Doctor of Philosophy in Cybersecurity (PhD-CY)

Online

Complete your studies on your own time.

Finish in 40-44 months

Average completion time

Next start date
Every Monday

Year-round enrollment

Home » Programs » Doctor of Philosophy in Cybersecurity (PhD-CY)

Doctor of Philosophy in Cybersecurity (PhD-CY)

Degree:

Doctor of Philosophy in Cybersecurity (PhD-CY) Degree

Application:

$0 application fee. No essays/exams.

In today’s data-dependent world, every organization needs senior-level experts with the knowledge and training to monitor its networks for vulnerabilities and security breaches and use tools like firewalls and data encryption programs to protect sensitive information. National University’s online Doctor of Philosophy of Cybersecurity (PhD-CY) degree program takes an applied approach to cybersecurity theory and research. 

NU’s curriculum challenges you to explore advanced topics, learn the very latest concepts, and prepare for anticipated risks in the field of cybersecurity. The Cybersecurity doctorate is designed to prepare researchers with technology strategies that are applicable to leading positions in both the private and public sectors. Our program offers four specializations that allow you to tailor your studies and research to match your interest in a specific area of cybersecurity.

In this rigorous curriculum, you’ll explore governance, compliance, leading frameworks, models, and standards to reduce threats and vulnerabilities. You’ll also create a portfolio of valuable capabilities, addressing internal and external issues through the intelligent manipulation of data while completing your doctoral studies.

Degree Requirements

The PhD program requires a minimum of 60 credits. Additional credit hours may be allowed as needed to complete the dissertation research. If granted, additional courses will be added to the student degree program in alignment with the SAP and Academic Maximum Time to Completion policies. Students who do not complete their program in accordance with these policies may be dismissed.

National University awards credit in quarter units, with each academic year divided into four 12-week quarters. 

Each quarter is made up of three 4-week classes, with one class per month. Under the current policy, 4.5 units of credit are awarded for courses.

The PhD in Cybersecurity requires eight foundation/core courses, five specializations, two research, a pre-candidacy prospectus, and four dissertation courses for a total of 60 credit hours. 

*Students select one pair of research methods and directed research courses based on their own research proposal. 

The PhD in Cybersecurity requires the following courses for every specialization:

Course Requirements

3 Credits

In this course, students are prepared for an understanding of networks and related theory to support computer science, cybersecurity, and technology management needs. Students will learn network concepts, as well as designing networks for reliability, availability, confidentiality, and network monitoring. Content will include high-level design of networks, evaluation of service providers, and strategies to prepare an organization for future communication needs (such as multi-cloud, satellite, 5G & 6G, and quantum data communications, plus related security techniques). Students will learn network design, planning, the role of network data communication devices, global access, and safe third-party data exchange.

3 Credits

This course will consolidate a foundation of concepts relating to security and cybersecurity, enabling the successful examination of greater detail and complexity in later courses. You will examine the full range from governance through compliance with laws, through people risks, to technology. Various mitigation options are considered to reduce vulnerabilities, counter threats, and to protect an organization’s data and system assets. You will study the need to protect organizations from future exposures and apply critical thinking and synthesis to motivate the resources needed to defend an organization.

3 Credits

Cybersecurity has the primary objective of averting losses and restoring proper operations should there be a loss. During this course you will study the foundations of risk and the opportunities to reduce cybersecurity losses for organizations. Risk assessment abilities and research options form the base of cyber defenses and determine the need for subsequent resources. The course continues with measuring risk and events leading to the identification of potential incidents and solutions. Learning about contingencies consider the needs of the organization, maintaining operations, and preparing for the best recovery should there be a loss.

3 Credits

Tracking and responding to cyber events requires massive databases integrating content from all devices at every location. Cyber threat analysis and response implies long term access and complex manipulation of event databases. In this course you will learn techniques to capture and display relevant data and leverage automation to reduce losses. Data manipulation, automated sense-making, appropriate fast reactions, machine learning, data analysis, and presentation are rapidly developing cybersecurity techniques. You will also leverage required capabilities for the defense of the organization, respond to enhanced threat complexity and capabilities, and address the need to counter data poisoning by threat actors.

