Doctorate in Information Assurance

Credit Requirements

The Doctorate in Information Assurance consists of a minimum of 62 semester credits beyond a Master's degree including 60 credits of pre-dissertation courses (consisting of research methods courses, comprehensive exam courses, and research-preparation courses) as well as 2 credits of dissertation development courses.

DIA COURSES

Core Courses

  • IA7020 Information Security Systems and Organizational Awareness
  • IA7030 Legal and Ethical Practices in Information Security
  • IA7040 Information Security and Organizational Change
  • IA8010 Business and Security Risk Analysis
  • IA8110 Certification and Accreditation

Specialization Courses

  • IA8021 Cloud Cyber Security
  • IA8031 Cyber Security Insurance
  • IA8190 Forensic Evaluation and Incident Response Management
  • IA9150 Strategic and Technological Trends in Information Security
  • IA9200 Research Topics in Information Security

Pre-Dissertation Courses:

  • RM8500 Research Foundations
  • RM9100 Qualitative and Quantitative Analysis
  • RM9130 Comprehensive Exam **released week 4 of RM9100

Research Methodology Courses:

  • CEX8220 Security Program and Implementation: Quantitative Application
  • CEX8230 Legal and Ethical Management in Information Security: Qualitative Application

Phase I:

  • RM9150 Feasibility Problem Driven Research
  • RM9200 Designing Solutions to InfoSec Problems

Phase II:

  • RES8110 Dissertation Proposal (Chapter 1)
  • RES8120 Dissertation Proposal (Chapter 2)
  • RES8121 Dissertation Proposal (Chapter 2-Continued)
  • RES8130 The Dissertation Proposal (Chapters 3 and 4.1 & the IRB-Institutional Review Board)

Phase III:

  • DST8110 Dissertation Manuscript (Chapters 4 & 5)

Phase IV:

  • DST8130X Final Dissertation Manuscript & Defense

Phase V:

  • Dissertation Printing and Binding

Minimum credits required for DIA: 62

Grading Scale

Grade GPA Value Academic Designators

A

4.0 Incomplete

I

A-

3.7 Drop

W

B+

3.3 Withdrawal

W

B

3.0 Progress

P*

B-

2.7 No Progress

NP*

C+

2.3 Audit

AUD

C 2.0    

F

0.0  

 

 

CORE COURSES

IA7020 Information Security Systems and Organizational Awareness

In this course, students will familiarize themselves with the cybersecurity framework to critically analyze security awareness issues and to evaluate best practices in implementing security systems within the enterprise. (3 credits)

IA7030 Legal and Ethical Practices in Information Security

In this course, students will draw on what they learned from IA7020 to dig deeper into information security by evaluating information security case studies and produce real-life deliverables. (3 credits)

IA7040 Information Security and Organizational Change

In this course, students analyze the principles of change management as they apply to the requirements and regulations of information security. Students evaluate the factors which affect corporate decision-making when implementing security programs and the ability of the manager to translate corporate needs into information security projects. (3 credits)

IA8010 Business and Security Risk Analysis

This course provides students with an overview of risk management principles. Methods to identify, quantify, and qualify internal and external risks to the organization are examined. Students apply these principles and methods to the current business and risk environment. (3 credits)

IA8110 Certification and Accreditation

In this course, students analyze an enterprise-wide view of information systems and the establishment of appropriate, cost-effective information protection programs. Within this context, students examine a set of standard policies, procedures, activities, and a management structure to certify and accredit information systems for the protection of the data as well as the systems. (3 credits)

SPECIALIZATION COURSES

IA8021 Cloud Cyber Security

In this course, students recognize the information security risks and corresponding strategies essential to securing a cloud environment. Students will delve into the control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.

IA8031 Cyber Security Insurance

In this course, students will understand the advantages and disadvantages of having insurance policies that provide coverage from losses resulting from a data/cyber breach or loss of electronically stored confidential information. Areas covered involve the various types of insurance policies, differences between third party and first party insurers, covered risks, and overall benefits of cyber insurance policies to the enterprise.

