Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

We have 72 Cyber Security PhD Projects, Programmes & Scholarships for Self-funded Students in the UK



Computer Science



United Kingdom



All Institutions

PhD Type

PhD Type

All PhD Types



I am a self funded student

Cyber Security PhD Projects, Programmes & Scholarships for Self-funded Students in the UK

We have 72 Cyber Security PhD Projects, Programmes & Scholarships for Self-funded Students in the UK

A PhD in Cyber Security research is aimed at tackling the vulnerabilities in the information system of a country to help mitigate the chance of a cyber attack.

What's it like to do a PhD in Cyber Security?

Cyber Security is a fast-growing field of study in both the public and private sectors. A PhD in Cyber Security will help governments and organisations develop strategies to improve their cyber- resilience against cyber attacks.

Some popular areas of research in Cyber Security include:

Digital forensics

Cyber attacks are becoming increasingly sophisticated and to help mitigate the damage, you'll be researching into the methods to recover digital assets.


As the world makes more and more use of data, the need for secure data transmission has become inevitable. You'll likely be looking into the methods of encryption and decryption of data to help ensure it's safe during transmission.

Cyber attacks

Cyber Security is also a field of study that looks into the methods to protect people and organisations from cyber attacks. You may look into methods to detect, investigate and mitigate cyber attacks.

For a PhD in Cyber Security, you may write a thesis that's self-contained and also contributes to wider academic fields. You may also be required to submit an oral defence of your thesis.

Like most other STEM subjects, a PhD in Cyber Security is usually advertised with a research aim already attached.

Entry requirements for a PhD in Cyber Security

A PhD in Cyber Security will require you to hold a Masters with at least an Upper Second-class honours degree in a related subject.

Some programmes may accept a Lower-Second class honours degree with a certain amount of extra modules or work experience.

You may also be asked to prove that you've the necessary language skills to complete your PhD, certain programmes may require you to demonstrate that you have certain level of language proficiency before you can be accepted.

PhD in Cyber Security funding options

In the UK, a PhD in Cyber Security is funded by the Engineering and Physical Sciences Research Council (EPSRC) which provides a fully-funded studentship along with a monthly stipend.

If you are applying for a PhD that is advertised with funding attached, you'll automatically be considered for funding if you're successful in your application. However, if you are proposing your own project, you'll have to first be accepted onto a PhD programme and then apply for funding if you wish to receive it.

PhD in Cyber Security careers

Cyber Security careers are as diverse as the field of study itself. You may end up working in Information Security for a large company, work for the government as a digital forensics expert or be an integral part of a hackers' team.

read more

School of Computer Science PhD Studentships

The School of Computer Science at the University of St Andrews is offering a number of PhD studentships for 3.5 years of study in our doctoral programme. Read more

Department of Psychology

This programme presents the opportunity to join our international and interdisciplinary research community working within the fields of infancy and early development, language and cognition, perception and action or social processes. Read more
Last chance to apply

Privacy-preserving Systems around Security, Trust and Identity

Blockpass and the School of Computing at Edinburgh Napier University have set up an advanced Blockchain Identity Lab (BIL), which aims to support world-leading research related to cryptography, blockchain, distributed ledger technologies, privacy-preserving machine learning, and their linkage to sovereign identities such as decentralised identities and verifiable credentials. Read more
Last chance to apply

Towards an Evolving Approach to Evaluate Security Monitoring Tools

With continuing growth in the size of computer networks and applications, the potential damage that can be caused is increasing. Intrusion detection is a common cyber security mechanism used to detect malicious activities in host and/or network environments. Read more
Last chance to apply

Physical layer security for connected autonomous vehicles

Secure data exchange between communicating vehicles is one of the greatest technical challenges pending to be addressed prior to mass production of fully autonomous vehicles. Read more
Last chance to apply

Multi-modal machine learning for cybersecurity

With the time, the intruders are becoming more intelligent with higher ability of attacking networks without being identified. Multi-modal machine learning-based intelligent intrusion detection systems must be designed to identify stealthy and adversarial cyber attacks. Read more

PhD studentship in Machine Learning Theory & Economics

One fully funded, full-time PhD position to work with Dr Fengxiang He at the Artificial Intelligence and its Applications Institute (AIAI), School of Informatics, University of Edinburgh on a project titled “Machine Learning Theory & Economics”. Read more

Zero-Trust Security in 6G Networks

6G, as the successor to 5G, is expected to offer even more capabilities and services. This will undoubtedly present new security challenges and necessitate enhanced security measures. Read more
Last chance to apply

Identification of Security Flaws in Software Defined Networks

Software Defined Networks (SDNs) are evolving rapidly. As such, the challenge exists of keeping up with this evolution at a security level, with threats continually identified at all of the Management, Control and Data Planes. Read more
Last chance to apply

Innovating IoT Security Through Quantum Metamaterials and Artificial Intelligence

The literature indicates significant advancements in securing IoT networks, especially against quantum computing threats. Bagchi 2023 proposes a post-quantum lattice-based secure framework called LAS-AIBIoT for ambient intelligence-assisted blockchain-based IoT applications. Read more

Filtering Results