialized discipline of cybersecurity. The cybersecurity concentration draws on the existing faculty&#8217;s expertise, research focus, and emerging research areas in related fields. The doctoral program is designed to accept bachelor\u2019s degree holders by allowing them to be directly admitted into the program. The cybersecurity concentration in the PhD in Applied Computing and Engineering requires at least sixty (60) credit hours of graduate-level coursework beyond the bachelor\u2019s degree.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-header-secondary-bg-color-color has-text-color\" id=\"programoutcomes\">Program Outcomes<\/h2>\n\n\n\n<p>Graduates with a Ph.D. in Applied Computing and Engineering with a concentration in Cybersecurity will be able to:<\/p>\n\n\n\n<p>\u00b7 Demonstrate in-depth knowledge of the fundamental principles, concepts, terminologies, and methodologies used to design and analyze broader areas of research.<\/p>\n\n\n\n<p>\u00b7 Demonstrate the ability to solve real-world problems.<\/p>\n\n\n\n<p>\u00b7 Demonstrate the ability to be gainfully employed in research-based industries and academia upon graduation from the program.<\/p>\n\n\n\n<p>\u00b7 Demonstrate the ability to be in leadership positions in cybersecurity and related disciplines.<\/p>\n\n\n\n<p>\u00b7 Demonstrate interdisciplinary and cross-disciplinary methods that are broadly applicable in the emerging fields of cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learningoutcomes\"><span class=\"tadv-color\" style=\"color:#651d32\">Program Learning Competencies\/Outcomes<\/span><\/h2>\n\n\n\n<p>Upon completion of the program, student will be able to:<\/p>\n\n\n\n<p>\u00b7 Demonstrate foundational knowledge and skills in the cybersecurity program area.<\/p>\n\n\n\n<p>\u00b7 Demonstrate problem-solving, critical thinking, oral and written communication, and leadership skills.<\/p>\n\n\n\n<p>\u00b7 Integrate theory, discovery, and technology into practice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"admissioncriteria\"><span style=\"color:#651d32\" class=\"tadv-color\">Admission Criteria<\/span><\/h2>\n\n\n\n<p>To be considered for admission into the Ph.D. degree program, a student (US and international) must satisfy the university-wide requirements for admission to graduate programs established by the university&#8217;s Graduate School. However, the graduate committees for the various research areas may require higher academic standards for admitting students to the departments\u2019 graduate programs. The applicant should have completed a bachelor\u2019s degree in computer science, electrical engineering, computer engineering, mechatronics engineering, general engineering, or a closely related technical field from a regionally accredited undergraduate institution. In addition, each applicant should also submit a letter of intent describing their graduate studies goals and objectives, and three letters of recommendation from faculty, engineers, or supervisors that can certify their ability to pursue studies at the Ph.D. level. The applicant must submit all documents required by the graduate program to the admission office of the School of Graduate Studies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"applicationdeadlines\"><span style=\"color:#651d32\" class=\"tadv-color\">Application Deadlines<\/span><\/h2>\n\n\n\n<p>Although the graduate program supports rolling admission, for priority consideration, please submit your complete application by the following deadlines:<\/p>\n\n\n\n<p>\u00bb&nbsp;Fall Semester &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; July 1st&nbsp;<br>\u00bb&nbsp;Spring Semester &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; December 1st&nbsp;<br>\u00bb&nbsp;Summer Session(s) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;April 1st<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-header-secondary-bg-color-color has-text-color\" id=\"courserequirementsforgraduation\">Course Requirements for Graduation<\/h2>\n\n\n\n<p>The general requirements of the doctoral program are:<\/p>\n\n\n\n<p>\u00b7 A minimum of 48 semester credit hours in courses approved for graduate credit with a minimum average grade of \u201cB\u201d in all coursework taken.<\/p>\n\n\n\n<p>\u00b7 A minimum of 12 semester credit hours in courses numbered 700 or above.<\/p>\n\n\n\n<p>\u00b7 Successful passing of the Comprehensive Examination \u2013 Written (Core Courses) and Oral (Defense of the Dissertation Proposal) is required.<\/p>\n\n\n\n<p>\u00b7 A successful submission and defense of a dissertation is required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"totalnumberofcredits\"><span style=\"background-color:#ffffff\" class=\"tadv-background-color\"><span style=\"color:#651d32\" class=\"tadv-color\">Total Number of Credits and Distribution<\/span><\/span><\/h2>\n\n\n\n<p><strong>Core Courses<\/strong> \u2013 12 credits<\/p>\n\n\n\n<p><strong>Free Electives <\/strong>\u2013 12 credits<\/p>\n\n\n\n<p><strong>Concentration Courses <\/strong>\u2013 24 credits<\/p>\n\n\n\n<p><strong>Dissertation Courses<\/strong> \u2013 12 credits<\/p>\n\n\n\n<p><strong>Total Credits Required <\/strong>\u2013 60 credits<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-header-secondary-bg-color-color has-text-color\" id=\"curriculumoverview\">Applied Cybersecurity Engineering Curriculum Overview<\/h2>\n\n\n\n<p><strong>Core \u2013 12 semester credit hours.