Threat Modeling Online Training

Threat Modeling Online

or virtual Whiteboard Hacking training

Online hands-on training

We regularly organize online threat modeling courses for software developers, architects, system managers, and security professionals.

The primary benefit of threat modeling is to get your team on the same page with a shared vision on security. We teach you how to threat model, and “build in” security as part of your secure development practice.

Our methodology strives to identify and manage design flaws in an iterative and repeatable approach that fits agile and DevOps practices.

Below you will find the latest list of online open Toreon trainings, if you do not find what you are looking for, contact us through our Contact Form.

Training details

We converted our Black Hat edition training to an online action-packed 1 day training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.

You will learn the basics of threat modeling and to understand what you are building, how to identify threats using the STRIDE method and how to address each threat.

You will be challenged to perform practical threat modeling covering the different stages of threat modeling on:

  • A hotel booking web and mobile application, sharing the same REST backend
  • An Internet of Things (IoT) deployment with an on premise gateway and secure update service
  • An HR services OAuth scenario for mobile and web applications

Download the full training outline and details here.

Next online open threat modeling training sessions

Check out our list of online trainings here:

  • Whiteboard Hacking a.k.a. Hands-on Threat Modeling hosted by Toreon  (2 x 4h on 22-23 September, 2020)

Read a blog about Threat Modeling

Fluvius

Toreon simply manages to put the right expert in the right place

TMI newsletter 9 How often do living documents need to breathe?

You might have heard of threat modeling as a structured activity for identifying and managing application threats. And that’s exactly…

FDA recommends Threat Modeling as Cybersecurity Risk Assessment methodology

We’ve created a whitepaper, in collaboration with experts from the medical device community, to highlight how Threat Modeling can be…

© 2020 door Toreon | Algemene voorwaarden | Cookie policy

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap