Threat Modeling Online
or virtual Whiteboard Hacking training
Online hands-on training
We regularly organize online threat modeling courses for product managers, CISOs, software developers, architects, DevOps engineers, and security professionals.
The primary benefit of threat modeling is to get your team on the same page with a shared vision on security. We teach you how to threat model, and “build in” security as part of your secure development practice.
Our methodology strives to identify and manage design flaws in an iterative and repeatable approach that fits agile and DevOps practices.
To you right you find the latest list of online open Toreon trainings.
Below is a description of our online training events.
If you want to know more about our other trainings (on conferences or in-company), check out our main Threat Modeling Training page.
If you do not find what you are looking for, contact us through our Contact Form.
Training registration
Hands-on threat modeling and tooling for DevSecOps (2 x 4h on 16-17 February, 2021) 495 EUR plus VAT per seat
Whiteboard Hacking a.k.a. Hands-on Threat Modeling hosted by Toreon (2 x 4h on 23-24 March, 2021) 495 EUR plus VAT per seat
Hands-on threat modeling and tooling for DevSecOps (2 x 4h on 21-22 April, 2021) 495 EUR plus VAT per seat
Whiteboard Hacking a.k.a. Hands-on Threat Modeling hosted by Toreon (2 x 4h on 19-20 May, 2021) 495 EUR plus VAT per seat
Whiteboard Hacking a.k.a. Hands-on Threat Modeling
We converted our Black Hat edition training to an online action-packed 1 day training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.
You will learn the basics of threat modeling and to understand what you are building, how to identify threats using the STRIDE method and how to address each threat.
You will be challenged to perform practical threat modeling covering the different stages of threat modeling on:
- A hotel booking web and mobile application, sharing the same REST backend
- An Internet of Things (IoT) deployment with an on premise gateway and secure update service
- An HR services OAuth scenario for mobile and web applications
This course is for you if you are an IT architect, system manager, security professional, ethical hacker or AppSec champion.
Download the full training outline and details here.
Hands-on threat modeling and tooling for DevSecOps
We created a 1-day online threat modeling course specifically for DevOps Engineers to improve reliability and security of delivered software.
You will learn an iterative and incremental threat modeling method that is integrated in the development and deployment pipeline
You will be challenged to perform practical threat modeling covering the different stages of threat modeling. Exercises are built upon a fictional Acme Hotel Booking (AHB) system, where we migrate a legacy client-server system towards a cloud based, micro service stack using AWS services:
- Sprint 1: Modeling a hotel booking web and mobile application, sharing a REST backend
- Sprint 2: Threat identification as part of migrating the booking system application to AWS
- Sprint 3: AWS threat mitigations for the booking system build on microservices
- Sprint 4: Building an attack library for CI/CD pipelines
This course is for you if you are a product manager, software developer, architects, DevOps engineer or application security professional.
Download the full training outline and details here.
Read a blog about Threat Modeling
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…
Toreon simply manages to put the right expert in the right place