3 Credits

Risk management is the foundation of defending organizations from information security, cyber threats, compliance, audit, and privacy exposures. To address risk and assurance, this course builds an integrated approach solution leading to the prioritization of resources for an organization. You will extend your knowledge and skills for global protection within and beyond the perimeter. This course positions the importance of risk management within a cybersecurity program and its role within Enterprise Risk Management (ERM). You will also assess theories and practices concerning risk management, compose a risk strategy, and leverage maturity models to improve the protection of organizations.

3 Credits

This course serves as an extensive exploration of statistics for the technology leader. Included in the course, is an advanced examination of statistical analyses commonly used for information systems and technology research. During this course, you will use different statistical tools to enhance your advanced analytical skills. These statistical analysis skills are required to plan, conduct, and interpret quantitative data to inform enterprise decisions. You will also learn to illustrate and produce technical output reports.

3 Credits

Global integration and broad alliances between criminal elements and nation-states frequently lead to rapidly changing and significant threats to all nations, organizations, and citizens. During this course, you will study current and predictable threats, target critical infrastructure, and determine risks implied in new technology. You will also learn to recognize the risks originating from cybercriminals, terrorism, hacktivism, and nation-state, and other significant threat actors. You will devise and work to get funding for viable strategies to defend critical infrastructures, organizations, and the citizens of the nation.

3 Credits

This course provides a survey of the different methods used to conduct technology-based research. During this course, you will learn about the research principles and methodologies that guide scientific inquiry in order to develop an understanding of the effects of research on individuals and organizations. Specifically, you will study the scientific research lifecycle, data collection methods, and research design methodology. You will finish the course by selecting a research design methodology to support your research interests through the remainder of your program.

One of the following:

3 Credits

The results of technical research are frequently used to support informed management decisions. This course provides technology leaders and professionals with the skills needed to design and conduct quantitative research studies to support specific types of data. During this advanced course in research, you will explore and apply different types of quantitative research methods and statistical techniques. You will also explore instrumentation, data collection, and data analysis tools and techniques to create aligned, ethical, and substantive research designs.

3.0 Quarter Units

A quantitative research design includes objective analysis using experimental, quasi-experimental, and related techniques. Technical quantitative research involves statistical analysis of data collected from a larger number of participants to determine an outcome that can be applied to a general population. During this course, you will work through the scientific research process and apply your knowledge of quantitative research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.

3.0 Quarter Units

The results of qualitative research are frequently used to support informed management decisions. This course provides technology leaders with an in-depth introduction to qualitative methods for studying human behavior, including grounded theory, narrative analysis, and case studies. During this advanced course in research, you will apply qualitative research methods to an information technology-based study. You will also deepen your research knowledge and skills by conducting interviews, collecting and coding data, producing ethical data conclusions, and creating objective research reports.

3.0 Quarter Units

Prerequisite: ABA 620

A qualitative approach to research of a technical nature integrates theoretical, conceptual, and empirical constructs with common practices and experience to gain an understanding of performance and functionality, develop an applied and testable model for improvement, or provide insights into problems to develop new ideas. During this course, you will work through the scientific research process and apply your knowledge of qualitative research design to develop a technical research proposal to support your research interests through the remainder of your program.

3.0 Quarter Units

The results of technical research are frequently used to develop new products and services. This course provides technology leaders and professionals with the skills needed to design and conduct constructive research studies based on theory. During this advanced course in research, you will examine the methods and measurements used to design constructive research studies to develop sound technical solutions or prototypes. You will also explore software and security testing tools and user acceptance testing methods in order to create aligned, ethical, and substantive research designs.

3.0 Quarter Units

Technical constructive research focuses on models, frameworks, tools, and software used by industry to improve value creation. A constructive approach to research of a technical nature integrates theoretical and empirical constructs with common practices and experience to develop an applied and testable model to improve the fields of computer science and information technology. During this course, you will work through the scientific research process and apply your knowledge of constructive research design to develop a technical research proposal in which you can use to support your research interests through the remainder of your program.

3 Credits

The Pre-Candidacy Prospectus course is intended to ensure students have mastered knowledge of their discipline within cybersecurity prior to doctoral candidacy status and are able to demonstrate the ability to design empirical research as an investigator before moving on to the dissertation research coursework. During this course, you will demonstrate the ability to synthesize empirical, peer-reviewed research to prepare for the dissertation sequence of courses. This course should be completed only after the completion of all foundation, specialization, and research courses.

3 Credits

Students in this course will be required to complete Chapter 1 of their dissertation proposal including a review of literature with substantiating evidence of the problem, the research purpose and questions, the intended methodological design and approach, and the significance of the study. A completed, committee approved (against the minimum rubric standards) Chapter 1 is required to pass this course successfully. Students who do not receive approval of Chapter 1 to minimum standards will be able to take up to three supplementary 8-week courses to finalize and gain approval of Chapter 1.

3 Credits

Students in this course will be required to work on completing Chapters 1-3 of their dissertation proposal and receive committee approval for the Dissertation Proposal (DP) in order to pass the class. Chapter 2 consists of the literature review. Chapter 3 covers the research methodology method and design and to includes population, sample, measurement instruments, data collection and analysis, limitations, and ethical considerations. In this course, a completed, committee-approved Chapters 2 and 3 are required and, by the end of the course, a final approved dissertation proposal (against the minimum rubric standards). Students who do not receive approval of the dissertation proposal will be able to take up to three supplementary 8-week courses to finalize and gain approval of these requirements.

3 Credits

Students in this course will be required to prepare, submit, and obtain approval of their IRB application, collect data, and submit a final study closure form to the IRB. Students still in data collection at the end of the 12-week course will be able to take up to three supplementary 8-week courses to complete data collection and file an IRB study closure form.

3 Credits

In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.In this dissertation course students work on completing Chapters 4 and 5 and the final Dissertation Manuscript. Specifically, students will complete their data analysis, prepare their study results, and present their findings in an Oral Defense and a completed manuscript. A completed, Committee approved (against the minimum rubric standards) Dissertation Manuscript and successful Oral Defense are required to complete the course and graduate. Students who do not receive approval for either or both their Dissertation Manuscript or defense can take up to three supplementary 8-week courses to finalize and gain approval of either or both items as needed.

Career Outlook

The Master of Science in Applied Behavioral Analysis degree will prepare you for careers such as:

  • Top Jobs in this field
  • Median Salary (USA)
  • JOB Openings (USA)
  • General and Operations Managers
  • $100,934 avg. salary (USA)
  • 373,566 job openings (past yr.) past year
Plan, direct, or coordinate the operations of public or private sector organizations, overseeing multiple departments or locations. Duties and responsibilities include formulating policies, managing daily operations, and planning the use of materials and human resources, but are too diverse and general in nature to be classified in any one functional area of management or administration, such as personnel, purchasing, or administrative services. Usually manage through subordinate supervisors. Excludes First-Line Supervisors.
Median Salary:
$100,934 annual +110% above US average
Job Openings:
373,566 past year
Salary Range:
  • Low
    $46,104
  • Medium
    $100,934
  • High
    $231,855

Most desired skills

  1. Operations Management
  2. Marketing
  3. Merchandising
  4. Finance
  5. Project Management
  6. Inventory Management
  7. Profit And Loss (P&L) Management

Top companies hiring for this role

  • Unclassified
  • CVS Health
  • AutoZone
  • Buckle
  • Walmart
  • Enterprise Rent-A-Car
  • Menards
  • Compliance Officers
  • $75,549 avg. salary (USA)
  • 38,710 job openings (past yr.) past year
Examine, evaluate, and investigate eligibility for or conformity with laws and regulations governing contract compliance of licenses and permits, and perform other compliance and enforcement inspection and analysis activities not classified elsewhere.
Median Salary:
$75,549 annual +57% above US average
Job Openings:
38,710 past year
Salary Range:
  • Low
    $43,596
  • Medium
    $75,549
  • High
    $124,563

Most desired skills

  1. Auditing
  2. Regulatory Compliance
  3. Project Management
  4. Risk Analysis
  5. Risk Management
  6. Finance
  7. Accounting

