What I’ll Learn — Cybersecurity Architecture (CSA)
Prerequisites: Foundations (D10S) + Defensible Essentials (TADA Tactical)
What Cybersecurity Architecture does (and why it matters)?
Cybersecurity Architecture translates security principles into defensible enterprise systems. It provides practitioners a structured way to:
-
Align security controls with business/mission requirements;
-
design layered architectures across domains (network, cloud, data, IAM, apps);
-
define trust boundaries, interfaces, and containment strategies;
-
embed defensible patterns into enterprise and cloud reference architectures; and
-
Prove architectural resilience with DRM, telemetry, and measurable TMC analysis.
How Cybersecurity Architecture keeps enterprises secure:
-
Enterprise by Design: Align architectures with the Defensible 10 Standards (D10S). Build blueprints that map controls to domains, environments, and dependencies.
-
Cloud by Design: Apply segmentation, identity fabrics, encryption meshes, and containment overlays for multi-cloud and hybrid deployments.
-
System by Design: Document CDMs (views/interfaces/failure domains), apply CECs for defensible trade-offs, and enforce Component Integrity Engineering (CIE) in data and workload flows.
Fundamentals (CSA)
Your foundation in translating security controls into defensible enterprise architectures. You’ll learn to define boundaries, select patterns, and create reference architectures that can be governed and validated.
You’ll learn
-
CSA principles → D10S: Map domains to architecture layers (network, data, apps, cloud, IAM).
-
CDMs for Architecture: Enterprise/system views, interfaces, dependencies, containment.
-
Controls integration: Map CSA CCM & CIS controls into defensible architectures.
-
Defensible patterns: Segmentation, zero-trust overlays, identity fabrics, encryption meshes.
-
DRM overlays: Map threats and trace residual risks across architecture diagrams.
-
TADA inputs: Attack lifecycles and overlays embedded into architecture blueprints.
You’ll produce
-
CSA reference architecture pack (domain/system views).
-
Pattern integration log (mapped to D10S & controls).
-
DRM threats overlay with mitigations.
-
Trust boundary & containment diagrams (CDMs + CIE).
Advanced (CSA)
From drawing architectures to governing them. You’ll learn to build reusable pattern catalogs, govern design reviews across teams, and provide executive-level proof of defensibility.
You’ll learn
-
Architectural governance: Standards-based review gates, traceable approval logs.
-
Pattern catalogs: Build and justify reusable, defensible patterns for enterprise/cloud.
-
Zero-trust by design: Advanced overlays for hybrid/multi-cloud ecosystems.
-
Metrics & quantification: Use TMC to compare patterns and trade-offs.
-
Cyber Science integration: Validate resilience with telemetry, test labs, and adversary simulations.
-
Executive translation: Produce defensibility briefs that tie decisions to risk reduction, compliance, and resilience.
You’ll produce
-
Complete CSA kit (reference architectures, patterns, review artifacts).
-
Architecture DRM log (traceable threats & mitigations).
-
Metrics snapshot (reliability, containment, resilience trade-offs).
-
Governance-ready architecture report (for CPL or executive submission).
What I’ll Take — Cybersecurity Architecture (CSA)
Level 1: BASICS (required for all students)
First Course B101: Defensible 10 Standards (D10S) Foundations
Format: Self-paced with Instructor Support: 12–14 hours
Purpose: Establish a common engineering baseline across all ten ISAUnited domains and teach how a standard is structured and evidenced.
You’ll learn:
-
Why standards must be defensible (Problem → Proposed Solution for each domain)
-
How a standard is built: Requirements (Inputs), Technical Specifications (Outputs), Principles, Controls, V&V
-
The D-SSF snapshot for sub-standard authoring and peer review
Artifacts: 10-domain quick sheets; R/P/C/T matrix; mini V&V table
Second Course B102: TADA Method & Framework (Technical Adversarial & Defensible Analysis)
Format: Self-paced with Instructor Support | Duration: 12–14 hours
Purpose: Make adversary-aware design decisions and produce traceable evidence.
You’ll learn:
-
Classic attack models → architecture overlays; STRIDE; ATT&CK linkage
-
DRM logging (hazards, mitigations) and CDM/CEC design artifacts
-
How to turn a solution diagram into testable, defensible controls
Artifacts: TADA overlay pack; DRM log; testable acceptance criteria
Progression rule: B101 and B102 are prerequisites for all Core courses.
Level 2: CORE — Cybersecurity Architecture (CSA)
Third Course CSA-210: Enterprise Security Architecture — Core Fundamentals
Architecture practice, decision records, parent-standard orientation, D-SSF basics, controls mapping.
Last Course CSA-410: Advanced ESA & Assurance — Core Advanced
Cloud & Zero Trust reference architectures, sub-standard authoring at depth (D-SSF), assurance cases, and executive risk communication.
CSA Capstone: Architecture Decision Package
Deliver: HLA diagrams, options analysis, D-SSF mini standard, assurance case, V&V plan.
What Do I Get — Cybersecurity Architecture (CSA)
Choose one of two outcome paths at registration:
Path A — Knowledge & CPEs
-
Who it is for: Practitioners seeking structured learning and verified continuing education.
-
You earn: CPE certificate for each completed course and a transcript of completed modules.
-
Requirements to complete: Attend and pass course assessments; submit required artifacts to the baseline standard.
-
No CPL deliverables required.
Path B — Knowledge & CPEs + CPL Preparation
-
Who it is for: Candidates targeting ISAUnited Certified Professional License tracks (CSbDP, CPCE, CPCA).
-
You earn: Everything in Path A plus a CPL Readiness Kit aligned to ISAUnited’s evaluation-based licensing (no multiple-choice exams, no interviews).
-
Additional deliverables include the D-SSF mini-standard, the DRM Threat Log, the TADA overlay, the V&V plan, and program-specific evidence (e.g., architecture decision records or control mapping).
-
Readiness review: Coach-reviewed checklist and feedback aligned to CPL submission expectations; portfolio-based evaluation.
CPE credit: Equal to instructional contact hours per course; certificates are issued upon successful completion.