Doctorate of Information Assurance

Choose Your Path

I am looking to earn my

Doctorate of Information Assurance

Classroom to Career

As a doctoral student, all of your courses here will explore relevant cybersecurity policy issues in enterprise management, you’ll complete a cybersecurity project in each, enabling you to make immediate and lasting workplace contributions. You’ll learn from leading, practitioner cybersecurity faculty whose cybersecurity colleagues can become an integral part of your professional network throughout your career.

You can access your project-driven courses online from any location, when it’s convenient for you, and easily communicate with your instructors and classmates. You’ll progress through your coursework in a group, which provides opportunities for collaborative learning and support, as well as more personalized instruction.

Close communication with your advisor and the University’s unique Dissertation Project Plan enable you to complete manageable milestones that ensure you’re making steady progress toward completing your dissertation and reaching your goal.

Course Information

Doctorate of Information Assurance (DIA): 62 credits

SYNC SESSIONS

DIA Courses

OFFERED TIMES

Thursday or Friday Night (8PM, 9PM, or 10PM EST)

Program Core: 48 Credits

IA7020: Information Security Systems and Organizational Awareness

In this course, students will explore a set of core IS principles that will prepare students to function more efficiently and effectively as workers, managers, decision makers, and organizational leaders. This course will provide insights into challenges and changing roles of the IS professional so that students can better appreciate the role of this key individual.

IA7030: Legal and Ethical Practices in Information Security

In this course, students will explore ethical business decision making as a related to the use of technology by evaluating information security case studies and produce real-life deliverables.

IA7040: Information Security and Organizational Change

In this course, students analyze the principles of change management as they apply to the requirements and regulations of information security. Students evaluate the factors which affect corporate decision-making when implementing security programs and the ability of the manager to translate corporate needs into information security projects.

IA8010: Business and Security Risk Analysis

This course provides students with an overview of risk management principles.  Methods to identify, quantify, and qualify internal and external risks to the organization are examined.  Students apply these principles and methods to the current business and risk environment.

IA8110: Certification and Accreditation

In this course, students analyze an enterprise-wide view of information systems and the establishment of appropriate, cost-effective information protection programs. Within this context, students examine a set of standard policies, procedures, activities, and a management structure to certify and accredit information systems for the protection of the data as well as the systems.

IA8021: Cloud Cybersecurity

In this course students will research and analyze virtualization technology needed in today’s rapidly changing IT workplace. The course will focus on virtualization in software-defined data centers. Students learn to build virtual networks, implement high-availability clusters, enhance performance and security, and manage the virtual data center.

IA8031: Cybersecurity Insurance

In this course students will explore advanced security techniques and procedures to effectively secure data network through the use of Cryptography and System Security. Additional areas of research will expand into wireless networks, email, and IP security.

A8190: Forensic Evaluation and Incident Response Management

In this course, students explore the essentials of electronic discovery and analyze issues related to cyber evidence. Using this evidence, students identify and analyze the nature of security incidents, the source of potential threats and the methods used in incident management and mitigation. Students also analyze the technical and business issues which affect the actions of the enterprise in responding to a security incident.

IA9150: Strategic and Technical Trends Information Security

In this course, students will focus on the managerial aspects of information security assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. The course includes up-to-date information on changes in the field, such as national and international laws and international standards like the ISO 2700 series.

IA9200: Research Topics in Information Security

In this course, doctoral students enrolled in the doctoral program must complete two written research papers which demonstrate mastery of the selected CBK domains, literature-based research skills, and APA format and citation requirements

Pre Dissertation, Research Methodologies, & Phases:

RM8500: Research Foundations

In this course, doctoral students are introduced to the purpose and nature of primary research. Students explore the foundations and concepts of applied field research.

RM9100: Qualitative and Quantitative Analysis

(Prerequisite: Program Core Courses completed) In this course, students compare, contrast, and evaluate qualitative and quantitative methods of data analysis for solving business problems and conducting business-related field research. In week 4, the Comprehensive and qualifying exam is released as a separate course shell, IA9130. The Exam is expected to be completed concurrently while completing RM9100 and is due in week 8.

