UCL logo

Cybersecurity MPhil/PhD

London, Bloomsbury

It has long been recognised that cybersecurity is a ‘wicked problem’ – one that spills across disciplines, jurisdictions, and borders of all kinds. Our programme breaks with disciplinary tradition to rethink how we develop people equipped to deal with the cybersecurity challenges of the future.

UK tuition fees (2024/25)

Overseas tuition fees (2024/25), programme starts, applications accepted.

Applications open

  • Entry requirements

A minimum of an upper second-class Bachelor's degree in a relevant subject from a UK university or an overseas qualification of an equivalent standard.

The English language level for this programme is: Level 2

UCL Pre-Master's and Pre-sessional English courses are for international students who are aiming to study for a postgraduate degree at UCL. The courses will develop your academic English and academic skills required to succeed at postgraduate level.

Further information can be found on our English language requirements page.

If you are intending to apply for a time-limited visa to complete your UCL studies (e.g., Student visa, Skilled worker visa, PBS dependant visa etc.) you may be required to obtain ATAS clearance . This will be confirmed to you if you obtain an offer of a place. Please note that ATAS processing times can take up to six months, so we recommend you consider these timelines when submitting your application to UCL.

Equivalent qualifications

Country-specific information, including details of when UCL representatives are visiting your part of the world, can be obtained from the International Students website .

International applicants can find out the equivalent qualification for their country by selecting from the list below. Please note that the equivalency will correspond to the broad UK degree classification stated on this page (e.g. upper second-class). Where a specific overall percentage is required in the UK qualification, the international equivalency will be higher than that stated below. Please contact Graduate Admissions should you require further advice.

About this degree

This programme provides you with core skills and knowledge at the forefront of computing, cybercrime, and digital technology policy. Our multidisciplinary approach ensures that you achieve deep domain-specific expertise, while developing into individuals who can resolve problems using a range of tools and methods and confident in your ability to work effectively with experts from across the socio-technical divide.

We offer supervision in computing (systems security, cryptography, software security, network security), crime science (cybercrime and policing issues) and in domestic and international policy (digital tech policy, global cybernorms, international peace and security).

You will develop a level of expertise in your topic that incorporates the dimensions covered in our Centre for Doctoral Training (CDT) and you will leave with a network of colleagues working in and across these domains.

Who this course is for

This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

What this course will give you

UCL is ranked 9th globally and 5th in Europe in the QS World University Rankings 2024 , giving you an exciting opportunity to study at one of the world's best universities.

UCL is one of the UK's elite Academic Centres of Excellence in Cyber Security and hosts the UK Research Institutes in Science of Cyber Security (RISCS). The team is led by UCL Computer Science , a department ranked first in England and second in the UK for research power in Computer Science and Informatics in the most recent Research Excellence Framework ( REF2021 ).

Over 40 members of faculty with internationally recognised expertise across all aspects of cybersecurity run a diverse and ambitious portfolio of projects, working closely with industry and policy partners. You will learn from leading academic experts with an outstanding reputation in the field.

Acknowledging that technology alone cannot address the challenges of cyber insecurity, the Department of Science, Technology, Engineering and Public Policy focuses on improving knowledge exchange between technical and policy stakeholders. Providing advice and support to both industry and government around the world, STEaPP runs a portfolio of funded projects that explore how cybersecurity impacts at the societal level as well as on international peace and security.

The foundation of your career

Depending on your research agenda, the programme will provide you with core skills and knowledge at the forefront of computing (systems security, cryptography, software security, network security), crime science (cybercrime) and policy (information security management, public policy). Suitable careers will include technology R&D, intelligence and policing, international and domestic public policy, cyber diplomacy and digital infrastructure project implementation.

Employability

Investing in people and skills and deepening the partnership between government, academic and industry is the first pillar of the UK National Cyber Strategy. To help address this, you will be trained in how to work with evolving cybersecurity challenges through multidisciplinary means. By developing a holistic understanding of how technology, policy, industry and law enforcement interact, you will be equipped for high-level leadership positions that will help to shape the future through secure digital technologies.

The CDT is conveniently located in the heart of London and subsequently has strong links with both industry and policy stakeholders. The three partner departments in the CDT between them host the Information Security Group, the Jill Dando Institute of Security and Crime Science, the Dawes Centre for Future Crime, the Research Institute for Science of Cyber Security, the Digital Technologies Policy Lab and the PETRAS National Centre of Excellence for Cybersecurity of the Internet of Things. All of these offer exceptional networking platforms for the CDT candidates who become part of our research community .

