
Cybersecurity Architecture - Professional Program
Cybersecurity Architecture — Pro Bundle
$1,149 USD
Payment options available
A complete path to cybersecurity architecture practice and proof. Includes full course access and the CPL portfolio capstone review. No multiple-choice exams. Your evaluation is based on your architecture artifacts, evidence, and outcomes.
Includes:
-
Course access
-
Course eBooks
-
CPL capstone review (1 attempt)
-
Plus, 1 year FREE ISAU membership
Learn to design defensible enterprise and cloud architectures that hold up under real-world threats. Model trust boundaries, apply proven patterns, map to the Defensible 10, and produce evidence you can defend.
What I’ll Learn — Cybersecurity Architecture
What Cybersecurity Architecture does (and why it matters)?
Cybersecurity Architecture translates security principles into defensible enterprise systems. It provides practitioners a structured way to:
-
Align security controls with business/mission requirements;
-
design layered architectures across domains (network, cloud, data, IAM, apps);
-
define trust boundaries, interfaces, and containment strategies;
-
embed defensible patterns into enterprise and cloud reference architectures; and
-
Prove architectural resilience with DRM, telemetry, and measurable TMC analysis.
How Cybersecurity Architecture keeps enterprises secure:
-
Enterprise by Design: Align architectures with the Defensible 10 Standards (D10S). Build blueprints that map controls to domains, environments, and dependencies.
-
Cloud by Design: Apply segmentation, identity fabrics, encryption meshes, and containment overlays for multi-cloud and hybrid deployments.
-
System by Design: Document CDMs (views/interfaces/failure domains), apply CECs for defensible trade-offs, and enforce Component Integrity Engineering (CIE) in data and workload flows.
Architecture Fundamentals
Your foundation in translating security controls into defensible enterprise architectures. You’ll learn to define boundaries, select patterns, and create reference architectures that can be governed and validated.
You’ll learn
-
CSA principles → D10S: Map domains to architecture layers (network, data, apps, cloud, IAM).
-
CDMs for Architecture: Enterprise/system views, interfaces, dependencies, containment.
-
Controls integration: Map CSA CCM & CIS controls into defensible architectures.
-
Defensible patterns: Segmentation, zero-trust overlays, identity fabrics, encryption meshes.
-
DRM overlays: Map threats and trace residual risks across architecture diagrams.
-
TADA inputs: Attack lifecycles and overlays embedded into architecture blueprints.
You’ll produce
-
CSA reference architecture pack (domain/system views).
-
Pattern integration log (mapped to D10S & controls).
-
DRM threats overlay with mitigations.
-
Trust boundary & containment diagrams (CDMs + CIE).
Architecture Advanced
From drawing architectures to governing them. You’ll learn to build reusable pattern catalogs, govern design reviews across teams, and provide executive-level proof of defensibility.
You’ll learn
-
Architectural governance: Standards-based review gates, traceable approval logs.
-
Pattern catalogs: Build and justify reusable, defensible patterns for enterprise/cloud.
-
Zero-trust by design: Advanced overlays for hybrid/multi-cloud ecosystems.
-
Metrics & quantification: Use TMC to compare patterns and trade-offs.
-
Cyber Science integration: Validate resilience with telemetry, test labs, and adversary simulations.
-
Executive translation: Produce defensibility briefs that tie decisions to risk reduction, compliance, and resilience.
You’ll produce
-
Complete CSA kit (reference architectures, patterns, review artifacts).
-
Architecture DRM log (traceable threats & mitigations).
-
Metrics snapshot (reliability, containment, resilience trade-offs).
-
Governance-ready architecture report (for CPL or executive submission).
Prerequisites: Foundations (D10S) + Defensible Essentials
What I’ll Take — Cybersecurity Architecture
BASIC Courses (Prerequisites for all students)
Course 1: B100 - Defensible 10 Standards (D10S) Foundations
Format: Self-paced with Instructor Support: 12–14 hours
Purpose: Establish a common engineering baseline across all ten ISAUnited domains and teach how a standard is structured and evidenced.
You’ll learn:
-
Why standards must be defensible (Problem → Proposed Solution for each domain)
-
How a standard is built: Requirements (Inputs), Technical Specifications (Outputs), Principles, Controls, V&V
-
The D-SSF snapshot for sub-standard authoring and peer review
Artifacts: 10-domain quick sheets; R/P/C/T matrix; mini V&V table
Course 2: B110 - Defensible Essentials
Format: Self-paced with Instructor Support | Duration: 12–14 hours
Purpose: Make adversary-aware design decisions and produce traceable evidence.
You’ll learn: The Technical Adversarial & Defensible Analysis method.
-
Classic attack models → architecture overlays; STRIDE; ATT&CK linkage
-
DRM logging (hazards, mitigations) and CDM/CEC design artifacts
-
How to turn a solution diagram into testable, defensible controls
Artifacts: TADA overlay pack; DRM log; testable acceptance criteria
CORE Courses — Cybersecurity Architecture
Course 3: ARC500-Architecture Defensible Design Fundamentals
Architecture practice, decision records, parent-standard orientation, D-SSF basics, controls mapping.
Course 4: ARC550-Architecture Defensible Design Advanced
Cloud & Zero Trust reference architectures, sub-standard authoring at depth (D-SSF), assurance cases, and executive risk communication.
Cybersecurity Architecture Capstone: Architecture Decision Package
Deliver: HLA diagrams, options analysis, D-SSF mini standard, assurance case, V&V plan.
What Do I Get — Cybersecurity Architecture
CPEs + CPL Preparation
-
Who it is for: Candidates targeting ISAUnited Certified Professional License tracks (CSbDP, CPCE, CPCA).
-
You earn: Everything in the CPL Readiness Kit is aligned to ISAUnited’s evaluation-based licensing (no multiple-choice exams, no interviews).
-
Additional deliverables include the D-SSF mini-standard, the DRM Threat Log, the TADA overlay, the V&V plan, and program-specific evidence (e.g., architecture decision records or control mapping).
-
Readiness review: Coach-reviewed checklist and feedback aligned to CPL submission expectations; portfolio-based evaluation.
CPE credit: Equal to instructional contact hours per course; certificates are issued upon successful completion.


