Let us help you find the training program you are looking for.

If you can't find what you are looking for, contact us, we'll help you find it. We have over 800 training programs to choose from.

Loading Events

Embrace Threat Modeling – 2 Day Training Session

Course Details:

  • Class Start Date:

    Monday 1/8/2024

  • Class End Date:

    Tuesday 1/9/2024

  • Cost per Student:

    $ 1750

  • This course will teach threat modeling for secure coding practices.

    Security of software systems is becoming more and more important and visible in the public eye. Meanwhile, there is a basic imbalance between the attackers (hackers) and defenders (software developers). That is, hackers get immediate reward for their breach they effect and the damage the cause. By contracts, defenders get the blame when they are hacked and no mention when they are not.

    Our system addresses this and changes the balance, ultimately resulting in more secure software systems.

Course Objectives

  • Identify and address biggest threats
  • Plan mitigations on identified and documented threats, not feelings
  • Eliminate security issues early
  • Rationally security decisions
  • Cost-effectively increase security of your application and organization
  • Prioritize development and testing efforts based on identified threats
  • Calculate the residual risk to help understand your software’s security

Outline

  • STRIDE
  • Adversarial Perspective
  • Security Terminology
  • Microsoft Security Development Lifecycle (SDL)
  • Threat Modeling
  • Microsoft Threat Modeling Tool
  • Attack Surface Reduction
  • CVSS
  • Cryptography
  • OWASP
  • Hands-on exercises
  • Appendix – background

Course Content

This course will teach threat modeling for secure coding practices.

Security of software systems is becoming more and more important and visible in the public eye. Meanwhile, there is a basic imbalance between the attackers (hackers) and defenders (software developers). That is, hackers get immediate reward for their breach they effect and the damage the cause. By contracts, defenders get the blame when they are hacked and no mention when they are not.

Our system addresses this and changes the balance, ultimately resulting in more secure software systems.

Who should attend

  • Developers, team leads, project managers
  • Cybersecurity: Basic (1-2 years’ experience)
  • Code development: Basic (1-2 years’ experience)