Top companies hiring for this role

  • Unclassified
  • Humana
  • Citigroup
  • Wells Fargo
  • Wahve Holdings
  • Elevance Health
  • Amentum
  • Information Security Analysts
  • $120,088 avg. salary (USA)
  • 20,359 job openings (past yr.) past year
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Median Salary:
$120,088 annual +149% above US average
Job Openings:
20,359 past year
Salary Range:
  • Low
    $68,977
  • Medium
    $120,088
  • High
    $182,679

Most desired skills

  1. Cyber Security
  2. Auditing
  3. Vulnerability
  4. Computer Science
  5. Incident Response
  6. Information Systems
  7. Risk Analysis

Top companies hiring for this role

  • Unclassified
  • Leidos
  • Deloitte
  • General Dynamics
  • Marriott International
  • Mindpoint Group
  • Booz Allen Hamilton
  • Computer Network Architects
  • $129,315 avg. salary (USA)
  • 13,281 job openings (past yr.) past year
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software.
Median Salary:
$129,315 annual +169% above US average
Job Openings:
13,281 past year
Salary Range:
  • Low
    $77,509
  • Medium
    $129,315
  • High
    $195,430

Most desired skills

  1. Network Engineering
  2. Network Routing
  3. Automation
  4. Computer Science
  5. Firewall
  6. Network Switches
  7. Wide Area Networks

Top companies hiring for this role

  • Unclassified
  • Leidos
  • Amazon
  • Marriott International
  • Lumen Technologies
  • TEKsystems
  • Acosta Group
  • Blockchain Engineers
  • $102,519 avg. salary (USA)
  • 44,821 job openings (past yr.) past year
Maintain and support distributed and decentralized blockchain-based networks or block-chain applications such as cryptocurrency exchange, payment processing, document sharing, and digital voting. Design and deploy secure block-chain design patterns and solutions over geographically distributed networks using advanced technologies. May assist with infrastructure setup and testing for application transparency and security.
Median Salary:
$102,519 annual +113% above US average
Job Openings:
44,821 past year
Salary Range:
  • Low
    $47,902
  • Medium
    $102,519
  • High
    $176,442

Most desired skills

  1. Blockchain
  2. Rust (Programming Language)
  3. Cryptography
  4. Computer Science
  5. Smart Contracts
  6. JavaScript (Programming Language)
  7. Scalability

Top companies hiring for this role

  • Unclassified
  • Cliffpoint Limited
  • Ernst & Young
  • Circle – Financial Services
  • Fidelity Investments
  • Mastercard
  • Deloitte

Program Learning Outcomes

As a graduate of National University’s Doctor of Philosophy in Cybersecurity (PhD-CY), you’ll be able to:

  • Advance theory and practical applications of cybersecurity
  • Formulate cybersecurity governance, policy, risk, and compliance
  • Assess internal and external threats and vulnerabilities to reduce organizational cyber risk
  • Evaluate tools, data, and processes to enhance protection and foster resilience
  • Facilitate the protection of critical information resources from current and future loss
woman smiling at man taking notes

Admissions

Next start date: Every Monday

Year-round enrollment

Transfer Students Welcome

More about transferring to NU.

Enrolling in a university is a big decision. That’s why our dedicated admissions team is here to guide you through the admissions process and help you find the right program for you and your career goals.

To that end, we’ve simplified and streamlined our application process, so you can get enrolled in your program right away. Because we accept and review applications year round, you can begin class as soon as next month, depending on your program and location of choice.

Learn more about undergraduate, graduate, military, and international student admissions, plus admissions information for transfer students. You can also learn more about our tuition rates and financial aid opportunities.

To speak with our admissions team, call (855) 355-6288 or request information and an advisor will contact you shortly. If you’re ready to apply, simply start your application today.

woman smiling at man taking notes

Scholarships and Financial Aid

National University is dedicated to making higher education affordable, as well as accessible. Through NU scholarship offerings, eligible students are able to reduce the financial burden of college, start classes sooner, and finish their programs faster while focusing on achieving their goals.

Accreditations

WASC Senior College and University Commission logo

The Western Association of Schools and Colleges (WASC) accredits public and private schools, colleges, and universities in the U.S.

woman with toddler smiling

Why National University?

