Essential Cybersecurity Architecture & Design Applied™: Sparx EA edition

COURSE ID: WS-CYB-CA-EA
DESCRIPTION: This introductory Cybersecurity Architecture & Design workshop provides students with a solid foundation for applying Cybersecurity Architecture and Cybersecurity Framework techniques to precisely specify enterprise and network architectures that are scalable and cybersecure. The intensive training includes frequent Q&A and hands-on practice sessions and teaches students how to solve practical cybersecurity problems using CyberML™(Cyber Modeling Language™), a UML2/SysML compatible architectural modeling language that supports Agile development methods and cybersecurity applications. See the Course Syllabus below for a complete list of topics covered.

This workshop edition is customized to integrate basic modeling tool training with Sparx Enterprise Architect, an award-winning modeling tool.

VENUE: Available Onsite or Online.
DURATION: 3-5 days (= 21-35 training hours; length depends upon optional learning modules selected)
AUDIENCE: Cybersecurity professionals, software architects/engineers/developers, systems engineers, business analysts, network architects, system architects, project managers, and others who want to learn how the Cybersecurity Architecture & Frameworks can improve how to make distributed systems more scalable and secure will benefit from this workshop.
PREREQUISITES: An inquisitive mind and desire to learn about the subject matter. No previous experience or prior training is required.
LEARNING OBJECTIVES
• What is Cybersecurity Architecture and how does it facilitate scalability and cybersecurity?
• What is cybersecurity and how is it related to network security and computer security?
• What are the emerging standards for cybersecurity frameworks (NIST, ISO/IEC, DoD RMF)?
• What is CyberML and how does it enable the specification of scaleable and secure distributed systems?
• How to specify large, complex network architectures with cybersecurity features
• What are the most dangerous cyber threats and how can they be thwarted by appropriate cyber defenses?
• How to model and simulate cyber attacks and cyber defenses
• How to trace cyber requirements and perform Verification & Validation (V&V) on cybersecurity architecture models
• Practical guidelines for specifying correct, complete, clear, concise, and consistent cybersecurity architecture models
• How to draw CyberML diagrams, simulate/execute CyberML diagrams, and generate reports using a selected CyberML-compliant tool: Sparx Enterprise Architect
• What are the emerging standards for cybersecurity frameworks (NIST, ISO/IEC, DoD RMF)?
• How to define a physical cybersecurity architecture framework
• How to customize a physical cybersecurity architecture framework
• How to select cybersecurity architecture modeling tools and methods
• How to plan your transition to a cybersecurity architecture & framework approach
• How to learn more about cybersecurity architecture & frameworks
COURSE AUTHOR & CHIEF INSTRUCTOR: Cris Kobryn is the Founder of PivotPoint Technology and is an internationally recognized expert in Model-Based Engineering technologies. Cris has been designing and architecting secure distributed software systems for three decades, and recently has designed the CyberML™ (Cyber Modeling Language™) to precisely specify Agile enterprise architectures that are scalable and cybersecure. He is knowledgeable about a wide range of commercial and defense security protocols, and has formerly held a Top Secret with Special Background Investigation (TS-SBI) security clearance. You can learn more about Cris's qualifications as a Cybersecurity Modeling & Simulation expert on his corporate bio page...

COURSE SYLLABUS † ‡: All Essential Cybersecurity Architecture & Frameworks: Enterprise Architect edition training workshops must include the CYBER ARCHITECTURE: BASIC, CYBER ARCHITECTURE: NETWORK ARCHITECTURE, CYBER ARCHITECTURE: FRAMEWORKS, and CYBER ARCHITECTURE: BASIC MODELING TOOL - SPARX EA learning modules. Students can choose additional learning modules as needed, and modules can be tailored to address special team or project needs. In particular, CYBER ARCHITECTURE: PROJECT PRACTICUM modules are intended to be tailored to specific team or project needs.
CYBER ARCHITECTURE: BASIC [Module# CYB100]
Intro to Cybersecurity Architecture & Design
CyberML Quick Tour
Topics
- Network Topologies
- Network Communication Protocols
- Cybersecurity Attacks & Defenses
- Cybersecurity Standards & Frameworks
Network Architecture Diagram Techniques

CYBER ARCHITECTURE: NETWORK ARCHITECTURE [Module# CYB101]
Intro to Network Architecture
Topics
- Network Communication Protocols
- Network Topologies
- Network Nodes
- Cybersecurity Devices
- Network Architecture Patterns & Anti-Patterns
Modeling & Simulation Tools: Open Source & Commercial

CYBER ARCHITECTURE: ATTACKS & DEFENSES [Module# CYB102]
Intro to Cyber Attacks & Defenses
Topics

- Cyber Attack Classifications & Taxonomies
- Cyber Attack Risk Assessment
- Cyber Defense Classifications and Taxonomies
- Allocating Cyber Countermeasures to Cyber Attacks
- Modeling & Simulation Tools: Open Source & Commercial
CYBER ARCHITECTURE: FRAMEWORKS [Module# CYB103]
Intro to Cybersecurity Frameworks
Cybersecurity Framework Standards
- NIST Cybersecurity Framework v. 1.0
- NIST Special Publication 800-37
- DoD Risk Management Framework (RMF): DoD Instruction 8510.01
- ISO/IEC 27000
Physical Cybersecurity Architecture Frameworks
- How to define a physical Cybersecurity Architecture Framework
- How to customize a physical Cybersecurity Architecture Framework