IA9130-CX: Comprehensive & Qualifying Examination

Students complete the Comprehensive & Qualifying Examination in weeks 4-8 of the RM9100 course. The IA9130 course is administered concurrently with RM9100.

CEX8220: Security Program Strategies and Implementation

This course is part of a two-course advanced research methodology sequence CEX8220 and CEX8230 that is designed to assess the student’s ability to conduct independent research under the guidance of an instructor. The CEX8220 is designed to assess the student’s quantitative research skills.

CEX8230: Legal and Ethical Management Issues in Information Security

This course is part of a two-course advanced research methodology sequence CEX8220 and CEX8230 that is designed to assess the student’s ability to conduct independent research under the guidance of an instructor. The CEX8220 is designed to assess the student’s qualitative research skills.

RM9150: Feasibility Problem Driven Research

(Prerequisite: Program Core, Pre-Dissertation and Research Methodologies completed) In this course, students identify a research site, describe a plan for access to the research site, identify a problem affecting the research site that can be developed into a feasible topic area for field research, and develop a working bibliography of recent and relevant peer-reviewed research that supports the theoretical framework of the proposed topic. Students apply the concept of problem-driven research as the basis for selecting a feasible and non-trivial research topic or problem.

RM9200: Designing Solutions to Information Security Problems

In this course, doctoral students enrolled in the DIA program continue to evaluate the feasibility of their proposed research site and the potential solutions to be studied. Students present their proposed project at the Dissertation Bootcamp at the end of this course.

RES8110 : Dissertation Proposal (Chapter 1)

This is the first course in Phase II of the doctoral plan. Phase II consists of the Research Preparation courses (RES8110, RES8120, RES8121, and RES8130) in which doctoral students follow a structured approach to designing their dissertation study, refining their research question(s), and developing the operational details for their study. The focus is on clearly specifying the assessment criteria and organizational requirements needed to justify a proposed improvement in professional practice, and on designing and implementing such an assessment. RES8110 is the first course in which students start developing the dissertation proposal (Chapters 1-4.1)

RES8120: Dissertation Proposal (Chapter 2)

This is the second course in Phase II of the doctoral plan. Phase II consists of the Research Preparation courses (RES8110, RES8120, RES8121, and RES8130) in which doctoral students follow a structured approach to designing their dissertation study, refining their research question/s, and developing the operational details for their study. The focus is on clearly specifying the assessment criteria and organizational requirements needed to justify a proposed improvement in professional practice, and on designing and implementing such an assessment.
RES8120 is the second course in which students continue developing the dissertation proposal (Chapters 1-4.1).

RES8121: Dissertation Proposal (Chapter 2, Continued)

This is the third course in Phase II of the doctoral plan. Phase II consists of the Research Preparation courses (RES8110, RES8120, RES8121, and RES8130) in which doctoral students follow a structured approach to designing their dissertation study, refining their research question/s, and developing the operational details for their study. The focus is on clearly specifying the assessment criteria and organizational requirements needed to justify a proposed improvement in professional practice, and on designing and implementing such an assessment.
RES8121 is the third course in which students continue developing the dissertation proposal (Chapters 1-4.1).
RES8120 is the second course in which students continue developing the dissertation proposal (Chapters 1-4.1).

RES8130: Dissertation Proposal (Chapters 3 and 4.1, IRB)

This is the fourth and final course in Phase II of the doctoral plan. Phase II consists of the Research Preparation courses (RES8110, RES8120, RES8121, and RES8130) in which doctoral students follow a structured approach to designing their dissertation study, refining their research question/s, and developing the operational details for their study. The focus is on clearly specifying the assessment criteria and organizational requirements needed to justify a proposed improvement in professional practice, and on designing and implementing such an assessment. RES8130 is the fourth and final course in which students continue developing the dissertation proposal (Chapters 1-4.1).RES8121 is the third course in which students continue developing the dissertation proposal (Chapters 1-4.1).
RES8120 is the second course in which students continue developing the dissertation proposal (Chapters 1-4.1).

