Ask Anything
Get direct answers and guidance from experienced Toreon trainers and consultants.
Jointly Learn
Connect with a diverse group of security professionals, developers, architects, and product owners to share insights and tackle challenges together.
Stay Ahead
Access additional resources, discussions, and exclusive content to deepen your knowledge beyond the core training.
About the course
Threat Modeling is the single most effective way to proactively build secure applications and systems. This free, self-paced, 2-hour training will give you the essential foundational knowledge you need to participate effectively in threat modeling activities, regardless of your role. But we're not stopping there. When you enroll in this free course, you also gain exclusive, complimentary access to the Toreon Threat Modeling Insider Community!
World-Recognized Threat Modeling Experts
The Toreon training team is comprised of seasoned consultants and trainers who are world-recognized experts in the field of threat modeling. For over 20 years, our team has been at the forefront, building successful threat modeling programs and delivering highly-rated training for organizations globally.
Curriculum
-
1
Module 1 - Welcome
-
(Included in full purchase)
Introductions - Welcome
-
(Included in full purchase)
Introductions - Please Introduce Yourself
-
(Included in full purchase)
Introductions - Course overview
-
(Included in full purchase)
Knowledge - Understanding what you already know
-
(Included in full purchase)
Knowledge - Linking TM activities to DICE - What do you already know?
-
(Included in full purchase)
Knowledge - True or False TM - What do you already know?
-
(Included in full purchase)
Experience - Experience with TM
-
(Included in full purchase)
-
2
Module 2 - Why threat modeling
-
(Included in full purchase)
Real life impact of TM - Course Overview
-
(Included in full purchase)
Real life impact of TM - Real life impact
-
(Included in full purchase)
What’s in it for me? - Your benefits and obstacles
-
(Included in full purchase)
How can I convince others? - Others' benefits and obstacles
-
(Included in full purchase)
How can I convince others? - Overview benefits and obstacles
-
(Included in full purchase)
-
3
Module 3 - What is threat modeling
-
(Included in full purchase)
Introduction to threat modeling - Course Overview
-
(Included in full purchase)
Introduction to threat modeling - What is Threat Modeling
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM: Stage 1
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM: Stage 1 (DFDs explained)
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM: Stage 2
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM: Stage 2 (STRIDE)
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM: Stage 3
-
(Included in full purchase)
Introduction to threat modeling - 4 Stages of TM: Stage 4
-
(Included in full purchase)
-
4
Module 4 - When to threat model
-
(Included in full purchase)
When to threat model - Course Overview
-
(Included in full purchase)
What's in it for me? - Is TM necessary?
-
(Included in full purchase)
What's in it for me? - Is TM necessary? (Exercise)
-
(Included in full purchase)
Timing of threat modeling - Dev model impact
-
(Included in full purchase)
Timing of threat modeling - When to threat model
-
(Included in full purchase)
Timing of threat modeling - When will you be involved
-
(Included in full purchase)
Involvement and expectations - When are you involved
-
(Included in full purchase)
Involvement and expectations - ACME retail chain
-
(Included in full purchase)
Involvement and expectations - ACME retail chain model answer
-
(Included in full purchase)
Wrap up - OWASP Threat Modeling Playbook
-
(Included in full purchase)
-
5
Module 5 - Follow-up
-
(Included in full purchase)
Review - Quiz
-
(Included in full purchase)
Review - Linking TM activities to DICE
-
(Included in full purchase)
Review - Roles that are involved
-
(Included in full purchase)
Review - Timing for TM
-
(Included in full purchase)
Review - True or False TM
-
(Included in full purchase)
Follow-up - Reflection
-
(Included in full purchase)
Experience Review - Course Feedback
-
(Included in full purchase)
Experience Review - Your Development
-
(Included in full purchase)
Experience Review - Anything Else
-
(Included in full purchase)
Course completion
-
(Included in full purchase)
-
6
Training certificate
-
(Included in full purchase)
Get your certificate
-
(Included in full purchase)
Ready to be a Game Changer?
Hear from experts who gained the confidence to secure their systems from design-time.
Just finished your excellent Threat Modelling course... It was really great, and comes recommended from my side to anyone interested in developing IT systems that are secure by design.
Enterprise Architect at Energinet.dk
The Threat Modeling training from Toreon was a game changer. The trainers were true experts, and the well-structured approach gave our team the confidence to tackle threat modeling effectively, no matter their experience level. It's made a real impact on how we protect our organization.
Application Security SME, Lloyds Banking Group
The training was engaging with a lot of practical examples and real-world exercises. Our engineers gained a good understanding of how to identify vulnerabilities at design-time. I would highly recommend the threat modeling training.
CEO at IriusRisk
Join our growing community
Register for your free Threat Modeling Introduction training and community.