Teaching and learning

You are   assigned a first and second supervisor who  you  will meet regularly.  You  will have a choice of research groups which you can assign yourself to. These research groups meet regularly for seminars and related activities in the departments.

In year 1, you are a ssessed through the completion of a literature review, a six-month research project, a systematic literature review group project, and an integrated assessment that draws on the material delivered across the taught modules.

You will go on to participate in an upgrade viva (MPhil to PhD) between months 15 and 24.

During your research degree, you will have regular meetings with your primary supervisor, in addition to contact with your secondary supervisor and participation in group meetings. Full-time study should comprise of 40 hours per week.

Research areas and structure

Supervision within this programme is available in an extensive range or research areas including:

  • artificial intelligence (AI)
  • applied cryptography
  • on-line propaganda / hate speech / fake news
  • authentication and verification
  • financial technology and cryptocurrencies
  • blockchains
  • global politics of cybersecurity, cyberwar, cyber norms
  • national cyber security strategies
  • systems modelling
  • security economics
  • smart contracts
  • distributed systems security
  • network security
  • the Internet of Things
  • security testing
  • secure software engineering methodologies
  • malware and binary analysis
  • watermarking and copyright protection
  • cybercrime, child protection, and dark marketplaces
  • cyber risk and cyber security policy
  • standards and regulation of digital and telecommunications
  • connected autonomous vehicles
  • gender issues and tech abuse
  • hacking and hacktivism
  • privacy, censorship, surveillance
  • applications to secure communications
  • quantum computing, quantum information theory

Research environment

The departments are very well-connected with research groups across the university, and are involved in many exciting multi-disciplinary research projects.

The CDT provides a 4-year programme of training in cutting-edge disciplinary skills in computing, social sciences and humanities, as well as transferable skills relating to cross sector and cross disciplinary communication, teamwork, public dissemination and professional practice.

This is achieved through a combination of structured compulsory and elective taught modules and training activities, as well as an `apprenticeship’ model involving hands-on personal and team-based research under the supervision of a lead in the field of cybersecurity.

Find out more on our CDT website.

This programme is not currently running a part-time option.

Some projects will call for fieldwork and you will be able to apply to the Research Training Support Grant for funding to support this. Supervisory teams provide contacts and introductions where needed to help you maximise the value of your fieldwork.

All CDT candidates will undertake a placement as part of their programme. Supervisory teams work with candidates and with our industry and policy partners to devise an appropriate placement for each case. These are integrated into the research project to support and enhance it while also offering valuable insights into `real world' cybersecurity problems and work environments.

Accessibility

Details of the accessibility of UCL buildings can be obtained from AccessAble accessable.co.uk . Further information can also be obtained from the UCL Student Support and Wellbeing team .

Fees and funding

Fees for this course.

The tuition fees shown are for the year indicated above. Fees for subsequent years may increase or otherwise vary. Where the programme is offered on a flexible/modular basis, fees are charged pro-rata to the appropriate full-time Master's fee taken in an academic session. Further information on fee status, fee increases and the fee schedule can be viewed on the UCL Students website: ucl.ac.uk/students/fees .

Additional costs

Your research degree may be subject to an Additional Fee Element (AFE). The AFE (also known as bench fees) is an additional cost, incurred by yourself or your sponsor. It is levied to cover the costs related to consumables, equipment and materials etc. which are not included in the tuition fee. As each research project is unique in nature, the AFE is calculated on a student-by-student basis and is determined by your academic supervisor.

For more information on additional costs for prospective students please go to our estimated cost of essential expenditure at Accommodation and living costs .

Funding your studies

The Cybersecurity CDT does not have UKRI-funded studentships available for the 2024/25 academic year. Potential candidates who may have other sources of funding available to them — such as from industry, non-UK governments, or their own resources — should consult the CDT’s website where advice will be posted as it becomes available.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website.

For a comprehensive list of the funding opportunities available at UCL, including funding relevant to your nationality, please visit the Scholarships and Funding website .

CSC-UCL Joint Research Scholarship

Value: Fees, maintenance and travel (Duration of programme) Criteria Based on academic merit Eligibility: EU, Overseas

All applicants are asked to identify and contact potential supervisors before making an application.

