The School of Engineering Cyber Defense
All training programs and courses
Programs

Security by Design
Professional Program
The Implementer - Turn secure‑by‑design into daily practice. This program teaches you to embed defensible patterns, acceptance criteria, and traceable mitigations into real work—from architecture reviews and backlog grooming to CI/CD gates—so teams ship systems that are measurably safer.

Cybersecurity Engineering
Professional Program
The Builder - Build, integrate, configure, and validate the protections that keep digital systems safe. You will implement identity, network, cloud, data, and monitoring controls across components and platforms, make sound engineering trade-offs to strengthen trust and contain failures, and use operational signals and repeatable tests to prove resilience and recovery.

Cybersecurity Architecture
Professional Program
The Designer - Learn to design systems that withstand rigorous scrutiny. You will model complex environments with clear system views, trust boundaries, interfaces, and failure domains. You will turn security and risk goals into measurable requirements, map protections to defensible standards, and lead design reviews that produce traceable decisions and evidence, not just diagrams.
Courses
B100
Course: Defensible 10 Standards Foundations
Field: Cybersecurity Essentials
This course introduces students to the Defensible 10 Standards and explains how the ten domains organize security responsibilities across enterprise and cloud environments. Students learn the purpose of each domain, the relationships among controls, requirements, and measurable acceptance criteria, and how to interpret a system diagram through the D10S lens.
B102
Course: Cybersecurity Core Principles
Field: Cybersecurity Essentials
A practical introduction to the ideas that anchor secure design, from confidentiality and integrity to least privilege, layered defenses, and verifiable operations. Learn how these principles shape choices in architecture, configuration, and daily practice across data centers and cloud services. Through real examples and guided critiques, connect each principle to measurable outcomes that reduce risk and produce resilient, trustworthy systems.
B104
Course: Cybersecurity Controls Management Framework
Field: Cybersecurity Essentials
This course teaches students how to build a clear, organized system for selecting, mapping, measuring, and maintaining security controls across enterprise and cloud environments. Students learn to translate policy goals into concrete requirements, plan evidence from the outset, and conduct ongoing checks that demonstrate that protections work in real-world operations.
B106
Course: The Defensible Loop Lifecycle and Method
Field: Cybersecurity Essentials
This course teaches a repeatable lifecycle for doing cybersecurity work with discipline and proof. Students learn the six methods of Define, Design, Deploy, Detect, Defend, and Demonstrate, and how to apply them to real systems to produce measurable outcomes and evidence that protections work.
B107
Course: Security by Design Foundations
Field: Cybersecurity Essentials
Security by Design Foundations teaches you to plan and review security like an engineer: set measurable goals, use simple design models to place controls, make sound trade-offs, add lightweight delivery guardrails, and produce evidence that your choices work. Built for both managers and technical teams.
B108
Course: Security Project Management
Field: Cybersecurity Essentials
This course introduces students to security project management as a disciplined practice for planning and delivering secure technology work. Students learn to define scope, roles, and milestones; manage risks and dependencies; coordinate technical and business stakeholders; and track security outcomes from requirements through validation.
B110
Course: Technical Adversarial & Defensible Analysis (Foundations)
Field: Cybersecurity Essentials
This entry-level course teaches how to review a solution architecture diagram from an attacker’s perspective and translate findings into a defensible security design. Students learn to map attack stages and entry points, threat-model components and data flows, align attacker behaviors with real techniques, and produce clear remediation recommendations.
B121
Course: D01 Network Security Architecture and Engineering
Field: Cybersecurity Essentials
D01 Defines how secure connectivity is designed and operated across on-premises and cloud environments. Focuses on boundaries, segmentation, access control, secure transport, and visibility that limit attack spread and support reliable operations. Emphasizes enforceable outcomes that can be tested, measured, and defended.
B122
