
Cybersecurity Engineering - Professional Program
Cybersecurity Engineering —
Pro Bundle
$1,149 USD
Payment options available
A complete path to cybersecurity engineering practice and proof. Includes full course access and the CPL portfolio capstone review. No multiple-choice exams. Your evaluation is based on your engineering artifacts, evidence, and outcomes.
Includes:
-
Course access
-
Course eBooks
-
CPL capstone review (1 attempt)
-
Plus, 1 year FREE ISAU membership
Build and integrate defensible systems across components, systems, and systems of systems. Learn cyber defense fundamentals, engineering grade architecture methods, and repeatable verification and validation using the Security Engineering Lifecycle and the CEC method.
What I’ll Learn — Cybersecurity Engineering
What Cybersecurity Engineering does (and why it matters)?
Cybersecurity Engineering applies the principles of engineering to digital systems. Instead of bolting on tools, it gives practitioners a framework to:
-
Turn abstract controls into technical specifications tied to requirements;
-
Analyze components, systems, and systems-of-systems for trust, interfaces, and failure domains;
-
Apply Component Integrity Engineering (CIE) to secure data flow and enforce containment.
-
Use engineering trade-off methods (CEC) to balance security, performance, and cost; and
-
Verify outcomes with Design Risk Management (DRM), adversary overlays (TADA), and repeatable tests.
How Cybersecurity Engineering keeps components, systems, and networks secure:
-
Components by Design: Engineer trust at the lowest unit — servers, workloads, APIs, data stores. Validate encryption, authentication, and containment with CIE to prevent propagation of compromise.
-
Systems by Design: Map interfaces, dependencies, and control points. Engineer resilience with segmentation, redundancy, fail-safe defaults, and defensible patterns that resist attack overlays.
-
Enterprise by Design: Build system-of-systems with clear assurance cases. Trace every risk decision to requirements, standards (D10S), and measurable outcomes, backed by logs, models, and metrics.
Engineering Fundamentals
Your foundation in thinking and working like a true cybersecurity engineer. Learn to apply engineering rigor to controls, components, and integrations — not just deploy tools.
You’ll learn
-
D10S controls → Specifications: Convert ISAUnited Defensible Standards into measurable inputs.
-
CEC trade-offs: Document engineering decisions with cost, performance, and risk impacts.
-
Component Integrity Engineering (CIE): Secure flow paths, containment, and trust anchors.
-
Systems thinking: From components to integrations to system-of-systems.
-
DRM for engineers: Hazard analysis, mitigation mapping, and residual risk tracking.
-
Verification & Validation: Simple test-as-evidence approaches using cyber science experiments.
You’ll produce
-
Engineering decision log (CEC + DRM entries)
-
Component security specification pack
-
System diagram annotated with trust boundaries & control points
-
Basic V&V test plan + results snapshot
Engineering Advanced
Move from practitioner to professional engineer. Govern systems, quantify design trade-offs, and generate evidence packages ready for submission to CPL or executive review.
You’ll learn
-
Defensible patterns: Engineer, justify, and govern reusable security patterns.
-
System assurance: Build traceable assurance cases with inputs/outputs tied to D10S.
-
Advanced V&V: Test-as-code, adversary overlays, telemetry validation, and DRM decision audits.
-
Quantification with TMC: Reliability math, performance thresholds, and containment probability.
-
Resilience engineering: Model rollback, fault tolerance, fail-secure defaults, and layered defenses.
-
Executive engineering briefs: Communicate technical assurance as measurable risk reduction.
You’ll produce
-
Full engineering decision/evidence pack
-
DRM & assurance case log with traceable mitigations
-
Advanced V&V test-as-code results + telemetry proof
-
Pattern library entries + CIE containment designs
-
Signed engineering design review record
Prerequisites: Foundations (D10S) + Defensible Essentials
What I’ll Take — Cybersecurity Engineering
Level 1: BASIC Courses (Prerequisites for all students)
Course 1: B100 - Defensible 10 Standards (D10S) Foundations
Format: Self-paced with Instructor Support: 12–14 hours
Purpose: Establish a common engineering baseline across all ten ISAUnited domains and teach how a standard is structured and evidenced.
You’ll learn:
-
Why standards must be defensible (Problem → Proposed Solution for each domain)
-
How a standard is built: Requirements (Inputs), Technical Specifications (Outputs), Principles, Controls, V&V
-
The D-SSF snapshot for sub-standard authoring and peer review
Artifacts: 10-domain quick sheets; R/P/C/T matrix; mini V&V table
Course 2: B110 - Defensible Essentials
Format: Self-paced with Instructor Support | Duration: 12–14 hours
Purpose: Make adversary-aware design decisions and produce traceable evidence.
You’ll learn:
-
Classic attack models → architecture overlays; STRIDE; ATT&CK linkage
-
DRM logging (hazards, mitigations) and CDM/CEC design artifacts
-
How to turn a solution diagram into testable, defensible controls
Artifacts: TADA overlay pack; DRM log; testable acceptance criteria
Level 2: CORE Courses — Cybersecurity Engineering
Course 3: ENG600-Engineering Defensible Builds Fundamentals
Component Integrity Engineering (CIE), network/platform hardening, identity & access enforcement, and telemetry contracts.
Course 4: ENG650-Engineering Defensible Builds Advanced
Threat & Vulnerability Engineering, data/crypto engineering, observability and automated response, reliability & resilience testing.
Cybersecurity Engineering Capstone: Secure System Build & Test
Deliver: Reference build, security controls, V&V pack, defect log, and fixes.
What Do I Get — Cybersecurity Engineering
CPEs + CPL Preparation
-
Who it is for: Candidates targeting ISAUnited Certified Professional License tracks (CSbDP, CPCE, CPCA).
-
You earn: Everything in the CPL Readiness Kit is aligned to ISAUnited’s evaluation-based licensing (no multiple-choice exams, no interviews).
-
Additional deliverables include the D-SSF mini-standard, DRM hazard log, TADA overlay, V&V plan, and program-specific evidence (e.g., architecture decision records or controls mapping).
-
Readiness review: Coach-reviewed checklist and feedback aligned to CPL submission expectations; portfolio-based evaluation.
CPE credit: Equal to instructional contact hours per course; certificates are issued upon successful completion.