We’re proud to be a Veteran-founded, San Diego-based nonprofit. Since 1971, our mission has been to provide accessible, achievable higher education to adult learners.

Today, we educate students from across the U.S. and around the globe, with over 240,000 alumni worldwide.

headshot of Francisco, class of 2016

“National University has impacted my career. You can immediately apply what you learn in class to your business.”

Francisco R.,

Class of 2016

What makes a degree
with National University unique?

Free Tutoring Sessions

Access personalized tutoring sessions at no cost — empowering your learning.

Online

Flexibility meets quality education with our online learning option.

24/7 Support

Get assistance anytime, anywhere with our round-the-clock support services.

Military Friendly

Committed to serving those who serve — diverse resources and support for veterans and family. Military and Veteran Admissions.

Mentoring Network

Individual student and alumni career guidance, professional development opportunities, and customized career support.

Transfer Students Welcome

NU makes it easy to get your degree, even if you started it with another university. Learn more about transferring to NU.

Accelerate Your Career With NU

At National University, you’re part of a family. As a student, you’ll have the support of staff, faculty members, students, and alumni who will be there with you every step of the way, cheering you on as you pursue your goals.

Our network of 240,000 alumni is a large global community that provides our graduates with the professional connections to get a leg up in your new career.

man and woman in graduation cap and gown smiling among other graduating students

FAQs

A PhD dissertation is a scholarly documentation of research that makes an original contribution to the field of study. This process requires care in choosing a topic, documenting its importance, planning the methodology, and conducting the research. These activities lead smoothly into the writing and oral presentation of the dissertation. At National University, faculty members assist every doctoral student with a systematic process designed to ensure the completion of a high-quality dissertation.

A doctoral candidate must be continuously enrolled throughout the series of dissertation courses. Dissertation courses are automatically scheduled and accepted without a break in scheduling to ensure that students remain in continuous enrollment throughout the dissertation course sequence. If additional time is required to complete any of the dissertation courses, students must re-enroll and pay the tuition for that course. Continuous enrollment will only be permitted when students demonstrate progress toward completing dissertation requirements. The Dissertation Committee determines progress.

National University is dedicated to assisting students in the achievement of their academic aspirations and helping them become valuable contributors to their community and profession. To accomplish this, we now offer a dissertation completion pathway for students who have successfully completed their doctoral coursework and achieved doctoral candidacy at a previous institution but were unable to complete their dissertation.  

Our Dissertation Completion Pathway (DCP) offers a unique opportunity for students to complete their doctorate in one of the doctoral programs offered at NU (excluding the PhD in MFT, DMFT, DNP, and DHA). Students successfully meeting the entrance and application requirements will complete a minimum of 23 credit hours to earn their doctorate.

The vision for the Dissertation Completion Pathway is to provide “all-but-dissertation” or ABD students a structured approach for completing their dissertation and help them achieve their academic goals in obtaining their doctorate. This pathway provides a student-centered, high touch, and structured pathway that recognizes past academic coursework while providing the student with the preparation and guidance to earn their doctoral degree.

National University allows 7 years to complete all doctoral programs of 60 credits or less. The median time to completion for this program is 44 months.

Time to completion varies depending upon the pace in which a student completes courses and the number of transfer credits accepted. As most NU students are working adults, balancing educational, professional, and personal commitments, our academic and finance advisors will work with you to develop a program schedule that works best for your needs.

Students following the preferred schedule designed by the Dean for this program, and applying no transfer credits, can expect to finish in as little as 40 months.

The highest degree for cybersecurity is typically a Doctor of Philosophy (PhD) in Cybersecurity or a related field. This degree typically requires several years of advanced coursework and research, and is designed for individuals who want to pursue careers in cybersecurity research, academia, or leadership positions.

Whether a PhD in cybersecurity is worth it depends on your career goals and personal interests. If you want to pursue a career in cybersecurity research or academia, a PhD can be a valuable asset that can lead to more job opportunities and higher salaries. However, if you’re primarily interested in working in industry, a PhD may not be necessary or worth the time and cost.

