Shostack + Associates
The world's best threat modeling courses
We threat model because it’s essential to security by design and building security in.
Threat modeling is the "measure twice, cut once" of cybersecurity. It’s structured processes that help you see the big picture, so you can create effective defenses. By methodically analyzing components, data flows, trust boundaries, and more, threat modeling reveals security design flaws and high-risk areas.
The key benefits of threat modeling include:
Participants will deepen knowledge + skills needed to consistently and efficiently utilize threat modeling to identify threats, mitigation techniques, document results, deliver more secure products, and champion threat modeling within organizations.
$899
Technology professionals will develop the knowledge & skills needed to consistently and efficiently threat model: identify threats, mitigation techniques, document results, deliver more secure products.
$1,270
At this time, we do not have any upcoming open enrollment course dates scheduled. However, with a minimum enrollment, we can deliver any of our courses to your organization as a closed course.
Interested in threat modeling training for your organization? We offer corporate and closed courses tailored to your team's needs. These private courses allow us to dive deep on industry-specific topics or focus on your organization's unique challenges.
Learn more about how we can provide impactful threat modeling training for your company by visiting https://shostack.org/training. There you'll find details on our flexible format options, ability to cover specialized subject matter, and how we ensure sessions target your team's skill levels and knowledge gaps.
Contact us to schedule a closed course for your team!
We offer the best threat modeling training available.
Our founder Adam Shostack is one of the leading experts in threat modeling and security engineering. Almost everyone else trains using Adam’s books. Why not go to the source?
Our training is laser-focused on threat modeling as the heart of security engineering work. We've trained thousands of people with methods that deliver results.
We know training works best when people have a chance to develop specific technical skills, to apply them, and to reflect on how they and others have applied them. We design our training on specific learning goals, including skills (technical and soft), values (the importance of security) and understanding (shifting left reduces rework). To meet your needs, we have instruction and logistics options, including a choice between live instruction or self-paced/computer-based training.
This course is a great introduction to Threat Modeling and the Four Question framework that enables structured, comprehensive, and systematic way to bring security to projects from the very start. The mini-lessons are easy to fit into busy schedules.
Free
This mini-course uses Star Wars analogies including R2-D2's ownership transfer, managing his restraint bolts, and the access control rule for him to authenticate Obi-Wan as a way of teaching important cybersecurity concepts.
Free
This is a prioritization focused mini-course that supplements our Threat Modeling for Security Champs 301, It consists of 5 videos, a few exercises and a quiz.
Free
Hear about our upcoming courses
We offer threat modeling trainings. We're really proud of them. We want to be able to let people know about them. And ... Adam hates spam. He set up "Adam's New Thing" to be about the new things he's doing, and new course announcements seem like something different.
So we set up a new list: "upcoming courses." You'll be shocked, shocked to hear that it's more commercial. We're going to use it to announce new training offerings such as: