Training – Whiteboard Hacking a.k.a. Hands-on Threat Modeling (May)

Whiteboard Hacking a.k.a. Hands-on Threat Modeling

Hands-on training

Toreon proposes an online action-packed training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.

We will teach an iterative and incremental threat modeling method that is integrated in the development and deployment pipeline.

As speed of delivery is crucial with shorter development cycles, increased deployment frequency, and more dependable releases we focus on a risk-based unified threat modeling practice that is in close alignment with business objectives.

If you want to find out more, or schedule your own training: contact us through our Contact Form.

Training details

We converted our Black Hat edition training to an online action-packed 2 day training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.

You will learn the basics of threat modeling and to understand what you are building, how to identify threats using the STRIDE method and how to address each threat.

You will be challenged to perform practical threat modeling covering the different stages of threat modeling on:

  • A hotel booking web and mobile application, sharing the same REST backend
  • An Internet of Things (IoT) deployment with an on premise gateway and secure update service
  • An HR services OAuth scenario for mobile and web applications

This course is for you if you are an IT architect, system manager, security professional, ethical hacker or AppSec champion.

Download the full training outline and details here

Register now

Learn more

Interested to know more about our training? Do not hesitate to contact us by completing the form below

[wpforms id=”3504″ title=”false” description=”false”]

Read a blog about Threat Modeling

Threat Modeling Insider – March 2024

This months Threat Modeling Insider edition features a white paper by Adam Shostack on Inherent Threats

Threat Modeling Playbook – Part 3 Train your people to threat model

In this series of blogs, we unravel the complexities of creating a successful threat modeling strategy

Threat Modeling Insider – February 2024

February’s Threat Modeling Insider edition features a guest article by Ive Verstappen, who provides 3 scenarios for transforming a Cornucopia…

© 2020 door Toreon | Algemene voorwaarden | Cookie policy

Start typing and press Enter to search

Shopping Cart