IA8190 Forensic Evaluation and Incident Response Management

In this course, students explore the essentials of electronic discovery and analyze issues related to cyber evidence. Using this evidence, students identify and analyze the nature of security incidents, the source of potential threats and the methods used in incident management and mitigation. Students also analyze the technical and business issues which affect the actions of the enterprise in responding to a security incident. (3 credits)

IA9150 Strategic and Technological Trends in Information Security

In this course, students assess and evaluate technical trends and emerging technologies in information assurance and examine their impact on the implementation of security programs. (3 credits)

IA9200 Research Topics in Information Security

In this integrative course, students assess the information security risk associated with an identified management problem. Students then develop a risk mitigation strategy which integrates principles and techniques of risk analysis, project planning, and change management. (3 credits)

Prerequisites: IA7040, IA8010

PRE-DISSERTATION COURSES

RM8500 Research Foundations

In this course, doctoral students are introduced to the purpose and nature of primary research in Information Security. Students explore the foundations and concepts of applied field research.The Qualifying Exam is administered at the end of this course.(3 credits)

RM9100 Qualitative and Quantitative Analysis

In this course, students compare, contrast, and evaluate qualitative and quantitative methods of data analysis for solving information assurance problems and conducting information security-related field research. (3 credits)

RM9130 Comprehensive Exam **released week 4 of RM9100

This class will work in conjunction with RM9100 and will be released in week four. Students must complete a written exam paper which demonstrates mastery of literature-based research skills and American Psychological Association, 6th edition (APA) format and citation requirements. (0 credits)

RESEARCH METHODOLOGY COURSES

CEX8220 Security Program Strategies and Implementation: Quantitative Analysis

This course is part of a two-course advanced research methodology sequence designed to assess the student’s ability to conduct independent research under the guidance of an instructor and gauge the student’s quantitative research skills. Students will work with the instructor to identify, develop, and write a 25-30 page advanced research paper that examines an appropriate topic/sub-topic within the broader subject area of security program strategies and implementation. Any appropriate topic/subtopic within the broader subject area of security program strategies and implementation is acceptable. **The research project must focus solely on the use of quantitative methodological techniques**.

CEX8230 Legal and Ethical Management Issues in Information Security: Qualitative Analysis

This course is part of a two-course advanced research methodology sequence designed to assess the student’s ability to conduct independent research under the guidance of an instructor and evaluate the student’s qualitative research skills. Students will work with the instructor to identify, develop, and write a 25-30 page advanced research paper that examines an appropriate topic/sub-topic within the broader subject area of legal and ethical management issues in information security. Any appropriate topic/subtopic within the within the broader subject area of legal and ethical management issues in information security is acceptable. **The research project must focus solely on the use of qualitative methodological techniques**.

PHASE I

RM9150 Feasible Problem-Driven Research

In this course, students identify a research site and utilize problems occurring there in order to identify feasible topic areas for their field research study. Students apply the concept of problem-driven research as the basis for selecting a feasible and non-trivial research topic or problem assessment. (3 credits)

RM9200 Designing Solutions to InfoSec Problems

In this course, doctoral students enrolled in the DIA program continue to evaluate the feasibility of their proposed research site and the potential solutions to be studied. Students present their proposed project at the Dissertation Bootcamp at the end of this course. (3 credits)

PHASE II

RES8110 Dissertation Proposal (Chapter 1)

In this course, students articulate the business problem and problem statement, refine their research question, and develop the rationale for the research project by clearly identifying and specifying the needs and requirements which justify a proposed improvement in professional practice. (3 credits)

PREREQUISITE: RM9200

RES8120 Dissertation Proposal (Chapter 2)

In this course, students conduct a literature review in Information Security and other relevant bodies of research to identify a proposed solution to the business problem. Using this literature review, they present support for the selection of the proposed solution and identify criteria to be used in assessing its feasibility. (3 credits)

RES8121 Dissertation Proposal (Chapter 2, Continued)

In this course, doctoral students follow a structured approach to designing their dissertation study, refining their research question/s, and developing the operational details for their study. The focus is on clearly specifying the assessment criteria and organizational requirements needed to justify a proposed improvement in professional practice, and on designing and implementing such an assessment. Students will revisit the foundations of research methods and apply them to the modifications required for creating the required dissertation deliverables. Concepts covered include research problems, questions and hypotheses, data types, quantitative and qualitative approaches, research designs, variables and scales, data collection instruments, and sampling.

RES8130 Full Dissertation Proposal (Chapters 3 and 4.1 and the IRB)

In this course, students submit their full dissertation proposal to the DDR (Dean of Doctoral Research) for approval. The DDR will review the data collection instrument and the students will then initiate the IRB (Institutional Review Board) application. At this point, Doctoral candidacy is achieved and the Dissertation Chairperson is assigned.

PHASE III

DST8110 Dissertation Manuscript (Chapters 4 and 5)

In this course students submit the final draft dissertation, seek approval to defend and then advance to the full committee review.

PHASE IV

DST8130X Final Dissertation Manuscript and Defense

In this course, students will present the dissertation oral defense to the Dissertation Committee and DDR (Dean of Doctoral Research).

PHASE V

Dissertation Printing and Binding

 

 

 

Join the Cybersecurity Elite
U of F Cybersecurity Education Path

Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.
» Download PDF or register for a

 

https://www.ufairfax.edu/doctorate/cybersecurity/information-assurance/learn-more/default.lasso