Threat modeling introduction
- 		Threat modeling in a secure development lifecycle
 - 		What is threat modeling?
 - 		Why perform threat modeling?
 - 		Threat modeling stages
 - 		Different threat modeling methodologies
 - 		Document a threat model
 
	Diagrams – what are you building?
- 		Understanding context
 - 		Doomsday scenarios
 - 		Data flow diagrams
 - 		Trust boundaries
 - 		Sequence and state diagrams
 - 		Advanced diagrams
 - 		Hands-on: diagramming web and mobile applications, sharing the same REST backend
 
	Identifying threats – what can go wrong?
- 		STRIDE introduction
 - 		Spoofing threats
 - 		Tampering threats
 - 		Repudiation threats
 - 		Information disclosure threats
 - 		Denial of service threats
 - 		Elevation of privilege threats
 - 		Attack trees
 - 		Attack libraries
 - 		Hands-on: STRIDE analysis of an Internet of Things (IoT) gateway and cloud update service
 
	Addressing each threat
- 		Mitigation patterns
 - 		Authentication: mitigating spoofing
 - 		Integrity: mitigating tampering
 - 		Non-repudiation: mitigating repudiation
 - 		Confidentiality: mitigating information disclosure
 - 		Availability: mitigating denial of service
 - 		Authorization: mitigating elevation of privilege
 - 		Specialist mitigations
 - 		Hands-on: AWS threat mitigations for a travel booking system build on microservices
 
	Threat modeling and compliance
- 		How to marry threat modeling with compliance
 - 		GDPR and Privacy by design
 - 		Privacy threats
 - 		LINDUNN and Mitigating privacy threats
 - 		Threat modeling medical devices (FDA pre- and post-market guidance)
 - 		Threat modeling Industrial Control Systems (IEC 62443)
 - 		Threat Assessment and Remediation Analysis for automotive (TARA, SAE 21434)
 - 		Mapping threat modeling on compliance frameworks
 - 		Hands-on: privacy threat modeling of a face recognition system in an airport
 
	Penetration testing based on offensive threat models
- 		Create pentest cases for threat mitigation features
 - 		Pentest planning to exploit security design flaws
 - 		Vulnerabilities as input to plan and scope security testing
 - 		Prioritization of pentesting based on risk rating
 - 		Hands-on: get into the defender's head – modeling points of attack of a nuclear facility.
 
	Advanced threat modeling
- 		Typical steps and variations
 - 		Validation threat models
 - 		Effective threat model workshops
 - 		Communicating threat models
 - 		Agile and DevOps threat modeling
 - 		Improving your practice with the Threat Modeling Playbook
 - 		Scaling up threat modeling
 - 		Threat modeling and compliance: ISO14971 (medical devices), IEC 62443 (industrial cybersecurity), SAE 21434 (automotive)
 - 		Threat models examples: medical devices, automotive, industrial control systems, IoT and Cloud
 
	Threat modeling resources
- 		Open-Source tools
 - 		Commercial tools
 - 		General tools
 - 		Threat modeling tools compared
 - 		Battle for control over 'Zwarte Wind', an offshore wind turbine park
 
	Examination
- 		Hands-on examination
 - 		Grading and certification
 
	Student package
	Your bonus training package includes:
- 		Following a successful exam (passing grade defined at 70%): Threat Modeling Practitioner certificate
 - 		One year of access to our threat modeling e-learning platform
 - 		Presentation handouts
 - 		Tailored use case worksheets
 - 		Detailed use case solution descriptions
 - 		Threat model documentation template
 - 		Template for calculating identified threat risk severity
 - 		Threat modeling playbook
 - 		STRIDE mapped on compliance standards