As part of the School of Business and Information Sciences, the doctor of science in Cybersecurity degree (DSc) enables you to understand and evaluate the scope and impact of systems and technology from institutional, industry and global perspectives. The program supports the development of high-level critical thinking, leadership and technical skills, and contributes innovative and practical doctoral research to the IA body of knowledge.
Choose from seven master's degree programs to expand your knowledge and advance in your career. Programs are accelerated, with eight-week as well as 16-week courses, offered exclusively online with a unique delivery: real-time, live streaming audio. The courses combine the convenience of online learning with the stimulation of classroom experience.
- Business Administration (MBA)
- Astronautical Engineering
- Computer Science
- Electrical Engineering
- Internet Engineering
- Cyber and Information Security
- Information Systems Management
Post-Baccalaureate Certificate Programs
Capitol Technology University offers 11 graduate certificates that are useful for professionals who already hold a master's degree or who want to learn more about a topic without the commitment of completing an entire degree. The programs typically consist of four online courses.
You can later apply your credits toward a master's degree.
If you complete both of the certificates in either Internet Engineering (“Client/Server and Wireless Devices” and “Component Technologies and Online Collaboration”), you are just two courses away from completing the MS in Internet Engineering. Completion of three post-graduate certificates in information assurance (“Network Protection,” “Security Management” and “Information Assurance Administration”) is equivalent to earning a master’s degree in Information Assurance.
Courses from other institutions cannot be transferred toward a graduate certificate. Certificates, all of which are 12 credits, are available in the following areas:
- Acquistions Management
- Client/Server and Wireless Devices
- Component Technologies and Online Collaboration
- Digital Forensics and Incident Handling
- Information Assurance Administration
- Information Technology
- Network Protection
- Secure Cloud Computing
- Secure Mobile Technology
- Secure Software Development
- Security Management