Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application and the supporting architecture. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.
None.
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases & Single sign on (SSO) principles.
Threat modeling introduction
Diagrams – what are you building?
Identifying threats – what can go wrong?
Addressing each threat
Threat modeling and compliance
Penetration testing based on offensive threat models
Advanced threat modeling
Threat modeling resources
Examination
Student package
Your bonus training package includes:
Join our public courses in our United States of America facilities. Private class trainings will be organized at the location of your preference, according to your schedule.