DST8110 : Dissertation Manuscript (Chapters 4 & 5)

In DST8110, doctoral candidates complete the approved field research and collect and analyze data according to the plan set forth in the approved dissertation proposal (Chapters 1-4.1) that was completed and approved in the RES course sequence during Phase II.RES8120 is the second course in which students continue developing the dissertation proposal (Chapters 1-4.1).

DST8130X : Final Dissertation Manuscript & Defense

(Prerequisite: Approval to Defend) In this course, candidates present their findings to the Dissertation Committee at the defense.

Final Dissertation

CFE565 Forensic Evaluation and Analysis

This course uses the 9 domains of the CCFE as the foundation to educate students in the field of Computer Forensics and to provide the necessary skills to the student so they can be an effective Computer Forensics Investigator. The skills learned in the course will include practical skills for hands‐ on computer forensics investigations as well as preparation skills for legal examination and chain‐of‐ custody delivery under the Federal Rules of Civil Procedure. Additionally, the student will learn detailed techniques for examining digital evidence from computer equipment to mobile phones and any device that deals with a microprocessor.
Minimum credits required for DIA: 621

1Credit hours may exceed the minimum stated if dissertation deliverables are not completed within expected timeframes.

Technology Requirements

*Students must have immediate access to a laptop, tablet, or desktop.

Technology Requirements

Following are the recommended general technical hardware/software specifications for students enrolled in all academic programs at the University of Fairfax. Please note that

a) these specifications are sufficient for the entire duration of the program,

b) need for specific applications/software would be determined by the actual course(s) registered and the availability of the applications, and

c) although students with Mac computers can access any applications/software by leveraging remote access tools, Mac platform is not recommended and supported, and

d) doctoral students will be required to user several open-source applications, hosted services, and publicly available virtual machines. This may include but is not limited to SAS (Statistical Analysis System) OnDemand, Oracle Virtual Box, Kali OS, Apache Web Server, GNU/Linux, OpenSSL, ROS (Robot Operating System), Blender (3D computer graphics), and Orange (Data Mining).

Minimum Recommended Specifications 

1. Ownership of either laptop or desktop is mandatory. Mobile devices such as Tablets/Smart Phones cannot be used for running any applications. Mobile devices may be used for simple tasks such as accessing Canvas courses for checking messages, grades, due dates, and read the slides. For other tasks such as taking test, uploading assignments, and participating in discussion forums, mobile devices are not recommended and must not be used.

2. These recommendations are universal across all academic programs and provide a basic format for all courses. As you move further into a degree program, these requirements may increase (only minimal) based on the expectations of the program and the availability of applications.

 Platform: Intel-based systems

Minimum

Better

Best

CPU 4 core 3.0 GHz. 6 core 3.0 GHz. 8 core 3.0 GHz.
RAM 16GB 32GB 32GB
Storage 500GB SSD 1TB SSD 1TB SSD
Graphics {Integrated} OR {2GB} OR {1GB DirectX 11} {Integrated} OR {4GB} OR {2GB DirectX 11} OR {NVIDIA 4GB} OR {NVIDIA 4GB DirectX 11} {4GB} OR {NVIDIA 4GB} OR {4GB DirectX 11} OR {NVIDIA 6GB DirectX 11}
Operating System Windows 10 or 11 64-bit (Professional Edition only), No Home Edition Windows 10 or 11 64-bit (Professional Edition only), No Home Edition Windows 10 or 11 64-bit (Professional Edition only), No Home Edition
Extras

2-3 USB 2.0 or 2-3 USB 3.0 Ports

 

Microphone

 

Camera

 

External USB Drive for backup (minimum 1 TB)

2-3 USB 2.0 or 2-3 USB 3.0 Ports

 

