Threat modeling intensive

Our most popular course

For technology professionals looking to deliver secure systems, threat modeling is an essential skillset. Learn from Adam Shostack, who wrote the most popular book on the topic. August 29 - Sep 2 9AM-11AM Pacific. Equivalent to a 2 day in-person course, 20 hours including classes and homework.

Every participant receives

printed and electronic copies of:

  • Slidebook (125 pages, spiral bound)

  • Elevation of Privilege game

  • Exercises booklet

  • Threat modeling stencil

  • Whiteboard sketchbook

Course curriculum

    1. Welcome

    2. Download the course syllabus

    3. Update Your Calendar

    4. Check your Slack access

    1. Download the Course Book

    2. Download the Exercise Book

    3. Preparing to learn using distributed learning

    4. Learning in A Distributed Course (Tips)

    5. Introduction to the LMS

    6. How we use Zoom

    7. How We Use Slack

    8. Readiness Survey

    9. How we use Google Documents

    10. How do I submit my exercises?

    1. Exercise: Propose a System for Analysis

    2. Exercise: Drawing tools

    1. The Question: What Are We Working On?

    2. DFDs: Diagrams + Models

    3. Exercise: Data Flow Diagram Essay

    4. Exercise: Data Flow Diagram Creation

    5. Understanding Boundaries

    6. Boundaries Technical Intro

    7. Boundary Complexity

    8. Exercises: Trust Boundaries Essay

    9. Exercise: Draw Trust Boundaries

    10. Models (answer key)

    1. Tuesday Live Class Link

    1. Sketching

    2. DFDs in Depth

    3. Boundaries in Depth

    4. What Can Go Wrong? Brainstorming and Tools

    5. STRIDE (Introduction)

    6. Applying STRIDE

    7. Tracking Threats + Assumptions

    8. Exercise: STRIDE Essay

    9. Exercise: Apply STRIDE

About this course

  • Free
  • 75 lessons
  • 4.5 hours of video content

Reviews

"One of the top professional development courses in my 35+ year career. - Charles F."

Countdown timer

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds