Training – Whiteboard Hacking a.k.a. Hands-on Threat Modeling (May)

Whiteboard Hacking a.k.a. Hands-on Threat Modeling

Hands-on training

Toreon proposes an online action-packed training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.

We will teach an iterative and incremental threat modeling method that is integrated in the development and deployment pipeline.

As speed of delivery is crucial with shorter development cycles, increased deployment frequency, and more dependable releases we focus on a risk-based unified threat modeling practice that is in close alignment with business objectives.

If you want to find out more, or schedule your own training: contact us through our Contact Form.

Training details

We converted our Black Hat edition training to an online action-packed 2 day training with hands-on workshops covering real live use cases to learn how to do practical threat modeling.

You will learn the basics of threat modeling and to understand what you are building, how to identify threats using the STRIDE method and how to address each threat.

You will be challenged to perform practical threat modeling covering the different stages of threat modeling on:

  • A hotel booking web and mobile application, sharing the same REST backend
  • An Internet of Things (IoT) deployment with an on premise gateway and secure update service
  • An HR services OAuth scenario for mobile and web applications

This course is for you if you are an IT architect, system manager, security professional, ethical hacker or AppSec champion.

Download the full training outline and details here

Register now

Learn more

Interested to know more about our training? Do not hesitate to contact us by completing the form below

Read a blog about Threat Modeling

TMI newsletter 13 – Threat modeling: what are we modeling, exactly?

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

TMI newsletter 12 – Keys to successful privacy threat modeling

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

TMI newsletter 11 Threat Modeling Definition of Done

In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling…

© 2020 door Toreon | Algemene voorwaarden | Cookie policy

Start typing and press Enter to search

Shopping Cart
Copy link
Powered by Social Snap