<\/strong><\/p>\n\n\n\n<p>ETCS 700 Applied Cryptography<\/p>\n\n\n\n<p>ETCS 710 Advanced Study in Cybersecurity I<\/p>\n\n\n\n<p>ETCS 720 Advanced Study in Cybersecurity II<\/p>\n\n\n\n<p>ETCS 730 Cybersecurity and Intelligent Systems<\/p>\n\n\n\n<p><strong>Free Electives \u2013 12 semester credit hours.<\/strong><\/p>\n\n\n\n<p>ETCS 600 Statistical Applications for Technology<\/p>\n\n\n\n<p>ETCS 606 Applied Research for Technology<\/p>\n\n\n\n<p>ETCS 620 Project Management for Technology<\/p>\n\n\n\n<p>ETCS 687 Legal and Ethical Issues in Cybersecurity<\/p>\n\n\n\n<p>ETCS 690 Master\u2019s Seminar<\/p>\n\n\n\n<p><strong>Concentration Courses \u2013 24 semester credit hours.<\/strong><\/p>\n\n\n\n<p>ETCS 625 Lean Management Principles for Cyber Systems<\/p>\n\n\n\n<p>ETCS 630 Introduction to Cybersecurity for Industrial Control Systems<\/p>\n\n\n\n<p>ETCS 635 Introduction to Cybersecurity and Cryptography Applications<\/p>\n\n\n\n<p>ETCS 640 Artificial Intelligence, Blockchain and Cybersecurity<\/p>\n\n\n\n<p>ETCS 645 Critical Infrastructure for Cybersecurity<\/p>\n\n\n\n<p>ETCS 650 Capital Project Cost Analysis for Cyber Systems<\/p>\n\n\n\n<p>ETCS 675 Network Performance Monitoring and Security<\/p>\n\n\n\n<p>ETCS 676 Database and Cyber Systems<\/p>\n\n\n\n<p>ETCS 677 Digital Forensics for Cyber Systems<\/p>\n\n\n\n<p>ETCS 678 Mobile Wireless Networking and Security<\/p>\n\n\n\n<p>ETCS 679 Mobile and Cloud Security<\/p>\n\n\n\n<p>ETCS 680 Networking Technology for Industry<\/p>\n\n\n\n<p>ETCS 681 System Integrity for Cybersecurity<\/p>\n\n\n\n<p>ETCS 682 Cybersecurity Administration<\/p>\n\n\n\n<p>ETCS 683 Network Intrusion, Detection, and Incidence Response<\/p>\n\n\n\n<p>ETCS 684 Cyber Analytics and Intelligence<\/p>\n\n\n\n<p>ETCS 685 Fundamentals of Network Security<\/p>\n\n\n\n<p>ETCS 686 Advanced Network Security<\/p>\n\n\n\n<p>ETCS 688 Exp Crs: Contemporary Issues in Cybersecurity<\/p>\n\n\n\n<p>ETCS 740 Cybersecurity for Critical Infrastructure<\/p>\n\n\n\n<p>ETCS 750 Cybersecurity for Navigation Systems<\/p>\n\n\n\n<p>ETCS 760 Quantum Cybersecurity: AI and Critical Infrastructure Protection<\/p>\n\n\n\n<p><strong>Comprehensive Examinations<\/strong><\/p>\n\n\n\n<p>Comprehensive Examination \u2013 Written (Core Courses)<\/p>\n\n\n\n<p>Comprehensive Examination \u2013 Oral (Defense of the Dissertation Proposal)<\/p>\n\n\n\n<p><strong>Dissertation Course \u2013 12 semester credit hours<\/strong>.<\/p>\n\n\n\n<p>ETCS 899 Doctoral Research for Dissertation<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-header-secondary-bg-color-color has-text-color\">For more information on this program, please contact:<\/h2>\n\n\n<div class=\"wp-block-image staff-member\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"250\" src=\"https:\/\/wwwcp.umes.edu\/cset\/wp-content\/uploads\/sites\/137\/2023\/08\/DerrekDunn.jpg\" alt=\"\" class=\"wp-image-1608\" style=\"width:128px;height:157px\"\/><\/figure>\n<\/div>\n\n\n<p><br><strong>Dr. Derrek Dunn, Professor and Dean<\/strong><br><strong>Phone:<\/strong> 410 651 6348<br><strong>Fax:<\/strong> 410 651 7829<br><strong>Office:<\/strong> 3087 EASC Building<br><strong>Email:<\/strong> <a href=\"mailto:ddunn@umes.edu\" target=\"_blank\" rel=\"noreferrer noopener\">ddunn@umes.edu<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Graduate Programs (Online) MENU LINKS Program Information The cybersecurity concentration in the PhD in Applied Computing and Engineering offers prospective students a graduate program with strong foundations in theory and practice to meet the needs of technical professionals, including but not limited to those on the Eastern Shore of Maryland, with more advanced learning in&#8230;<span class=\"cpschool-read-more-link-holder\"><a class=\"btn btn-basic cpschool-read-more-link\" href=\"https:\/\/wwwcp.umes.edu\/cset\/phd-in-applied-computing-and-engineering-program-cybersecurity-engineering\/\">Read more <span class=\"sr-only\">PhD in Applied Computing and Engineering Program &#8211; Cybersecurity<\/span><\/a><\/span><\/p>\n","protected":false},"author":1742,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"folder":[],"class_list":["post-1823","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/pages\/1823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/users\/1742"}],"replies":[{"embeddable":true,"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/comments?post=1823"}],"version-history":[{"count":0,"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/pages\/1823\/revisions"}],"wp:attachment":[{"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/media?parent=1823"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/wwwcp.umes.edu\/cset\/wp-json\/wp\/v2\/folder?post=1823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}