Master Threat Modeling & Build Secure Applications

Learn how to proactively identify and mitigate security risks before they become real threats.

Become a Certified Threat Modeling Practitioner

We offer two tailored security training options: an in-company program for teams or a 20-hour online course for individuals. Both provide hands-on experience, expert guidance, and custom threat modeling to elevate your security skills. 

In-company program for teams

Agile Whiteboard Hacking

Enhanced 2-day training with hands-on workshops and a unique threat modeling war game. Gain practical skills, tackle real-world simulations, and access our online platform with the Toreon Threat Modeling Playbook for a full year.

Online course for individuals

Threat Modeling Practitioner Course

This hybrid online training equips you with the skills to become a threat modeling practitioner, integrating security seamlessly into your development process.

 

In-company program for teams

Agile Whiteboard Hacking

Enhanced 2-day training with hands-on workshops and a unique threat modeling war game. Gain practical skills, tackle real-world simulations, and access our online platform with the Toreon Threat Modeling Playbook for a full year.

Online course for individuals

Threat Modeling Practitioner Course

This hybrid online training equips you with the skills to become a threat modeling practitioner, integrating security seamlessly into your development process.

What you'll learn

Learn how to identify, assess, and mitigate security risks through practical threat modeling techniques.

This course equips you with the skills to secure modern applications and systems effectively:

Who is this training designed for?

Whether you’re already a seasoned professional looking to get certified or you’re part of a team that wants to learn and implement industry security best practices around threat modeling processes, our training is for you.

Who is this training designed for?

Whether you’re already a seasoned professional looking to get certified or you’re part of a team that wants to learn and implement industry security best practices around threat modeling processes, our training is for you.

Software developers and architects

Threat Modeling training helps software developers and architects proactively identify and mitigate security risks early in the SDLC, preventing costly vulnerabilities before code is written.

Product managers and incident responders

Threat Modeling training helps Product Managers embed security early and aids Incident Responders in anticipating and mitigating threats.

Security professionals responsible for threat models

Threat Modeling training helps security professionals systematically identify and mitigate risks, create effective threat models, and strengthen security defenses.

Software developers and architects

Threat Modeling training helps software developers and architects proactively identify and mitigate security risks early in the SDLC, preventing costly vulnerabilities before code is written.

Product managers and incident responders

Threat Modeling training helps Product Managers embed security early and aids Incident Responders in anticipating and mitigating threats.

Security professionals responsible for threat models

Threat Modeling training helps security professionals systematically identify and mitigate risks, create effective threat models, and strengthen security defenses.

Meet the trainers

Whether you’re already a seasoned professional looking to get certified or you’re part of a team that wants to learn and implement industry security best practices around threat modeling processes, our training is for you.

Meet the trainers

Whether you’re already a seasoned professional looking to get certified or you’re part of a team that wants to learn and implement industry security best practices around threat modeling processes, our training is for you.

4

Sebastien Deleersnyder

5

Thomas Heyman

7

Steven Wierckx

6

Georges Bolssens

4

Sebastien Deleersnyder

7

Steven Wierckx

6

Georges Bolssens

What others have to say about our certified threat modeling training

What others have to say about our certified threat modeling training

Want to know more about the various training options? Book a free discover call with Sebastien.

Do you prefer an in-company training tailored to your specific needs?

Get in touch with us and let us know what you’re looking for. We’ll provide you with a quote and tailor a training program for you.

4

Want to know more about the various training options? Book a free discover call with Sebastien.​

Do you prefer an in-company training tailored to your specific needs?

Get in touch with us and let us know what you’re looking for. We’ll provide you with a quote and tailor a training program for you.

Upcoming threat modeling open training sessions​

Advanced Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by NorthSec, Montreal

10-11 May 2025

Hands-on Threat Modeling AI (NEW TRAINING), in-person, hosted by OWASP Global AppSec, Barcelona

27-28 May 2025

Advanced Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by Black Hat USA, Las Vegas 

2-5 August 2025

Advanced Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by NorthSec, Montreal

10-11 May 2025

Hands-on Threat Modeling AI, in-person, hosted by OWASP Global AppSec, Barcelona

27-28 May 2025

Advanced Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by Black Hat USA, Las Vegas 

2-5 August 2025

Threat Modeling Practitioner training, hybrid online, hosted by DPI

Cohort starting on 18 August 2025

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, OWASP Global AppSec, Washington DC

4-5 November 2025

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, OWASP Global AppSec, Washington DC

4-5 November 2025

Threat Modeling Practitioner training, hybrid online, hosted by DPI

Cohort starting on 18 August 2025

Start typing and press Enter to search

Shopping Cart