CYBER ARCHITECTURE: BASIC MODELING TOOL – SPARX ENTERPRISE ARCHITECT [Module# CYB110-EA]
Topics
• Projects and diagrams
• Generating documentation
• Importing/exporting models
• Cyber Requirements verification & validation (traceability)
• Model validation and metrics
• Model simulation/execution
• Team modeling
Diagram Techniques
• CyberML extended subset of UML 2 diagrams

OPTIONAL LEARNING MODULES: May be added if appropriate prerequisites are met.
CYBER ARCHITECTURE: PROJECT PRACTICUM [Module# CYB120]
The project practicum provides an opportunity to apply Cybersecurity Architecture & Framework principles and best practices to solve project cybersecurity modeling problems in a creative and supervised workshop environment. The practicum can be used to facilitate:
• Cybersecurity Architecture Model peer reviews, revisions and extreme makeovers
• Cybersecurity Framework peer reviews, revisions and extreme makeovers
Students can identify project modeling problems in advance, or Instructor will work with students to identify them.
† Cyber Architecture Modeling Language Choices: The default visual architecture modeling language choice for this learning module is CyberML™ (Cyber Modeling Language™). CyberML is a visual architecture modeling language for specifying distributed software-intensive systems that are scalable and secure. CyberML is essentially a framework of UML 2 compatible model libraries that are based on a AgileML™ (Agile Modeling Language™) kernel. More specifically, CyberML consists of three layered stacks: Cybersecurity model libraries; AgileML model libraries; and an AgileML kernel, which is defined as a small, pragmatic subset of UML 2 diagrams and constructs that is suitable for Agile and Lean development methods. CyberML's scalability is derived from AgileML's emphasis on recursive design techniques that can specify systems of arbitrary complexity (e.g., subsystems, systems, systems-of-systems). Its security capabilities are derived from its Cybersecurity model libraries, which support the precise specification of cyber assets and cybersecurity features, such as TCP/IP protocols, routers/switches, firewalls, encryption/decryption devices, Intrusion Detection/Protection Systems (IDS/IPS), and Unified Threat Management (UTM) devices. Other visual architecture modeling language choices include standard UML 2 and OMG SysML.
‡ Cyber Architecture Modeling Tool Choices: The Cyber Architecture modeling tool choices for this learning module include the following popular visual modeling tools: Enterprise Architect™, MagicDraw™, UModel™, Visual Paradigm™, and Astah™. Other visual modeling tools that meet our training standards may be available upon request.

Why Train with Us? : PivotPoint Training Advantages

  • Flexible & Customizable Learning ModulesAll workshops are based on flexible learning modules that can be mixed-and-matched and tailored to meet your team and project needs.
  • Choice of Onsite or Online (Virtual) Training DeliveryAll training workshops can be delivered onsite or online based on your training needs and preferences.
  • Learn from Bona Fide Expert InstructorsAll workshops are authored and taught by Model-Based Engineering experts with 10+ years practical application experience who are passionate about the technical subjects they teach.
  • Frequent Q&A + Hands-On Practice Sessions with Client-Selected Project ProblemsAll workshops emphasize frequent Q&A and hands-on practice sessions using Client-selected problems from actual work projects!
  • Best Value for Your Training BudgetWe strive to provide the best value for your training budget by providing the highest quality training experience at competitive prices. Check out our distinguished international Client list and Testimonials about the effectiveness of our training. We offer volume discounts for multiple workshops ordered at the same time, and special discounts for Small Groups (6 or fewer students), Non-Profits, Educational Institutions, Research Organizations, and Government Direct organizations, (Departments, Agencies, FFRDCs), etc.
  • Optional Follow-Up Consulting & CoachingAll workshops can be followed up with both Onsite and Online (Virtual via webconference) Consulting and Technical Coaching services that will keep your Model-Based Engineering project on track.
  • Further Info re Customization & Price Quotes
    Please call or email us to discuss your team and project training needs, and to receive a Firm-Fixed-Price (FFP) quote that includes all training materials and all travel expenses for your Instructor.
  • Show More

Please call or email us to discuss your team and project training needs, and to receive a Firm-Fixed-Price (FFP) quote that includes all training materials and all travel expenses for your Instructor.

PIVOTPOINT TECHNOLOGY, CUSTOM MODEL-BASED SOLUTIONS, ESSENTIAL UML APPLIED, ESSENTIAL SYSML APPLIED, ESSENTIAL BPMN APPLIED, ESSENTIAL DODAF APPLIED, ESSENTIAL TOGAF APPLIED, ESSENTIAL ARCHIMATE APPLIED, ESSENTIAL AGILE MODELING APPLIED, AGILE + LEAN ARCHITECTURE & DESIGN, AGILEML, AGILE MODELING LANGUAGE, CYBERML, and CYBER MODELING LANGUAGE are trademarks of PivotPoint Technology Corp.
UML, BPMN, OMG SYSML and UPDM are trademarks of the Object Management Group.
ENTERPRISE ARCHITECT is a trademark of Sparx Systems Pty Ltd. MAGICDRAW is a trademark of No Magic, Inc. UMODEL is a trademark of Altova. VISUAL PARADIGM is a trademark of Visual Paradigm International. ASTAH and ASTAH SYSML are trademarks of Change Vision, Inc.
All other trademarks are the property of their respective owners.