Threat Modeling is the way to avoid risks in your applications upfront. Without Threat Modeling your protection is a shot in the dark and you will only know your vulnerabilities once they are exploited. This 2-day hands-on course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile applications, databases & single sign on (SSO) principles.
And you will not be disappointed! This course has been selected for Black Hat USA 2017. More info here.
Toreon Training – ebook Whiteboard Hacking – Threat Modeling
You’ll learn a lot. In this 2-day Hands-on Threat Modeling course, Sebastien Deleersnyder – Consultant and Managing Partner of Toreon – will teach you how to use threat modeling in your current development practice.
You will learn the basics, how to understand what you are building, how to identify threats using the STRIDE method and how to address each threat. Comprehensive training material and hands-on workshops with real live use cases will guide you through all aspects of threat modeling.
This course is all about getting you started with threat modeling as soon – and as effective – as possible. Therefore, we make it extra convenient for you, with some interesting extras:
a hard copy of the book Threat Modeling, designing for security by Adam Shostack;
hand-outs of the presentations;
work sheets and detailed solution descriptions of the use cases;
a template to document a threat model and one to calculate risk levels of identified threats;
a certification for successful completion of this course.
You can register for this 2-day class at
OWASP AppSec Europe 2017 in Belfast, Northern Ireland – register here
Looking for job opportunities in Application Security?
Senior Application Security Specialist
You identify security risks and improve software security to help our customers build and maintain secure applications that their business and their users can trust. Our customers will come to you with their concerns about the security of their applications. By offering your expertise, you will help them get peace of mind.
You verify the security levels of our clients’ networks and applications. Using your creative technical skills, you can think of original ways to circumvent the protective measures that have (or haven’t) been applied. You find ways to get into and exploit their crown jewels. Our clients will come to you for security advice whenever they make changes in the network, system and application architecture. You will be the one to assess the risk of these changes and propose a safe way forward.
KMO Portefeuille Are you an SME in Flanders? Great news! Toreon is recognised as KMO-portefeuille service provider for trainings, analyses and advise. Which means your investment in security can be subsidised.
In order to inform you of our policies and activities with respect to the collection, use and transfer of Personal Data on our websites, you can find an electronic copy of our Privacy Notice here.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.