Course Title: D02 Cloud Security Architecture and Resilience
Field: Cybersecurity Essentials
Build secure, resilient cloud environments by defining trust boundaries, access intent, and encryption defaults, then validating them with automated checks and evidence. Interpret architecture diagrams, map requirements to technical outputs, and prove controls work through monitoring, response, change, and recovery drills across networks and multiple clouds.
B123
Course Title: D03 Compute Platform and Workload Security Architecture
Field: Cybersecurity Essentials
Covers how to secure the environments where software runs, from hosts and virtual machines to containers and serverless services. Focuses on access boundaries, trusted images and updates, runtime monitoring, and evidence that controls are working across on-premises and cloud platforms.
B124
Course: D04 Application Security Architecture and Secure Development
Field: Cybersecurity Essentials
Defines how to design and build software that protects business logic and data in real systems. Covers trust boundaries, authorization decisions, safe input and serialization handling, session and token behavior, and defender useful logging. Emphasizes measurable tests and evidence that demonstrate controls work before release, and explains how to interpret system diagrams as well.
B125
Course: D05 Data Security Architecture
Field: Cybersecurity Essentials
Describe how to engineer data protection across on-premises and cloud systems. Cover classification and tagging, purpose-bound access, encryption by policy, loss prevention, investigation-ready logging, and recoverability. Connect requirements and controls to measurable acceptance criteria, and learn how to read system diagrams to spot exposure.
B126
Course: D06 Identity and Access Security Architecture
Field: Cybersecurity Essentials
Design identity and access foundations that withstand attacks and audits across cloud and on-premises systems. Define trust boundaries, strengthen authentication, control privileged access, govern service identities, and produce defensible evidence through logging, testing, and validation.
B127
Course: D07 Threat and Vulnerability Security Engineering
Field: Cybersecurity Essentials
Explores how threats and weaknesses emerge across on-premises and cloud systems, and how to reduce exposure through continuous discovery, risk-based prioritization, rapid remediation, and ongoing validation. Emphasizes measurable requirements, clear acceptance criteria, and evidence that fixes work so teams can keep pace with real adversaries.
B128
Course: D08 Monitoring Detection and Incident Response Architecture
Field: Cybersecurity Essentials
Learn how monitoring and response are engineered, collect and normalize security signals, detect suspicious behavior with explicit rules and analytics, and run repeatable response playbooks that protect evidence. You will measure detection and response speed, reduce noise, and keep visibility working across data centers, cloud services, and critical systems.
B129
Course: D09 Cryptography Encryption and Key Management
Field: Cybersecurity Essentials
This course explains how secure data protection depends on sound cryptographic design and disciplined key management. Learners explore how encryption safeguards information in storage and transit, how keys are generated, rotated, and retired, and how trust is maintained across systems through certificates and validation practices.
B130
Course: D10 DevSecOps and Secure SDLC Engineering
Field: Cybersecurity Essentials
A practical guide to secure software delivery that shows how ten security domains divide responsibilities across enterprise and cloud systems. Covers everyday how to translate design intent into build, test, release, and deploy controls with clear requirements and measurable acceptance targets, and how to read a system diagram through a secure delivery lens.
Why Knights?
A Knight is bound by oath, trained for discipline, and trusted to protect. That’s our ethos: shield-first design, evidence you can prove, and integrity in every decision.
Knight virtues → your practice
-
Honor → Hold the Standard: Commit to D10S and a code of conduct in every design.
-
Intelligence → Think Like an Engineer: Model with CDMs, decide with CECs (use CIE when component trust matters).
-
Credibility → Show Your Work: Keep traceable DRM logs, CDM/CEC declarations, Cyber Science metrics, and TMC calculations.
-
Faith to the Cause → Protect the Mission: Defend people, data, and business outcomes with clarity and restraint.
The Knight’s toolkit
Shield: Architecture-first defense mapped to D10S ·
Visor: Telemetry & review checklists ·
Oath: Professional standards & ethics ·
Formation: Teams that move as one—design, build, verify.

