Threat modeling introduction
- 		Threat modeling in a secure development lifecycle
- 		What is threat modeling?
- 		Why perform threat modeling?
- 		Threat modeling stages
- 		Different threat modeling methodologies
- 		Document a threat model
	Diagrams – what are you building?
- 		Understanding context
- 		Doomsday scenarios
- 		Data flow diagrams
- 		Trust boundaries
- 		Sequence and state diagrams
- 		Advanced diagrams
- 		Hands-on: diagramming web and mobile applications, sharing the same REST backend
	Identifying threats – what can go wrong?
- 		STRIDE introduction
- 		Spoofing threats
- 		Tampering threats
- 		Repudiation threats
- 		Information disclosure threats
- 		Denial of service threats
- 		Elevation of privilege threats
- 		Attack trees
- 		Attack libraries
- 		Hands-on: STRIDE analysis of an Internet of Things (IoT) gateway and cloud update service
	Addressing each threat
- 		Mitigation patterns
- 		Authentication: mitigating spoofing
- 		Integrity: mitigating tampering
- 		Non-repudiation: mitigating repudiation
- 		Confidentiality: mitigating information disclosure
- 		Availability: mitigating denial of service
- 		Authorization: mitigating elevation of privilege
- 		Specialist mitigations
- 		Hands-on: AWS threat mitigations for a travel booking system build on microservices
	Threat modeling and compliance
- 		How to marry threat modeling with compliance
- 		GDPR and Privacy by design
- 		Privacy threats
- 		LINDUNN and Mitigating privacy threats
- 		Threat modeling medical devices (FDA pre- and post-market guidance)
- 		Threat modeling Industrial Control Systems (IEC 62443)
- 		Threat Assessment and Remediation Analysis for automotive (TARA, SAE 21434)
- 		Mapping threat modeling on compliance frameworks
- 		Hands-on: privacy threat modeling of a face recognition system in an airport
	Penetration testing based on offensive threat models
- 		Create pentest cases for threat mitigation features
- 		Pentest planning to exploit security design flaws
- 		Vulnerabilities as input to plan and scope security testing
- 		Prioritization of pentesting based on risk rating
- 		Hands-on: get into the defender's head – modeling points of attack of a nuclear facility.
	Advanced threat modeling
- 		Typical steps and variations
- 		Validation threat models
- 		Effective threat model workshops
- 		Communicating threat models
- 		Agile and DevOps threat modeling
- 		Improving your practice with the Threat Modeling Playbook
- 		Scaling up threat modeling
- 		Threat modeling and compliance: ISO14971 (medical devices), IEC 62443 (industrial cybersecurity), SAE 21434 (automotive)
- 		Threat models examples: medical devices, automotive, industrial control systems, IoT and Cloud
	Threat modeling resources
- 		Open-Source tools
- 		Commercial tools
- 		General tools
- 		Threat modeling tools compared
- 		Battle for control over 'Zwarte Wind', an offshore wind turbine park
	Examination
- 		Hands-on examination
- 		Grading and certification
	Student package
	Your bonus training package includes:
- 		Following a successful exam (passing grade defined at 70%): Threat Modeling Practitioner certificate
- 		One year of access to our threat modeling e-learning platform
- 		Presentation handouts
- 		Tailored use case worksheets
- 		Detailed use case solution descriptions
- 		Threat model documentation template
- 		Template for calculating identified threat risk severity
- 		Threat modeling playbook
- 		STRIDE mapped on compliance standards