Whiteboard Hacking (AKA Hands-On Threat Modelling) Training in France

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 2 Days
  • Level: Intermediate
  • Price: From €3,061+VAT
  • Upcoming Date:
  • UK Based Global Training Provider

Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application and the supporting architecture. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.

Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.

We can organize this training at your preferred date and location. Contact Us!

Prerequisites

None.

Target Audience

This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases & Single sign on (SSO) principles.

What You Will Learn

  • The why, what, how, and when of threat modelling
  • How to create and update a threat model
  • How to create an actionable threat model with your stakeholders
  • How to organise and prepare efficient threat modelling workshops
  • How to explain the methodology and need for threat modelling to others
  • Diagramming techniques, including Data Flow Diagramming
  • Threat identification techniques, including STRIDE and attack trees
  • How to carry out technical risk rating using the OWASP risk rating methodology
  • How to mitigate security and privacy threats with standard mitigations
  • The soft skills that will make you a better threat modeler

Training Outline

Threat modeling introduction

  • Threat modeling in a secure development lifecycle
  • What is threat modeling?
  • Why perform threat modeling?
  • Threat modeling stages
  • Different threat modeling methodologies
  • Document a threat model

Diagrams – what are you building?

  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagramming web and mobile applications, sharing the same REST backend

Identifying threats – what can go wrong?

  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) gateway and cloud update service

Addressing each threat

  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: AWS threat mitigations for a travel booking system build on microservices

Threat modeling and compliance

  • How to marry threat modeling with compliance
  • GDPR and Privacy by design
  • Privacy threats
  • LINDUNN and Mitigating privacy threats
  • Threat modeling medical devices (FDA pre- and post-market guidance)
  • Threat modeling Industrial Control Systems (IEC 62443)
  • Threat Assessment and Remediation Analysis for automotive (TARA, SAE 21434)
  • Mapping threat modeling on compliance frameworks
  • Hands-on: privacy threat modeling of a face recognition system in an airport

Penetration testing based on offensive threat models

  • Create pentest cases for threat mitigation features
  • Pentest planning to exploit security design flaws
  • Vulnerabilities as input to plan and scope security testing
  • Prioritization of pentesting based on risk rating
  • Hands-on: get into the defender's head – modeling points of attack of a nuclear facility.

Advanced threat modeling

  • Typical steps and variations
  • Validation threat models
  • Effective threat model workshops
  • Communicating threat models
  • Agile and DevOps threat modeling
  • Improving your practice with the Threat Modeling Playbook
  • Scaling up threat modeling
  • Threat modeling and compliance: ISO14971 (medical devices), IEC 62443 (industrial cybersecurity), SAE 21434 (automotive)
  • Threat models examples: medical devices, automotive, industrial control systems, IoT and Cloud

Threat modeling resources

  • Open-Source tools
  • Commercial tools
  • General tools
  • Threat modeling tools compared
  • Battle for control over 'Zwarte Wind', an offshore wind turbine park

Examination

  • Hands-on examination
  • Grading and certification

Student package

Your bonus training package includes:

  • Following a successful exam (passing grade defined at 70%): Threat Modeling Practitioner certificate
  • One year of access to our threat modeling e-learning platform
  • Presentation handouts
  • Tailored use case worksheets
  • Detailed use case solution descriptions
  • Threat model documentation template
  • Template for calculating identified threat risk severity
  • Threat modeling playbook
  • STRIDE mapped on compliance standards

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Whiteboard Hacking (AKA Hands-On Threat Modelling) Training in France. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including France, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Whiteboard Hacking (AKA Hands-On Threat Modelling) Training in France. Our hand-picked classroom venues in France offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginç IT Academy’s Onsite Whiteboard Hacking (AKA Hands-On Threat Modelling) Training in France. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Whiteboard Hacking (AKA Hands-On Threat Modelling) Training Course in France Schedule

Join our public courses in our France facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
17 avril 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
19 avril 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
20 avril 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
01 mai 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
06 mai 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
09 mai 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
15 mai 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT
12 juin 2026 (2 Days)
Paris, Lyon, Toulouse, Marseille
€3,061 +VAT

France stands as a cornerstone of European industrial innovation, with Paris and Lyon serving as premier global hubs for aerospace, automotive technology, and high-end digital startups. The French tech ecosystem, famously supported by the 'La French Tech' initiative, thrives on the research excellence of institutions like Sorbonne University and École Polytechnique. As a leader in sustainable energy software and sophisticated telecommunications, France offers a highly competitive landscape for advanced professional development. Our IT training programs in France are designed to meet these elite standards, focusing on Cloud Computing, Cybersecurity, and Data Science certifications. We empower professionals across the Republic to lead digital transformation projects within a diverse economy that is consistently pushing the boundaries of engineering and artificial intelligence.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.