A structured guide connecting artifacts, frameworks, and courses across five competency domains. Each domain maps Dr. Nsoh's research outputs to actionable learning paths for practitioners, researchers, and students.
Every artifact follows the A-DSRM lifecycle. Every framework operationalizes identity-first security. Every course builds toward deployable competency.
Five interconnected domains spanning identity governance, AI security, critical infrastructure, security operations, and research methodology.
Master identity-centric security architectures where AuthN, AuthZ, and continuous verification form the foundational control plane for all systems—human, machine, and AI agent.
Secure Software Design
Identity-first design, Zero Trust patterns, threat modeling
Secure Application Design
Authentication, authorization, OWASP Top 10
Develop expertise in governing autonomous AI agents through identity-scoped controls, bounded autonomy, and continuous verification—ensuring AI systems operate within defined safety envelopes.
Secure Software Design
AI system threat modeling, identity-first AI architecture
Innovation Leadership
AI governance, responsible innovation, research methodology
Build competency in securing cyber-physical systems—transportation, energy, and public safety—where identity verification, anomaly detection, and operational continuity are non-negotiable.
Intrusion Detection & Incident Response
IDS for OT/IT convergence, incident handling
Secure Software Design
Secure architecture for cyber-physical systems
Develop operational excellence in GRC platform management, security metrics, KPI dashboards, and identity-governed automation using Python, PowerShell, and CI/CD pipelines.
Intrusion Detection & Incident Response
SOC operations, SIEM, forensics
Innovation Leadership
Security operations maturity, metrics-driven management
Master the Agile Design Science Research Methodology (A-DSRM) for building, evaluating, and iterating security artifacts that operate under real-world constraints and adversarial conditions.
Innovation Leadership
Research methodology, artifact construction, DSRM
Secure Software Design
Applied artifact design and evaluation
These domains are not silos. The following connections show how artifacts and frameworks bridge competency areas, enabling holistic security practice.
ICACC Framework bridges IAM controls to AI agent governance
AI-SECURE-STACK governs AI pipelines deployed in critical systems
CYBER-AUTOMATE enforces identity-governed automation across GRC
A-DSRM provides the iterative evaluation framework for every artifact
SOC automation patterns from CYBER-AUTOMATE apply to OT monitoring
| Domain | Key Artifacts | Frameworks | Entry Course | Advanced Course |
|---|---|---|---|---|
| Identity & Access Governance | SVX-AD, AEGIS-M, ICACC | ICACC Framework | CIS 3337 | CIS 6358 |
| AI Agent Security & Governance | AI-SECURE-STACK, ICACC | AAO Framework, ICACC Framework | CIS 4339 | CIS 6358 |
| Critical Infrastructure Resilience | SVX-AD, AEGIS-M, PRAETORIAN-Q | ICACC Framework | CIS 3351 | CIS 6358 |
| Security Operations & Automation | CYBER-AUTOMATE, A-DSRM Suite | AAO Framework | CIS 3351 | CIS 4339 |
| Research Methodology & Artifact Design | A-DSRM, A-DSRM Suite | AAO Framework | CIS 4339 | CIS 6358 |