top of page

The School of Engineering Cyber Defense

All training programs and courses

Courses

SBD450

Course: Security by Design Advanced
 

Field: Security by Design

An advanced course in security by design, organized into four modules that deepen review level practice: design models and boundaries, decision quality and trade-offs, delivery guardrails, and validation with executive proof. Covers how to draw system views that reveal boundaries, interfaces, and failure points; place protections deliberately; keep a clear decision record; set a definition of done with simple build and release checks; and present evidence that shows risk has been reduced.

SBD455

Course: DARES Method (Define-Architect-Realize-Evaluate-Sustain)

Field: Security by Design

An applied method course organized around five phases: Define, Architect, Realize, Evaluate, and Sustain. Covers how to set measurable acceptance criteria, make design choices and record trade-offs, add delivery guardrails and simple evidence, run validation and note residual risk, and establish an operating rhythm with clear owners and practical metrics.

Why Knights?

A Knight is bound by oath, trained for discipline, and trusted to protect. That’s our ethos: shield-first design, evidence you can prove, and integrity in every decision.

 

Knight virtues → your practice

  • Honor → Hold the Standard: Commit to D10S and a code of conduct in every design.

  • Intelligence → Think Like an Engineer: Model with CDMs, decide with CECs (use CIE when component trust matters).

  • Credibility → Show Your Work: Keep traceable DRM logs, CDM/CEC declarations, Cyber Science metrics, and TMC calculations.

  • Faith to the Cause → Protect the Mission: Defend people, data, and business outcomes with clarity and restraint.

 

The Knight’s toolkit

Shield: Architecture-first defense mapped to D10S ·

Visor: Telemetry & review checklists ·

Oath: Professional standards & ethics ·

Formation: Teams that move as one—design, build, verify.

KNIGHTS-POSE2.png
bottom of page