Ask Anything

Get direct answers and guidance from experienced Toreon trainers and consultants.

Jointly Learn

Connect with a diverse group of security professionals, developers, architects, and product owners to share insights and tackle challenges together.

Stay Ahead

Access additional resources, discussions, and exclusive content to deepen your knowledge beyond the core training.

About the course

Threat Modeling is the single most effective way to proactively build secure applications and systems. This free, self-paced, 2-hour training will give you the essential foundational knowledge you need to participate effectively in threat modeling activities, regardless of your role. But we're not stopping there. When you enroll in this free course, you also gain exclusive, complimentary access to the Toreon Threat Modeling Insider Community!

World-Recognized Threat Modeling Experts

The Toreon training team is comprised of seasoned consultants and trainers who are world-recognized experts in the field of threat modeling. For over 20 years, our team has been at the forefront, building successful threat modeling programs and delivering highly-rated training for organizations globally.

Curriculum

  1. 1

    Module 1 - Welcome

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
  2. 2

    Module 2 - Why threat modeling

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
  3. 3

    Module 3 - What is threat modeling

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
  4. 4

    Module 4 - When to threat model

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
    10. (Included in full purchase)
  5. 5

    Module 5 - Follow-up

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
    10. (Included in full purchase)
  6. 6

    Training certificate

    1. (Included in full purchase)

Ready to be a Game Changer?

Hear from experts who gained the confidence to secure their systems from design-time.

Just finished your excellent Threat Modelling course... It was really great, and comes recommended from my side to anyone interested in developing IT systems that are secure by design.
Fedder Skovgaard

Enterprise Architect at Energinet.dk

The training was engaging with a lot of practical examples and real-world exercises. Our engineers gained a good understanding of how to identify vulnerabilities at design-time. I would highly recommend the threat modeling training.
Stephen de Vries

CEO at IriusRisk

The Threat Modeling training from Toreon was a game changer. The trainers were true experts, and the well-structured approach gave our team the confidence to tackle threat modeling effectively, no matter their experience level. It's made a real impact on how we protect our organization.
Maxine McFarlane

Application Security SME, Lloyds Banking Group

Join our growing community

Register for your free Threat Modeling Introduction training and community.