The School of Engineering Cyber Defense
All training programs and courses
Courses
SBD450
Course: Security by Design Advanced
Field: Security by Design
An advanced course in security by design, organized into four modules that deepen review level practice: design models and boundaries, decision quality and trade-offs, delivery guardrails, and validation with executive proof. Covers how to draw system views that reveal boundaries, interfaces, and failure points; place protections deliberately; keep a clear decision record; set a definition of done with simple build and release checks; and present evidence that shows risk has been reduced.
SBD455
Course: DARES Method (Define-Architect-Realize-Evaluate-Sustain)
Field: Security by Design
An applied method course organized around five phases: Define, Architect, Realize, Evaluate, and Sustain. Covers how to set measurable acceptance criteria, make design choices and record trade-offs, add delivery guardrails and simple evidence, run validation and note residual risk, and establish an operating rhythm with clear owners and practical metrics.
CLJ750
Course: Cyber Investigations and Digital Evidence Practice
Field: Cybersecurity Law and Digital Justice
A practitioner course on incident-to-investigation readiness. Covers case intake discipline, evidence preservation planning across modern environments, chain of custody methods, integrity documentation, and the creation of defensible reporting packages suitable for counsel and authorities.
CLJ751
Course: Cybercrime Law, Procedure Awareness, and Cross Border Case Strategy
Field: Cybersecurity Law and Digital Justice
A comparative and practice-focused course that teaches how cybercrime patterns and lawful process realities shape evidence strategy and coordination. Covers jurisdiction reasoning, cross-border constraints, provider realities, and the creation of case strategy memos that remain factual, defensible, and ethically bounded.
Why Knights?
A Knight is bound by oath, trained for discipline, and trusted to protect. That’s our ethos: shield-first design, evidence you can prove, and integrity in every decision.
Knight virtues → your practice
-
Honor → Hold the Standard: Commit to D10S and a code of conduct in every design.
-
Intelligence → Think Like an Engineer: Model with CDMs, decide with CECs (use CIE when component trust matters).
-
Credibility → Show Your Work: Keep traceable DRM logs, CDM/CEC declarations, Cyber Science metrics, and TMC calculations.
-
Faith to the Cause → Protect the Mission: Defend people, data, and business outcomes with clarity and restraint.
The Knight’s toolkit
Shield: Architecture-first defense mapped to D10S ·
Visor: Telemetry & review checklists ·
Oath: Professional standards & ethics ·
Formation: Teams that move as one—design, build, verify.