The salary for someone with a PhD in cybersecurity can vary depending on several factors, including the individual’s job title, experience, and location, but you can expect to earn a comfortable living in this field. According to payscale.com, the average base salary for someone with a PhD in Cybersecurity is around $172,000 per year in the United States. However, some positions such as chief security officer or director of operations could earn more.

The most demanding jobs in the field of cybersecurity require experienced professionals with advanced, industry-current knowledge and skills to develop security standards and best practices for their organization. It’s also a career that’s in high demand. For example, about 16,300 openings for information security analysts are projected each year, according to the Bureau of Labor Statistics, and they’ll be well compensated for their expertise – the BLS also states the median annual wage for IS analysts was $102,600 in May 2021, with the highest 10 percent earning more than $165,920.*

NU’s online PhD in Cybersecurity incorporates technical and organizational strategy, architecture, and data science, as well as important areas within artificial intelligence (including machine learning and deep learning). Our curriculum also offers a choice of career-focused specializations, allowing you to focus your studies on a specific area of interest, including:

  • General and Technology 
  • Global Strategy and Operations 
  • Governance, Risk, and Compliance 
  • Secure Cloud Computing

*SOURCE: https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1

NU’s Doctor of Philosophy in Cybersecurity opens the door to a wide range of important, in-demand careers for dedicated professionals with polished skills in communication, management, operations, leadership, and infrastructure. Some of the top job titles* posted in this field include:

  • Information Security Analysts
  • Systems Engineers
  • Security Engineers
  • DevSecOps Engineers
  • Cloud Security Engineers
  • Solutions Architects
  • Systems Administrators 
  • Postsecondary Teachers
  • Postsecondary Administrators

Employers of senior-level cybersecurity professionals are spread across every industry, including: professional, scientific and technical services, finance and insurance, manufacturing, information services, healthcare, and administrative support services.

*Positions may require additional experience, training, and other factors beyond successfully completing this degree program. Depending on where you reside, many positions may also require state licensure, and it is the responsibility of the student to ensure that all licensure requirements are met. We encourage you to also review program-specific requirements with an NU advisor. Any data provided on this page is for informational purposes only and does not guarantee that completion of any degree program will achieve the underlying occupation or commensurate salary.

**SOURCEEmsi Labor Analyst- Report. Emsi research company homepage at https://www.economicmodeling.com/company/ (Report viewed: May 13, 2022). DISCLAIMER: The data provided is for Informational purposes only. Emsi data and analysis utilizes government sources to provide insights on industries, demographics, employers, in-demand skills, and more to align academic programs with labor market opportunities. Cited projections may not reflect local or short-term economic or job conditions and do not guarantee actual job growth.  Current and prospective students should use this data with other available economic data to inform their educational decisions.

Program Disclosure

Successful completion and attainment of National University degrees do not lead to automatic or immediate licensure, employment, or certification in any state/country. The University cannot guarantee that any professional organization or business will accept a graduate’s application to sit for any certification, licensure, or related exam for the purpose of professional certification.

Program availability varies by state. Many disciplines, professions, and jobs require disclosure of an individual’s criminal history, and a variety of states require background checks to apply to, or be eligible for, certain certificates, registrations, and licenses. Existence of a criminal history may also subject an individual to denial of an initial application for a certificate, registration, or license and/or result in the revocation or suspension of an existing certificate, registration, or license. Requirements can vary by state, occupation, and/or licensing authority.

NU graduates will be subject to additional requirements on a program, certification/licensure, employment, and state-by-state basis that can include one or more of the following items: internships, practicum experience, additional coursework, exams, tests, drug testing, earning an additional degree, and/or other training/education requirements.

All prospective students are advised to review employment, certification, and/or licensure requirements in their state, and to contact the certification/licensing body of the state and/or country where they intend to obtain certification/licensure to verify that these courses/programs qualify in that state/country, prior to enrolling. Prospective students are also advised to regularly review the state’s/country’s policies and procedures relating to certification/licensure, as those policies are subject to change.

National University degrees do not guarantee employment or salary of any kind. Prospective students are strongly encouraged to review desired job positions to review degrees, education, and/or training required to apply for desired positions. Prospective students should monitor these positions as requirements, salary, and other relevant factors can change over time.

Back to top