The School of Engineering Cyber Defense
All training programs and courses
Courses
SBD450
Course: Security by Design Advanced
Field: Security by Design
An advanced course in security by design, organized into four modules that deepen review level practice: design models and boundaries, decision quality and trade-offs, delivery guardrails, and validation with executive proof. Covers how to draw system views that reveal boundaries, interfaces, and failure points; place protections deliberately; keep a clear decision record; set a definition of done with simple build and release checks; and present evidence that shows risk has been reduced.
SBD455
Course: DARES Method (Define-Architect-Realize-Evaluate-Sustain)
Field: Security by Design
An applied method course organized around five phases: Define, Architect, Realize, Evaluate, and Sustain. Covers how to set measurable acceptance criteria, make design choices and record trade-offs, add delivery guardrails and simple evidence, run validation and note residual risk, and establish an operating rhythm with clear owners and practical metrics.
Why Knights?
A Knight is bound by oath, trained for discipline, and trusted to protect. That’s our ethos: shield-first design, evidence you can prove, and integrity in every decision.
Knight virtues → your practice
-
Honor → Hold the Standard: Commit to D10S and a code of conduct in every design.
-
Intelligence → Think Like an Engineer: Model with CDMs, decide with CECs (use CIE when component trust matters).
-
Credibility → Show Your Work: Keep traceable DRM logs, CDM/CEC declarations, Cyber Science metrics, and TMC calculations.
-
Faith to the Cause → Protect the Mission: Defend people, data, and business outcomes with clarity and restraint.
The Knight’s toolkit
Shield: Architecture-first defense mapped to D10S ·
Visor: Telemetry & review checklists ·
Oath: Professional standards & ethics ·
Formation: Teams that move as one—design, build, verify.

