Threat Modeling: From Novice To Expert
- Description
- Curriculum
- FAQ
- Reviews
Take a deep dive into Threat Modeling and build your expertise from the ground up. This comprehensive course covers everything from foundational concepts to advanced hands-on exercises, equipping you with the skills needed to identify, analyze, and mitigate security threats effectively.
Through structured lessons and practical exercises, you’ll learn:
-
Introduction to Threat Modeling: Grasp the fundamentals, key terminologies, and essential concepts.
-
What / Why / When / Who: Understand the benefits, timing, and key stakeholders involved in Threat Modeling.
-
How to Threat Model: Follow a step-by-step guide with hands-on exercises to analyze an application’s security risks.
-
Threat Modeling Approaches: Explore the three primary approaches and learn when to apply each.
-
Threat Modeling Methodologies: Delve into STRIDE, DREAD, and PASTA to see how methodologies align with modeling approaches.
-
Hands-On Practice: Gain practical experience by threat modeling a web application, creating Data Flow Diagrams (DFD), and working with Assets, Data Flows, Trust Boundaries, and Trust Zones. Learn to identify, prioritize, and respond to threats effectively.
Designed for beginners and experienced professionals alike, this course is ideal for security analysts, software developers, system architects, and IT managers looking to strengthen their security expertise and implement Threat Modeling in real-world scenarios. No prior experience is required—just a keen interest in cybersecurity and secure development practices.
-
5Introduction - What, Why, When, Who?Video lesson
-
6Threat Modeling EverydayVideo lesson
-
7Basic TerminologiesVideo lesson
-
8Definition of Threat ModelingVideo lesson
-
9Basic Terminologies and DefinitionQuiz
-
10Risk - DefinitionVideo lesson
-
11Risk LevelVideo lesson
-
12Risk AnalysisVideo lesson
-
13Risk TreatmentVideo lesson
-
14RiskQuiz
-
15Why should we do Threat Modeling?Video lesson
-
16When should we do Threat Modeling?Video lesson
-
17Who should be involved during Threat Modeling?Video lesson
-
18Why? When? Who?Quiz
-
19ConclusionVideo lesson
-
20Introduction - How to Threat ModelVideo lesson
-
21Define Objectives - What should be achieved?Video lesson
-
22Assess - What are we working on?Video lesson
-
23Analyze Risks - What can go wrong?Video lesson
-
24Mitigate - What can we do about it?Video lesson
-
25Validate - Did we do a good job?Video lesson
-
26Define Objectives / Assess / Analyze Risks / Mitigate / ValidateQuiz
-
27ConclusionVideo lesson
-
42Introduction - Threat Modeling - Hands-onVideo lesson
-
43Threat Modeling a Web Application - Part 1Video lesson
-
44Data Flow Diagram (DFD)Video lesson
-
45Threat Modeling a Web Application - Part 2Video lesson
-
46Exercise 1: AssetsVideo lesson
-
47Exercise 2: Data FlowsVideo lesson
-
48Exercise 3: Trust Boundaries and Trust ZonesVideo lesson
-
49Exercise 4: Identify ThreatsVideo lesson
-
50Exercise 5: Respond to Threats / Threat ReportVideo lesson
-
51ConclusionVideo lesson
-
58Introduction - Microsoft Threat Modeling Tool - Deep DiveVideo lesson
-
59InstallationVideo lesson
-
60Landing Page, Template, ModelVideo lesson
-
61ViewsVideo lesson
-
62Stencils, and Element PropertiesVideo lesson
-
63Threats, Threat List, and Threat PropertiesVideo lesson
-
64Threat Report, and Threat Model InformationVideo lesson
-
65ConclusionVideo lesson

External Links May Contain Affiliate Links read more