Catalogue
/
Enterprise Architecture and Systems Engineering
/
System Security Engineering for Secure and Resilient Systems

System Security Engineering for Secure and Resilient Systems

A practical course for professionals who need to design, build, and sustain secure systems throughout the lifecycle. The agenda focuses on security engineering methods that connect architecture, risk, resilience, verification, and compliance rather than treating security as a late stage add on. The course combines system thinking with pragmatic patterns that support real engineering, governance, and operational needs.

What will you learn?

A practical course for professionals who need to design, build, and sustain secure systems throughout the lifecycle. The agenda focuses on security engineering methods that connect architecture, risk, resilience, verification, and compliance rather than treating security as a late stage add on. The course combines system thinking with pragmatic patterns that support real engineering, governance, and operational needs.

  • Apply system security engineering methods across the lifecycle
  • Use threat modeling and risk analysis to guide security decisions
  • Design secure and resilient architectures with clear trust boundaries and control strategies
  • Connect security requirements, verification, and compliance activities in a structured way

Requirements:

  • Basic familiarity with systems engineering or technical project work
  • General understanding of IT, software, network, or platform concepts
  • Interest in security, resilience, lifecycle governance, and architecture

Course Outline*:

*We customize the course outline and content to your specific needs and relevant use cases.

Module 1: Foundations of system security engineering

  • What system security engineering covers and how it differs from isolated product security work
  • Security as a lifecycle concern across concept, design, implementation, deployment, operation, and retirement
  • Core principles confidentiality, integrity, availability, resilience, and mission assurance
  • Security engineering roles, stakeholders, and decision points in complex programs

Module 2: Security requirements and lifecycle traceability

  • Deriving security requirements from mission needs, use cases, and stakeholder concerns
  • Relating security requirements to system functions, interfaces, and dependencies
  • Maintaining traceability from requirement to design, control, verification, and evidence
  • Avoiding vague or non testable security requirements

Module 3: Threat modeling and attack oriented thinking

  • Framing assets, actors, trust boundaries, and attack surfaces
  • Using structured threat modeling approaches to reveal likely failure paths
  • Connecting misuse cases and abuse scenarios to architecture decisions
  • Prioritizing threats based on exposure, consequence, and feasibility

Module 4: Risk management for secure systems

  • Distinguishing threats, vulnerabilities, consequences, and risk treatment options
  • Relating risk analysis to engineering tradeoffs, architecture scope, and cost
  • Choosing when to mitigate, transfer, accept, or redesign
  • Integrating security risk thinking into lifecycle reviews and governance

Module 5: Secure architecture and trust boundary design

  • Designing for least privilege, segmentation, isolation, and controlled interaction
  • Identifying architectural trust boundaries and security responsibilities
  • Reducing attack surface through interface discipline and service separation
  • Linking architecture decisions to operational resilience and recovery needs

Module 6: Zero Trust and modern security patterns

  • Zero Trust principles and what they mean in system design
  • Identity, policy enforcement, and continuous verification as architectural elements
  • Applying Zero Trust thinking across users, services, devices, and data flows
  • Practical tradeoffs between usability, performance, complexity, and assurance

Module 7: Security controls and defense in depth

  • Selecting preventive, detective, responsive, and recovery oriented controls
  • Control layering across endpoints, networks, applications, platforms, and data
  • Secure defaults, fail safe behavior, and graceful degradation patterns
  • Mapping controls to threats, system elements, and operational context

Module 8: Resilience and dependable system behavior

  • Designing systems that continue operating under fault, attack, or degraded conditions
  • Redundancy, diversity, containment, and recovery as engineering tools
  • Incident driven thinking for availability, continuity, and mission support
  • Balancing security controls with reliability, maintainability, and safety concerns

Module 9: Verification and validation of security requirements

  • Verifying that security requirements are testable and tied to architecture intent
  • Choosing appropriate methods inspection, analysis, testing, and demonstration
  • Relating verification activities to design assumptions and operational scenarios
  • Organizing evidence so security claims remain clear and defensible

Module 10: Compliance and assurance frameworks

  • Translating regulatory, policy, and standard requirements into system level activities
  • Using compliance as a design input rather than a documentation exercise
  • Aligning architecture decisions with auditability and assurance expectations
  • Managing evidence, control ownership, and change impact over time

Module 11: Secure operations and lifecycle sustainment

  • Security monitoring, logging, and telemetry as engineering considerations
  • Managing patching, configuration drift, and system changes without weakening assurance
  • Supporting incident response, forensic readiness, and secure recovery
  • Planning for decommissioning, data disposition, and lifecycle end states

Module 12: Working method for real system security engineering

  • Moving from stakeholder concern to requirement, threat, control, and verification in a structured sequence
  • Coordinating architecture, security, compliance, and operations stakeholders
  • Reviewing system packages for completeness, consistency, and decision usefulness
  • Building a practical checklist for future system security engineering work

Hands-on learning with expert instructors at your location for organizations.

5.922€*
Graph Icon - Education X Webflow Template
Level:
advanced
Clock Icon - Education X Webflow Template
Duration:
21
Hours (days:
3
)
Camera Icon - Education X Webflow Template
Training customized to your needs
Star Icon - Education X Webflow Template
Immersive hands-on experience in a dedicated setting
*Price can range depending on number of participants, change of outline, location etc.

Master new skills guided by experienced instructors from anywhere.

4.587€*
Graph Icon - Education X Webflow Template
Level:
advanced
Clock Icon - Education X Webflow Template
Duration:
21
Hours (days:
3
)
Camera Icon - Education X Webflow Template
Training customized to your needs
Star Icon - Education X Webflow Template
Reduced training costs
*Price can range depending on number of participants, change of outline, location etc.

Upcoming Sessions

11-13 Jun 2026
Brussels
7-9 Jul 2026
Lisbon
23-25 Jul 2026
Barcelona
15-17 Sep 2026
Warsaw
17-19 Dec 2026
Barcelona

Can't find a suitable date? Get in touch and we'll arrange one that works for you.