Please note that you may submit applications for a maximum of two graduate programmes (or one application for the Law LLM) in any application cycle.

Choose your programme

Please read the Application Guidance before proceeding with your application.

Year of entry: 2024-2025

Got questions get in touch.

Computer Science

Computer Science

[email protected]

UCL is regulated by the Office for Students .

Prospective Students Graduate

  • Graduate degrees
  • Taught degrees
  • Taught Degrees
  • Applying for Graduate Taught Study at UCL
  • Research degrees
  • Research Degrees
  • Funded Research Opportunities
  • Doctoral School
  • Funded Doctoral Training Programmes
  • Applying for Graduate Research Study at UCL
  • Teacher training
  • Teacher Training
  • Early Years PGCE programmes
  • Primary PGCE programmes
  • Secondary PGCE programmes
  • Further Education PGCE programme
  • How to apply
  • The IOE approach
  • Teacher training in the heart of London
  • Why choose UCL?
  • Entrepreneurship
  • Inspiring facilities and resources
  • Careers and employability
  • Your global alumni community
  • Your wellbeing
  • Postgraduate Students' Association
  • Your life in London
  • Accommodation

Cyber Security and Software Technology Doctoral Programme

Overview Application Process Teaching Supervisors Download brochure

Programme Overview

At De Montfort University (DMU) we are recognised as world leaders in cyber security and software technology research. We advise governments on it, we help to develop the leading international standards in the field, deliver the most prestigious cyber security

and software engineering courses, publish our exciting research in worldrenowned journals and organise ground-breaking international conferences in the area, which integrate students into the global research community.

The Cyber Security and Software Technology Doctoral Training Programme run at DMU is led by a world-class team of academics from many disciplines across all faculties, including Psychology, Law, English and Computer Science.

This unique programme will meet the needs of the public and private sector and will provide skilled, flexible and knowledgeable researchers who will be fully able to meet the challenges associated with providing a safe, secure and prosperous environment that encompasses smart systems, critical infrastructures as well as cyber space.

We have a well-deserved reputation for nurturing leading experts who are passionate about protecting the human experience in the cyber world and advance thinking and technologies that are world leading in the design and analysis of future computing systems. If you share this passion this is the ideal starting point for your research career. 

Based in Leicester city centre, at the heart of England, we pride ourselves in being a university of creativity and innovation.

The university’s pioneering research, driven by more than 700 research students and supported by 500 staff, is internationally renowned and addresses some of the most critical issues affecting our world.

Demonstrating the significance of this work, three key pieces of research are listed among the UK’s top 100 projects that will have a profound impact on the future.

DMU’s Cyber Security and Software Technology Doctoral Training Programme offers students the chance to attend modules from specialist MSc courses across the faculties along with a bespoke lecture series in aspects of cyber security and software technology from DMU specialists and world-leading experts in the field.

Application Process

Applicants should complete the  Application Form  and submit it to De Montfort University. Reference forms should be passed to the two referees for completion. The admission points onto the Doctoral Programme are 1 October, 1 January and 1 April. Applications are accepted for full time (typically 36-48 months) and part-time (typically 56-66 months) modes. It is possible for students based overseas to study on the 'International Programme' where the students spends almost all their time in their home country. However, the admission requirements for such students are higher than they are for students who study in Leicester, an experienced local supervisor to the student is also required.

Supervision in the Cyber Security doctoral programme is carried out in teams consisting of at least a first and second supervisor. In many cases we will have an additional second supervisor and external advisors. This is due to the interdisciplinary nature of our research, which often requires different areas of expertise. The structure of the training programme is designed to be flexible and to fit with both full-time and part-time PhD study. The components and course schedule of the programme are as follows: Modules offered (this is an indicative list and not exhaustive):

  • Foundations of Cyber Security
  • Cyber Threat Intelligence
  • Cyber Engineering
  • Professional Practice in Forensics and Security
  • Approaches to the Study of Wellbeing
  • Cyber Law and Ethics
  • Research Methods

Supervisors

All DMU students have at least two supervisors, sometimes three. The first supervisor should be your first port of call for any queries. We typically meet with all supervisors about once a month for full time students.

