Overview Next training
Our teachers for the training: Threat Modeling Practitioner
Practical threat modeling
- Based on Toreon’s acclaimed ‘Whiteboard Hacking Training’
- Expert trainers with real-world experience deliver practical training
- In-person training with individual feedback for each participant
- Learn actionable steps to improve your product security posture
This training is based on Toreon’s internationally acclaimed ‘Whiteboard Hacking Training’, which is exclusively given at conferences around the world (Blackhat, OWASP). It is now also available in an in-company or online format.
Cybersec authorities OWASP and NIST widely agree that Threat Modeling is one of the most effective methods to reduce cybersecurity risk and ensure secure software architecture from the start.
Training your team in Threat Modeling ensures they have the skills to identify threats and continuously iterate on existing threat models. This way, security becomes part of the development lifecycle of your software or hardware, lowering total costs and increasing security.
“This training takes a very practical approach. It is rooted in Seba’s extensive field experience with Threat Modeling.”
“The hands-on, real-life exercises truly helped.”
Our partner for this training is Toreon, a firm with a long-standing reputation for all-things-cybersecurity. They have delivered in-company certified Threat Modeling training since 2016 and created the ‘Threat Modeling Playbook’ for the OWASP foundation.
Main benefits
- Protect your reputation & prevent expensive hacks and exploits
- Lower your total cost of security by implementing best practices from the get-go
- Deploy Security & Privacy by Design
- Gain a competitive advantage with secure, future-proof products
Book A Call
Get on a short call with the trainer to discuss in-company course content, pricing, and specific needs.
Schedule Now
Reserve your seat for the upcoming online course.
What to expect
Learning goals
- The what, when, and how of Threat Modeling
- Discover and mitigate critical design flaws in your software
- Learn how to create an actionable threat model with your stakeholders
- Learn how to carry out technical risk rating using the OWASP methodology
- Identify non-trivial threats using STRIDE and attack trees
- Understand how industry leaders mitigate security and privacy threats
- Learn to give highly effective threat modeling workshops to small groups
- Explain the methodology and need for threat modeling to colleagues
Deliverables
- One year of access to the e-learning platform
- Incl. live lab recordings
- A fully worked-through example that covers multiple aspects of a threat model in depth
- A framework to help apply threat modeling to your development lifecycle
- STRIDE mapped on compliance standards
- All presentation hand-outs
- Various templates & worksheets:
- Rating risk severity with several risk calculation methods
- Threat Model documentation template
- Detailed use-case worksheets
- Detailed use-case solution descriptions
Teachers
Toreon’s DPI is globally recognized for its Threat Modeling training and has years of experience delivering cybersecurity to different industries.
All teachers for this course have years of experience in the field and in front of the classroom.
Together, we created the most comprehensive Threat Modelling training curriculum.
Target Group
If you are involved in any aspect of ensuring security for a product (software or hardware), this course is for you! You do not need to have a background in security.
We believe that anyone can threat model and that there’s a need for threat modeling to be understood by all those involved in the development lifecycle.
Typical profiles for this course include:
- Software developers/engineers/architects
- Product managers/Product Security
- Incident Responders
- Cyber-security analysts/managers
What will the course look like?
In-company
We recommend the in-company formula for organizations with 10+ full-time security or software engineers. Companies that regularly process high-risk data or consider their software to be ‘core’ to the organization should opt for the in-company formula.
The training consists of 32 hours and 4 days of interactive learning, with a mixture of theory and real-world examples. A significant part of the course consists of creating your own threat model and discussing this with the trainers.
Book A Call
Get on a short call with the trainer to discuss in-company course content, pricing, and specific needs.
Live online
For organizations with <10 security or software engineers or those that don’t consider their software ‘core’ to the business, we recommend our live online formula: This hybrid format combines self-paced learning with three live labs.
It consists of 20 hours of blended learning:
- Self-paced preparatory material (8 h)
- Live lab sessions & review with the trainers (12h)
Live virtual labs run on three dates (see schedule) from 12:00-15:00 CEST
During the live sessions, you’ll get the chance to interact with other participants and ask all the questions you like. After this, you will create your own threat model over the next month. Finally, you’ll review your model for 2 hours with our trainers.
Partners
UK training delivered through partner QA.
Schedule Now
Reserve your seat for the upcoming online course.
Do you wish to receive the monthly newsletter Threat Modeling Insider?
Sign up for the newsletter via this link: https://ap.lc/D3cYM.
Week 1
Threat modeling introduction (self-paced)
- Threat modeling in a secure development lifecycle
- What is threat modeling?
- Why perform threat modeling?
- Threat modeling stages
- Different threat modeling methodologies
- Documenting a threat model
Week 2
Lab 1: Diagrams – what are you building? (self-paced & live lab 1)
- Understanding context
- Doomsday scenarios
- Data flow diagrams
- Trust boundaries
- Hands-on: Diagramming web and mobile applications, sharing the same REST backend
Lab 2: Identifying threats – what can go wrong? (self-paced & live lab 2)
- STRIDE introduction
- Threat tables
- Hands-on: Threat modeling an IoT gateway with a cloud-based update service
- Attack trees
- Attack libraries
- Hands-on: Get into the attacker’s head – modeling points of attack against a nuclear facility
Week 3
Lab 3: Addressing each threat (self-paced & live lab 3)
- How to address threats
- Mitigation patterns
- Setting priorities through risk calculation
- Risk management
- Threat agents
- The mitigation process
- Hands-on: Threat mitigations for microservices and S3 buckets in a payment service
- Hands-on: Threat modeling the CI/CD pipeline
Threat modeling tooling and resources (self-paced)
- Open-Source & free tools
- Commercial tools
- Hard copy
- Online resources
- Threat modeling community
- Example threat models
Month 2
Bring your own case (self-paced & live lab 4)
- Bring your own threat model
- Transfer activities
- Mentoring
- Review session
Price
€1.495
VAT exclusive
Certificate
"Threat Modeling Practitioner Certificate"
SME portfolio Flanders - higher subsidy for theme CYBERSECURITY: 45% for small and 35% for medium-sized enterprises.
Book a Call
Schedule 2024 -2025
Name
Date
Location
Language
Register
Threat Modeling Practitioner
Start 23-Sept; Live labs 30-Sept, 3-Oct, 10-Oct; review session 5-Nov
Threat Modeling Practitioner
Start 2-Dec; Live labs 9-Dec, 12-Dec, 19-Dec; review session 21-Jan 2025
Threat Modeling Practitioner
Start 24-Maa 2025; Live labs 24-Maa, 28-Maa, 03-Apr; review session 8-Mei 2025
Threat Modeling Practitioner
Start 25-Aug 2025; Live labs 25-Aug, 28-Aug, 04-Sep; review session 2-Oct 2025
Threat Modeling Practitioner
Start 01-Dec 2025; Live labs 01-Dec, 05-Dec, 11-Dec; review session 15-Jan 2026