Threat Modeling Intensive (222)
Self-Paced Course
The threat landscape is continuously evolving. New attacks and vulnerabilities emerge nearly everyday, making it challenging to build secure systems. This is why we threat model.
Threat modeling is the "measure twice, cut once" of cybersecurity. It's a structured process that helps you see the big picture, so you can create targeted defense strategies. By methodically analyzing components, data flows, trust boundaries and more, threat modeling reveals security design flaws and high-risk areas.
The key benefits of threat modeling include:
Threat Modeling Intensive (222) Self-Paced is designed for software developers, architects, product managers, and security professionals who want to gain a deeper understanding of threat modeling concepts and methodologies.
Relative to our Threat Modeling Essentials Course
Threat Modeling Essentials focuses on teaching a single method to address Four Questions. In our Threat Modeling Intensive, we add more methods to address each, and learn to assess which to apply. That includes state machines and message diagrams to express what we're working on, kill chains and attack trees to address what can go wrong, and risk management approaches to bring more nuance to what we're going to do about each. Intensive also has a set of optional videos and exercises to allow students to go further.
Threat Modeling Intensive (222) Self-Paced is ideal for those who:
Self-paced course
Threat Modeling Intensive is our most popular course. Its designed to provide attendees the ability to more consistently and efficiently apply threat modeling using the Four Question Framework:
Course content
What to expect
Participants will complete 7 chapters including: 1 preparation, 5 knowledge and skills, and an optional chapter. The 6 core chapters each include a set of video lectures (about 5 minutes each) and exercises to build the skills covered in the lectures. There is also 1 chapter with 1 additional reading and 2 videos of 45 minutes each.
Learning outcomes
After taking Threat Modeling Intensive, participants will, like those who take our Threat Modeling Essentials, have the knowledge and skills to consistently and efficiently use the Four Question Framework. That includes data flow diagrams, STRIDE and mitigation techniques, and the ability to choose between them for specific situations. They will also understand how to document results, and drive threat modeling results for action.
Participants in this Threat Modeling Intensive course not only learn specific skills, they learn more skills, including kill chains and risk management. They go deeper into each, and evaluate why those skills make sense, and learn about some of the challenges that they may encounter in their day-to-day application of those skills.
After taking this class, participants will have a depth of knowledge and skills to consistently and efficiently use:
These techniques will enable participants to identify threats and mitigation techniques (such as controls and risk management), accurately document results, and turn threat analysis consistently and efficiently into more secure products. As a result, participants will eventually champion threat modeling within their organization.
Timing
Enrollment in this course is active for 30 days.
Estimated time to complete is 8-19 hours.
The estimated time range is based on the minimum and maximum time recommendations for completing exercises and engagement with optional materials. The average time to complete is closer to 14 hours.
Curriculum
Welcome to Threat Modeling
Syllabus
Slide Book (downloadable)
Exercises File
Learning Online
Exercise: Drawing tools
The Question: What Are We Working On?
DFDs: Diagrams and Models
Exercise: Data Flow Diagram Essay
Exercise: Data Flow Diagram Creation
Trust Boundaries Slide Supplement
Understanding Boundaries
Boundaries Technical
Boundary Complexity
Exercises: Trust Boundaries Essay
Exercise: Draw Trust Boundaries
Models answer key
Exercise: Stop and Reflect
Sketching
DFDs in Depth
What Can Go Wrong? Brainstorming
STRIDE (Introduction)
Applying STRIDE
Tracking Threats + Assumptions
Exercise: STRIDE Essay
Exercise: Apply STRIDE
Exercise: Stop and Reflect
Tools in Context
Elevation of Privilege
Attack Trees
Final Tips + Recap: What Can Go Wrong
Mitigations
Strategies for Addressing Threats
Addressing Threats
Exercise: Design Control - Broadly
Exercise: Design Controls in Depth
Exercise: Risk Management
(Optional) Prioritization
(Optional) Managing "What We're Going to Do About it"
(Optional) Chess and Arms Races
Managing Risk
Exercise: Stop and Reflect
Did we do a good job?
Retrospectives
Exercise: Retrospective Essay
Answer key: threats and mitigations
Introduction to Kill Chains
Applying the Kill Chain
Exercise: Kill Chain Essay
Exercise: Apply a Kill Chain
(optional) Kill Chain Cheat Sheet
MITRE'S ATT&CK Kill Chain
"Act On Objectives" Stage of the Kill Chain
Exercise: Stop and Reflect
Exercise: Retrospective Essay - Course
Self-paced course
Add the physical threat modeling toolkit
Everything you need to complete the course is included, but some people want or need more. That's why we have put together a physical engagement pack the includes:
Take your threat modeling knowledge to the next level with a 60-minute, 1-on-1 video consultation with threat modeling expert Adam Shostack.
In your course wrap up session Adam will answer your questions and provide tailored guidance to address your specific goals. You can pick Adam's brain on topics like:
During your course wrap up, Adam Shostack will draw from his deep expertise in threat modeling and security design to focus wholly on your needs. As an industry pioneer, Adam authored the popular book Threat Modeling: Designing for Security as well as the recent Threats: What Every Engineer Should Learn from Star Wars. He also led the creation of the widely-used SDL Threat Modeling Tool and helped establish global security standards like CVE. With decades of experience in the field, including pioneering the Elevation of Privilege threat modeling game, Adam will work to strengthen your own skills and understanding of this critical discipline. Let his substantial background in establishing threat modeling practices, authoring key texts, and pushing the industry forward guide the session and empower you in your own security journey.
You can add your course wrap up with Adam for just $295 during checkout.
Technology professionals will develop the knowledge & skills needed to consistently and efficiently threat model: identify threats, mitigation techniques, document results, deliver more secure products.
$1,270
Includes: On-line course, printed slide and exercise books, reusable sketch book, DFD stencil, EoP card deck, and STRIDE wallet card.
$1,333
Includes: On-line course, course wrap-up with Adam Shostack, printed slide and exercise books, reusable sketch book, DFD stencil, EoP card deck, and STRIDE wallet card.
$1,628
Includes: On-line course, a reusable sketch book, DFD stencil, EoP card deck, and STRIDE wallet card.
$1,307
Includes: On-line course and printed slide and exercise books.
$1,296
No worries. You can still purchase a course wrap up with Adam Shostack at the regular price of $450. https://courses.shostack.org/courses/threat-modeling-intensive-course-wrap-up-with-adam
Yes. You can purchase the physical toolkit here. https://courses.shostack.org/courses/physical-toolkit And you can buy the course books here: https://courses.shostack.org/courses/threat-modeling-intensive-course-books