It is important to realise that ownership of the research project lies with the research student. Your supervisors do not tell you what to do or how to do it. They provide guidance and give input to shape your thinking. Responsibility for accepting or rejecting this guidance lies with the student.  Your first supervisor is also your personal tutor: the member of staff in the University who you should go first to if you have personal, emotional, family, health, money or other welfare issues. Do not worry about going to the same person who comments on your academic work: indeed if they know the personal issues going on, they might be more sympathetic about you not having done as much work as they were hoping.

iStock000009013098Large

phd cyber security distance learning uk

Studying Here

  • Find your course
  • Fees and funding
  • International students
  • Undergraduate prospectus
  • Postgraduate prospectus
  • Studying abroad
  • Foundation Year
  • Placement Year
  • Your future career
  • Central London campus
  • Distance learning courses
  • Prospectuses and brochures
  • For parents and supporters
  • Schools and colleges

Sign up for more information

Student life, accommodation.

  • Being a student

Chat with our students

Support and wellbeing.

  • Visit Royal Holloway
  • The local area
  • Virtual experience

Research & Teaching

Departments and schools.

  • COP28 Forum

Working with us

  • The library

Our history

  • Art Collections

Royal Holloway today

  • Equality, Diversity and Inclusion
  • Recruiting our students
  • Past events
  • Environmental Sustainability
  • Facts and figures
  • Collaborate with us
  • Governance and strategy
  • Online shops
  • How to find us
  • Financial information
  • Local community
  • Legal Advice Centre

In this section

Find a course teaser 2

Find the right course

Online Prospectus 2024

Online undergraduate prospectus

Library Founders view

  • Student life

MC000263 13 06 23 RHUL5343

What our students say

Virtual experience

Explore our virtual experience

  • Research and teaching

people talking over a coffee - working with us

Research institutes and centres

TEACHING.jpg

Our education priorities

Our phd programmes, site search, phd in information security.

The Information Security Group runs a popular full-time and part-time PhD research programme on a wide variety of information security-related topics. The ISG has supervised hundreds of PhD students in its history, many now holding influential positions within the cyber security industry. We are looking for enthusiastic, inquisitive, and dedicated individuals who have the potential to contribute to the growing and diverse field of information security as applied inside and outside of academia. Our research actively contributes to industry, policy, and the development of secure products.

Enquiries: Dr Andrew Dwyer, [email protected], Information Security Group PGR Lead

How does a PhD in Information Security work?

All PhD students are assigned at least one named supervisor and an advisor. The supervisor directs the work and acts as the first line of research, administrative, and welfare support. The role of the advisor varies, but in all cases the advisor provides a second line of support.

The PhD programme is research-based with substantial research and study, both independently and in close coordination with the supervisor. All PhD students are expected to regularly meet with the supervisor and take part in training as part of researcher development. PhD students in the Information Security Group regularly attend relevant seminar series, workshops, and study groups. This involves discussing and presenting work to other students and staff. Where appropriate, students will be expected to attend or present work at seminars, workshops or research meetings off the campus based just outside London in scenic Egham, including at international research conferences.

How long does the PhD take to complete?

Full-time Study: Three- to four-year course equivalent in commitment to a full-time job. This is the most common mode of pursuing a PhD. Full-time students in their first three years of study are guaranteed desk space and computer facilities in the department and are expected to contribute fully to the departmental research community.

Part-time Study: Four- to seven-year course for committed students who wish to study their PhD alongside a full-time job, caring responsibilities, or similar commitments. Part-time study is the default mode for students working for more than fifteen hours per week or with caring responsibilities which preclude full-time study. Part-time students are expected to attend Royal Holloway’s campus at some points and to have regular meetings with their supervisor (either in person or online).

How are PhD degrees examined?

Once the research has been successfully completed the student must write and submit a final report in the form of a PhD research thesis. This will be evaluated by at least two experts (one internal to Royal Holloway, and one external) and the student will be invited to attend an oral examination where they must defend their thesis.

Entry Requirements

The minimum entry requirement for an MPhil or an MPhil leading to a PhD degree is the equivalent of a UK Second Class Honours degree in an appropriate subject, although in many cases a Master's level qualification will also be expected. Candidates must also be demonstrably proficient in English to write and communicate about their research adequately and confidently.

Funding Requirements

It is extremely important to ensure that there are sufficient funds (both to cover fees and living costs) to complete a PhD programme. Click here for current fees for our PhD programme. It may be that some overseas students seek funding from organisations outside of the UK.

Obtaining funding can be extremely difficult and so potential candidates are advised to actively explore all available opportunities to secure funds. Click here to see current funding opportunities. Please note that any departmentally administered scholarships for admission to the PhD in Information Security will be advertised in the ‘Scholarships’ section.

