top of page
Image by Alvaro Reyes

Security by Design (SbD) - Professional Program

Learn the DARES™ method from the Mastering Security by Design book, practice through a practical (non-heavy) course, then validate with the SbD CPL via a capstone.

Security by Design — Pro Bundle

$1,149 USD
Payment options available

 

A complete path to practice and proof. Includes the SbD Course (Fundamentals & Advanced), the Mastering Security by Design ebook (course material), and SbD CPL evaluation via a capstone portfolio (assigned project).

Includes:

  • Course access

  • Course eBooks

  • CPL capstone review (1 attempt)

  • Plus, 1 year FREE ISAU membership

What will I Learn?

Security by Design Program

Description

ISAUnited’s Security by Design Program is the flagship training path of the School of Engineering Cyber Defense, built for professionals who want to stop reacting to security problems and start engineering secure systems from the first design decision. This program develops The Implementer—the Security by Design professional who can turn intent into execution, guide teams through defensible design choices, and keep risk visible from concept to operations.

Students learn a disciplined, repeatable method for translating business goals into measurable security requirements, applying threat and design analysis to real architectures, and placing controls where they belong using clear models, trust boundaries, interfaces, dependencies, and failure domains. You will also strengthen how you communicate decisions across engineering teams, document trade-offs with purpose, and produce evidence that stands up to review—so security becomes a built-in design constraint that reduces rework, accelerates delivery, and raises system resilience.

The program is delivered in two progressive parts—Fundamentals and Advanced—so you can start applying Security by Design immediately, then scale your capability into tooling, verification and validation, organizational adoption, and leadership. If you are a security practitioner, engineer, architect, or aspiring technical leader who wants practical methods that work in real projects, this program provides the structure and engineering mindset to build security in, not bolt it on.

Field of study: Cybersecurity — Security by Design

 

Program level: Certified Professional

 

Pathway: Certified Security by Design Professional (CSbDP) License

 

Delivery format: 100% online (self-paced) with technical instructor support

 

Pace: ≤30 days (typical 3–4 weeks)

 

Prerequisites (included): Cybersecurity Essentials are required for this program, see below. 

 

Credits: 40 CPEs

 

Exam: Capstone Portfolio

 

Next start date: February 2026

Mastering Security by Design-Mockup cover-v2.png

Mastering Security by Design (ebook included)

The official course text and Source of Truth for SbD. It maps directly to the DARES™ lifecycle and D10S, and is used in knowledge checks and the CPL Capstone Portfolio.

Edition:      First Edition 2025

ISBN:           979-8-218-65004-9

  • Practical cybersecurity models

  • Helps you turn goals into measurable acceptance criteria

  • Guides “shippable by default” with simple CI/CD gate policies

What will I take?

BASIC Courses

CORE Courses

SBD450

Course: Security by Design Advanced
 

Field: Security by Design

An advanced course in security by design, organized into four modules that deepen review level practice: design models and boundaries, decision quality and trade-offs, delivery guardrails, and validation with executive proof. Covers how to draw system views that reveal boundaries, interfaces, and failure points; place protections deliberately; keep a clear decision record; set a definition of done with simple build and release checks; and present evidence that shows risk has been reduced.

SBD455

Course: DARES Method (Define-Architect-Realize-Evaluate-Sustain)

Field: Security by Design

An applied method course organized around five phases: Define, Architect, Realize, Evaluate, and Sustain. Covers how to set measurable acceptance criteria, make design choices and record trade-offs, add delivery guardrails and simple evidence, run validation and note residual risk, and establish an operating rhythm with clear owners and practical metrics.

What is the Exam?

Certified Professional License (CPL) - Capstone Portfolio

Description

A focused, real-world scenario that lets you prove mastery through a concise, defensible submission. The Capstone Portfolio is a solo, written, remote, and time-boxed to two weeks (10 business days) from assignment. Earlier submission is acceptable. There are no multiple-choice tests and no interviews.

 

What you will complete

  • Executive Summary (≤ 1 page): The problem, your approach, and the outcomes you expect.

  • Risk and Threat Snapshot: Technical Adversarial & Defensible Analysis.

  • Design and Control Strategy: Your patterns and controls are mapped to D10S and recognized control families.

  • Key Artifacts: One to two diagrams, a short validation plan, and a residual risk statement.

  • Defensibility Artifact: Assumptions, trade-offs, and rationale.

  • Presentation Deck: a concise 10 to 12-slide PPT with speaker notes that walks through the deliverables; export a PDF copy.

 

How it is evaluated
Your submission is scored on clarity of reasoning, alignment with standards, control traceability, validation rigor, and real-world feasibility. Written deliverables only.

 

Outcome
Successful completion satisfies the Capstone requirement for the ISAUnited Certified Professional License in your selected track.

What Do I Get?

CPL_SbD_Sample_20252.jpg

Your Professional License - Security by Design (CSbDP)

This is the license you earn when you pass the SbD CPL evaluation (included in the Pro Bundle). The evaluation is capstone-based—no multiple-choice exams. A successful review adds your name to the ISAUnited public registry.

  • Designation: Certified Security by Design Professional (CSbDP)

  • Credentialing: Digital certificate + verifiable License ID/issue date

Are you Ready?

Do you have questions about which program to choose or how the CPL works? Book a quick consult and we’ll help you or send us a message below.

Scrabble Letters

Acronym Library

Decode Our Alphabet Soup!

bottom of page