Threat Modelling Practitioner Training in Australia

  • Learn via: Classroom
  • Duration: 2 Days
  • Level: Intermediate
  • Price: From €3,061+VAT
We can host this training at your preferred location. Contact us!

The programme is a blend of practical use cases based on real-world projects and mentoring. Each use case includes an environmental description, questions, and templates for building a threat model.

Participants are challenged in virtual breakout rooms to carry out the different stages of threat modelling on the following:

Diagramming web and mobile applications, sharing the same REST backend

  • Threat modelling an IoT gateway with a cloud-based update service
  • Get into the attacker’s head – modelling points of attack against a CNI facility
  • Threat mitigations for microservices and S3 buckets in a payment service
  • Threat modelling the CI/CD pipeline

The results are discussed after each hands-on workshop, and participants receive a documented solution.

None

Audience

Engineers, architects, solutions consultants, project managers, scrum masters and security professionals.

  • The why, what, how, and when of threat modelling
  • How to create and update a threat model
  • How to create an actionable threat model with your stakeholders
  • How to organise and prepare efficient threat modelling workshops
  • How to explain the methodology and need for threat modelling to others
  • Diagramming techniques, including Data Flow Diagramming
  • Threat identification techniques, including STRIDE and attack trees
  • How to carry out technical risk rating using the OWASP risk rating methodology
  • How to mitigate security and privacy threats with standard mitigations
  • The soft skills that will make you a better threat modeler

Live Use Case ‘Client’ Scenario specific learning outcome.

Week 1: Threat modeling introduction (self-paced)

  • Threat modeling in a secure development lifecycle
  • What is threat modeling?
  • Why perform threat modeling?
  • Threat modeling stages
  • Different threat modeling methodologies
  • Documenting a threat model

Week 2: Diagrams – what are you building? (self-paced & live lab)

  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Hands-on: Diagramming web and mobile applications, sharing the same REST backend

Week 2: Identifying threats – what can go wrong? (self-paced & live lab)

  • STRIDE introduction
  • Threat tables
  • Hands-on: Threat modeling an IoT gateway with a cloud-based update service
  • Attack trees
  • Attack libraries
  • Hands-on: Get into the attacker's head – modeling points of attack against a CNI facility

Week 3: Addressing each threat (self-paced & live lab)

  • How to address threats
  • Mitigation patterns
  • Setting priorities through risk calculation
  • Risk management
  • Threat agents
  • The mitigation process
  • Threat mitigations for microservices and S3 buckets in a payment service
  • Hands-on: threat modeling the DevOps CI/CD pipeline

Week 4: Threat modeling tooling and resources (self-paced)

  • Open-Source & free tools
  • Commercial tools
  • Hard copy
  • Online resources
  • Threat modeling community
  • Example threat models

Month 2: Bring your own case (self-paced & live lab)

  • Bring your own threat model – Customer Specific
  • Transfer activities
  • Mentoring
  • Review session

This course, also includes a complimentary online Certified Threat Modelling Practitioner exam, provided by Toreon.



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Australia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
11 July 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
14 July 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
17 July 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
25 July 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
03 August 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
06 August 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
08 August 2024
Melbourne, Sydney, Brisbane
2 Days
Classroom / Virtual Classroom
18 August 2024
Melbourne, Sydney, Brisbane
2 Days
Threat Modelling Practitioner Training Course in Australia

Australia is the smallest continent yet it's also one of the largest countries in the World. As the oldest and flattest continent, Australia is a mega-diverse country with a vast variety of landscapes, climates and animals. Canberra is the capital city while Sydney, Brisbane and Melbourne are the more popular ones. Australia is a developed country with a high-income economy and a member of the United Nations, G20 and the Commonwealth of Nations.

While cricket and football are the most popular sports in Australia, the Australian Open tennis grand slam tournament is a major international event that takes place in this country. The island of Tasmania has the cleanest air in the world. Uluru-Kata Tjuta National Park, Great Barrier Reef, Kangaroo Island, Kakadu National Park, Whitsunday Islands and The Pinnacles are some of the jaw-dropping places in Australia.

We offer a wide range of IT courses, from cybersecurity, data science and software development to business skills and project management, and we can host training at your preferred location in Australia. Let our experienced instructors provide you with hands-on training and practical insights.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.