Scholarships

As part of a consortium of six universities – the South East Doctoral Training Arc (SEDarc)- we are accepting applications for PhD scholarships that focus on the social science of cyber security . For information on deadlines for application to this scholarship opportunity, please click on the above link.

How do I apply?

To apply to our PhD programme, there are a series of steps which you must follow that are outlined below. Please be aware that if you are applying from overseas, certain countries may be subject to extra checks in addition to any visa applications, so please apply as soon as possible (and ideally 6 months before your start date).

Write down an initial research idea. At a minimum, this should include 1) a research title , 2) a short research abstract (of no more than 300 words) describing your research idea, and 3) a short proposed methodology. You are also welcome to propose more developed research projects (as expected in Step 3).

Take a look at the research profiles of staff members in the Information Security Group, click here to find their profiles. All PhD positions (whether self-funded or not) may be applied for only after consultation with a proposed supervisor. Before you start working on an application you will need to identify a supervisor by contacting a member of academic staff in the Information Security Group (with research interests similar to yours) to discuss your proposal. If you find a member of academic staff who is prepared to supervise you, then they will be able to answer any questions that you have and help you with your application. If you need help finding a member of staff to work with, you can contact the ISG’s PGR lead, Dr Andrew Dwyer .

If a supervisor supports your application, you should make a formal application ( click here for more information ). In your application, please name the proposed supervisor. As part of the application, you are expected to provide:

  • Research Proposal: No longer than 2500 words, including the title, abstract, research background (including relevant literature and research questions), a methods section stating how you will investigate the topic, and a timeline for the planned research to be completed within three years (or six years if part-time).
  • Personal Statement: No longer than 500 words, stating your reasons for applying to the PhD, how your skills and knowledge will help you succeed.

This is in addition to an up-to-date CV, degree transcripts, English language qualifications, and contact details for two references.

This application will be reviewed by both the proposed supervisor and the PGR Lead to ensure that you meet our minimum entry requirements. If you meet our minimum requirements, you will be invited to an interview. The interview panel will consist of the supervisor and at least one independent member of academic staff in the Information Security Group.

If you are successful, the PGR Lead will inform Royal Holloway of our decision and you will be contacted by central administration for any further information required. If you are unsuccessful, we can offer brief comments on the reason for not progressing your application.

info security seminar

Explore Royal Holloway

phd cyber security distance learning uk

Get help paying for your studies at Royal Holloway through a range of scholarships and bursaries.

phd cyber security distance learning uk

Clubs and societies

There are lots of exciting ways to get involved at Royal Holloway. Discover new interests and enjoy existing ones.

phd cyber security distance learning uk

Heading to university is exciting. Finding the right place to live will get you off to a good start.

phd cyber security distance learning uk

Whether you need support with your health or practical advice on budgeting or finding part-time work, we can help.

phd cyber security distance learning uk

Discover more about our 21 departments and schools.

phd cyber security distance learning uk

Research Excellence Framework

Find out why Royal Holloway is in the top 25% of UK universities for research rated ‘world-leading’ or ‘internationally excellent’.

phd cyber security distance learning uk

Challenge-led research themes

Royal Holloway is a research intensive university and our academics collaborate across disciplines to achieve excellence.

phd cyber security distance learning uk

Discover world-class research at Royal Holloway.

phd cyber security distance learning uk

Discover more about who we are today, and our vision for the future.

phd cyber security distance learning uk

Royal Holloway began as two pioneering colleges for the education of women in the 19th century, and their spirit lives on today.

phd cyber security distance learning uk

We’ve played a role in thousands of careers, some of them particularly remarkable.

phd cyber security distance learning uk

Find about our decision-making processes and the people who lead and manage Royal Holloway today.

COMMENTS

  1. Cybersecurity MPhil/PhD

    Who this course is for. This MPhil/PhD is for applicants with a strong interest or background in cybersecurity issues who would like to undertake multidisciplinary research to solve today’s societal problems and explore innovative solutions. It is suitable for both Master's graduates as well as early or mid-career professionals.

  2. Our PhD programmes

    The Information Security Group runs a popular full-time and part-time PhD research programme on a wide variety of information security-related topics. The ISG has supervised hundreds of PhD students in its history, many now holding influential positions within the cyber security industry. We are looking for enthusiastic, inquisitive, and ...