Threat Modelling Practitioner
Book online today or, if you need help choosing the right course or would like to discuss business discounts, call us on 0113 220 7150.
Virtual
From £2,245+VAT
Sorry, there are currently no dates available to book. Submit an enquiry to hear from one of our team about when dates might become available.
Overview
The programme is a blend of practical use cases based on real-world projects and mentoring. Each use case includes an environmental description, questions, and templates for building a threat model.
Participants are challenged in virtual breakout rooms to carry out the different stages of threat modelling on the following:
Diagramming web and mobile applications, sharing the same REST backend
- Threat modelling an IoT gateway with a cloud-based update service
- Get into the attacker’s head – modelling points of attack against a CNI facility
- Threat mitigations for microservices and S3 buckets in a payment service
- Threat modelling the CI/CD pipeline
The results are discussed after each hands-on workshop, and participants receive a documented solution.
Prerequisites
None
Audience
Engineers, architects, solutions consultants, project managers, scrum masters and security professionals.
Delegates will learn how to
- The why, what, how, and when of threat modelling
- How to create and update a threat model
- How to create an actionable threat model with your stakeholders
- How to organise and prepare efficient threat modelling workshops
- How to explain the methodology and need for threat modelling to others
- Diagramming techniques, including Data Flow Diagramming
- Threat identification techniques, including STRIDE and attack trees
- How to carry out technical risk rating using the OWASP risk rating methodology
- How to mitigate security and privacy threats with standard mitigations
- The soft skills that will make you a better threat modeler
Live Use Case ‘Client’ Scenario specific learning outcome.
Outline
Week 1: Threat modeling introduction (self-paced)
- Threat modeling in a secure development lifecycle
- What is threat modeling?
- Why perform threat modeling?
- Threat modeling stages
- Different threat modeling methodologies
- Documenting a threat model
Week 2: Diagrams – what are you building? (self-paced & live lab)
- Understanding context
- Doomsday scenarios
- Data flow diagrams
- Trust boundaries
- Hands-on: Diagramming web and mobile applications, sharing the same REST backend
Week 2: Identifying threats – what can go wrong? (self-paced & live lab)
- STRIDE introduction
- Threat tables
- Hands-on: Threat modeling an IoT gateway with a cloud-based update service
- Attack trees
- Attack libraries
- Hands-on: Get into the attacker's head – modeling points of attack against a CNI facility
Week 3: Addressing each threat (self-paced & live lab)
- How to address threats
- Mitigation patterns
- Setting priorities through risk calculation
- Risk management
- Threat agents
- The mitigation process
- Threat mitigations for microservices and S3 buckets in a payment service
- Hands-on: threat modeling the DevOps CI/CD pipeline
Week 4: Threat modeling tooling and resources (self-paced)
- Open-Source & free tools
- Commercial tools
- Hard copy
- Online resources
- Threat modeling community
- Example threat models
Month 2: Bring your own case (self-paced & live lab)
- Bring your own threat model – Customer Specific
- Transfer activities
- Mentoring
- Review session
This course, also includes a complimentary online Certified Threat Modelling Practitioner exam, provided by Toreon.
Why choose QA
- Award-winning training, top NPS scores
- Nearly 300,000 learners in 2020
- Our training experts are industry leaders
- Read more about QA
Special Notices
QA are proud to be the UK partner for Toreon.
This course is a blended learning class, 8 hours self-paced and 12 hours of online live labs.
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.










Software Engineering learning paths
Want to boost your career in software engineering? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.




Secure Engineering learning paths
Want to boost your career in Secure Engineering? View QA's learning pathway below, specially designed to give you the skills to succeed.




Frequently asked questions
See all of our FAQsHow can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
Learn more about our Virtual Classrooms.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
Learn more about QA’s online courses.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.