Microphone

 

Camera

 

External USB Drive for backup (minimum 1 TB)

2-3 USB 2.0 or 2-3 USB 3.0 Ports

 

Microphone

 

Camera

 

External USB Drive for backup (minimum 1 TB)

Recommended Standard Productivity Applications

Access, Excel, OneNote, Outlook, PowerPoint, Power BI, Project, Publisher, Visio, Sway, Word, Forms, Delve

 

Internet browsers like Microsoft Edge, Google Chrome, Safari, Firefox, etc. (recommend the use of multiple browsers)

 

Document Management Application – Adobe Acrobat Professional

 

Zoom Desktop Client (https://zoom.us/download)

 

Free Video / Photo Editing (select 1 or2) Application – PowerDirector (best) – Google, Promeo – Best App for Social Media, iMovie – Video Editor App for Beginners, Splice – Free Video Editor for Trimming and Cropping, Quik – Best Video Editor for Montages, KineMaster – Video Editing App For Experienced Editors, Filmmaker Pro – Best for Vertical Editing, InShot – Best Video Editor App for Aspiring Social Media Content Creators, Mojo – Best for Any Kind of Social Media Post, VivaVideo – Best for Beginners

 

Keep the system up to date with Windows Updates, .NET Framework etc.

 

Access, Excel, OneNote, Outlook, PowerPoint, Power BI, Project, Publisher, Visio, Sway, Word, Forms, Delve

 

Internet browsers like Microsoft Edge, Google Chrome, Safari, Firefox, etc. (recommend the use of multiple browsers)

 

Document Management Application – Adobe Acrobat Professional

 

Zoom Desktop Client (https://zoom.us/download)

 

Free Video / Photo Editing (select 1 or 2) Application – PowerDirector (best) – Google, Promeo – Best App for Social Media, iMovie – Video Editor App for Beginners, Splice – Free Video Editor for Trimming and Cropping, Quik – Best Video Editor for Montages, KineMaster – Video Editing App For Experienced Editors, Filmmaker Pro – Best for Vertical Editing, InShot – Best Video Editor App for Aspiring Social Media Content Creators, Mojo – Best for Any Kind of Social Media Post, VivaVideo – Best for Beginners

 

Keep the system up to date with Windows Updates, .NET Framework etc.

Access, Excel, OneNote, Outlook, PowerPoint, Power BI, Project, Publisher, Visio, Sway, Word, Forms, Delve

 

Internet browsers like Microsoft Edge, Google Chrome, Safari, Firefox, etc. (recommend the use of multiple browsers)

 

Document Management Application – Adobe Acrobat Professional

 

Zoom Desktop Client (https://zoom.us/download)

 

Free Video / Photo Editing (select 1 or 2) Application – PowerDirector (best) – Google, Promeo – Best App for Social Media, iMovie – Video Editor App for Beginners, Splice – Free Video Editor for Trimming and Cropping, Quik – Best Video Editor for Montages, KineMaster – Video Editing App For Experienced Editors, Filmmaker Pro – Best for Vertical Editing, InShot – Best Video Editor App for Aspiring Social Media Content Creators, Mojo – Best for Any Kind of Social Media Post, VivaVideo – Best for Beginners

 

Keep the system up to date with Windows Updates, .NET Framework etc.

 

 

Note: Certain courses may require specific software. Before registering for a course, please contact your instructor or a Student Services Representative for applicable software requirements.

Policy on Sync Sessions

  • The Sync Sessions must be held in weeks 2, 4, 6, 8.
  • The Sync Sessions must be spent having students defending and explaining their research assignment for that week. This time should not be spent lecturing as it should be structured in a manner to help prepare candidates in the process of defending and justifying their research.
  • The Sync Sessions must be held Thursday-Saturday.
  • If the Sync Sessions are held on a Thursday or Friday night, the times to begin should be 8pm, 9pm, or 10pm Est to accommodate students who are on the west coast.