Overview

This self-paced training prepares involved stakeholders to understand with threat modeling is, the benefits of threat modeling and how they will be involved. Typically, this will be made available for involved testers, developers, security roles, administrators, DevOps engineers, architects, project managers, product owners and management (CxO).

Read more +

Prerequisites

There are no prerequisites.

Read more +

Objectives

  • Understand the 'Why' of threat modeling
  • Understand the real life impact of threat modeling
  • Understand the role I play in threat modeling
  • Understand the 'What' of threat modeling
  • Undertstand the typicall involvemnt and expectaions of threat modeling
Read more +

Outline

Module 1: Welcome

  • Introductions
  • Personalizing your journey (knowledge and experience)

Module 2: Why threat modeling?

  • Real life impact of threat modeling
  • What’s in it for me?

Module 3: What is threat modeling

  • Introduction to threat modeling
  • Involvement and expectations

Module4: Follow-up

  • Personalizing your journey (review)
  • Experience review

About the Author: Sebastien (Seba) Deleersnyder

Sebastien (Seba) Deleersnyder is co-founder and CTO of Toreon and a proponent of application security as a holistic approach. He started the Belgian OWASP chapter, was an OWASP Foundation Board member, and has given numerous public presentations on Application Security. Seba also co-founded Belgium’s annual BruCON security & hacker conference and training sessions. With a development background and years of security experience, he has trained countless developers to create more secure software.

Having led OWASP projects such as OWASP SAMM, he has genuinely helped make the world a safer place. What’s he currently up to? Right now, he’s busy adapting application security models to the evolving field of DevOps and is also focused on getting the word out on Threat Modeling to a broader audience.

Read more +

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing