Threat modeling intensive

Our most popular course

For technology professionals looking to deliver secure systems, threat modeling is an essential skillset. Learn from Adam Shostack, who wrote the most popular book on the topic. August 29 - Sep 2 9AM-11AM Pacific. Equivalent to a 2 day in-person course, 20 hours including classes and homework.

Every participant receives

printed and electronic copies of:

  • Slidebook (125 pages, spiral bound)

  • Elevation of Privilege game

  • Exercises booklet

  • Threat modeling stencil

  • Whiteboard sketchbook

Course curriculum

    1. Welcome

    2. Download the course syllabus

    3. Update Your Calendar

    4. Join Slack

    1. Download the Slide Book

    2. Download the Exercise Book

    3. Preparing to learn using distributed learning

    4. Learning in A Distributed Course (Tips)

    5. Introduction to the LMS

    6. How we use Zoom

    7. How We Use Slack

    8. Readiness Survey

    9. How we use Google Documents

    1. Exercise: Propose a System for Analysis

    2. Exercise: Drawing tools (optional)

    1. Monday Live Class Zoom Link

    1. The Question: What Are We Working On?

    2. DFDs: Diagrams + Models

    3. Exercise: Data Flow Diagram Essay

    4. Exercise: Data Flow Diagram Creation

    5. Trust Boundaries Slide Supplement

    6. Understanding Boundaries

    7. Boundaries Technical Intro

    8. Boundary Complexity

    9. Exercises: Trust Boundaries Essay

    10. Exercise: Draw Trust Boundaries

    11. Models (answer key)

    1. Tuesday Live Class Zoom Link

About this course

  • Free
  • 74 lessons
  • 4.5 hours of video content

Reviews

"One of the top professional development courses in my 35+ year career. - Charles F."

Countdown timer

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds