Threat Modeling Practitioner Training

Threat Modeling Online

or virtual Whiteboard Hacking training

Threat Modeling Practitioner Training

We created a hybrid online training we will teach you to become a threat modeling practitioner; how to threat model, and “build in” security as part of your secure development practice. This training is a blend of self-paced digital preparations with action-packed hands-on live labs delivered by our threat modeling experts.

hybrid threat modeling training

This training is online, taught in English, and involves 24 hours of materials (self-paced and live labs) over of 2 months.

Discover the full training description on our subsidiary Data Protection Institute training page here.

Training registration

Since 2021 we deliver our threat modeling training through our subsidiary Data Protection Institute (DPI).

Discover and register for our new Threat Modeling Practitioner training on the DPI website.

Customer testimonials

“Sebastien delivered! One of the best workshop instructors I’ve ever had. (Black Hat training participant)”

“I took Whiteboard Hacking training with Sebastien and it really helped me understand how to threat model properly. I don’t think I have found any other training to be as comprehensive or deep and Sebastien provided relevant examples. I would highly recommend this training to others interested in Security. (Jeevan Singh, Engineering Manager, Application Security at Segment)”

“Just finished your excellent Threat Modelling course, led by Steven Wierckx together with colleagues from all over Europe. It was really great, and comes recommended from my side to anyone interested in developing IT systems that are secure by design. (Fedder Skovgaard, Enterprise Architect at”

“I feel that this course is one of the most important courses to be taken by a security professional. (Black Hat training participant)”

“The group hands-on practical exercises truly helped. (OWASP training participant)”

“Toreon’s comprehensive Threat Modeling training has enabled several Trend Micro R&D teams to identify software security risks at the design phase with a structured approach. (ChiChang Kung, R&D Architect at Trend Micro)”

“Modern, comprehensive threat modeling techniques. (O’Reilly training participant)”

Read a blog about Threat Modeling

How Threat Modeling improves Pentesting
In this article we will cover how Threat Modeling improves Pentesting. It is the fourth article in a series about…
Threat Modeling vs. Pentesting

This article explains the difference between Threat Modeling and Penetration Testing. It is the third article in a series about…

TMI newsletter 14 – Threat Modeling Redefined: The Self-Serve Threat Model

Check out our guest article by Jeevan Saini and a Toreon blog post covering 7 key learning principles to create…

© 2020 door Toreon | Algemene voorwaarden | Cookie policy

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap