Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application and the supporting architecture. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.
With the decades of experience our instructors possess, they know that there is a gap between academic knowledge of threat modeling and the real world.
In order to minimize that gap we have developed practical Use Cases, based on real world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands-on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work
Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on the following:
B2B web and mobile applications, sharing the same REST backend
An Internet of Things (IoT) deployment with an on-premise gateway and a cloud-based update service
OAuth scenarios for an HR application
Privacy of a new face recognition system in an airport
Get into the defenders’ head – modeling points of attack against a nuclear facility