What to Expect

Threat Modeling Intensive (222) is the most popular course at Shostack + Associates, and this is the self-paced version.


Participants will complete 7 chapters including: 1 preparation, 5 knowledge and skills, and an optional chapter. The six core chapters each include a set of video lectures (about 5 minutes each) and exercises to build the skills covered in the lectures. There is also one chapter with and additional reading and two videos of 45 minutes each.

After taking this class, participants will have a depth of knowledge and skills to consistently and efficiently utilize:

  • The Four Question Framework, 
  • Data Flow Diagrams,
  • STRIDE and Kill Chains

These techniques will help participants to identify threats and mitigation techniques (such as controls and risk management), accurately document results, and turn threat analysis consistently and efficiently into more secure products. As a result participants  will eventually champion threat modeling within their organization.

Enrollment in this course is active for 30 days. 

Estimated time to complete is 14-16 hours.

Get More From Your Self-paced Study

  • Physical Materials

    Slidebook (125 pages, spiral bound), Elevation of Privilege game, Exercises booklet, Threat modeling stencil, Whiteboard sketchbook

  • 1-on-1 with Adam Shostack

    A 1-on-1 with Adam Shostack affords students the ability to ask questions, get feedback, and explore the concepts learned during self-paced study.

Pricing Options

We've found that not everyone needs physical copies or a 1-on-1 discussion with Adam Shostack to learn Threat Modeling and are happy to offer a learning package that includes only what you feel you need.  

Course curriculum

  • 1


    • Welcome and Introduction

    • Syllabus

    • Learning Online

    • Welcome to Threat Modeling

    • Slide Book (downloadable)

    • Exercises File

    • Exercise: Drawing tools

  • 2

    What Are We Working On?

    • The Question: What Are We Working On?

    • DFDs: Diagrams and Models

    • Trust Boundaries (Introduction)

    • Exercise: Data Flow Diagram Essay

    • Exercise: Data Flow Diagram Creation

    • Models answer key

    • Sketching

    • Exercises: Trust Boundaries Essay

    • Exercise: Draw Trust Boundaries

    • DFDs in Depth

    • Boundaries In Depth

    • Exercise: Stop and Reflect

  • 3

    What Can Go Wrong?

    • What Can Go Wrong? Brainstorming

    • STRIDE (Introduction)

    • Applying STRIDE

    • Tracking Threats + Assumptions

    • Exercise: STRIDE Essay

    • Exercise: Apply STRIDE

    • Tools in Context

    • Elevation of Privilege

    • Attack Trees

    • Final Tips + Recap: What Can Go Wrong

    • Exercise: Stop and Reflect

  • 4

    What Are We Going To Do About It?

    • Mitigations

    • Strategies for Addressing Threats

    • Addressing Threats

    • Exercise: Design Control - Broadly

    • Exercise: Design Controls in Depth

    • Exercise: Risk Mitigation

    • (Optional) Prioritization

    • (Optional) Managing "What We're Going to Do About it"

    • (Optional) Chess and Arms Races

    • Exercise: Stop and Reflect

  • 5

    Did We Do A Good Job?

    • Did we do a good job?

    • Retrospectives

    • Answer key: threats and mitigations

    • Exercise: Stop and Reflect

  • 6

    Kill Chains in Threat Modeling

    • Introduction to Kill Chains

    • Applying the Kill Chain

    • Exercise: Kill Chain Essay

    • Exercise: Apply a Kill Chain

    • (optional) Kill Chain Cheat Sheet

    • MITRE'S ATT&CK Kill Chain

    • "Act On Objectives" Stage of the Kill Chain

    • Exercise: Stop and Reflect

  • 7

    Final Exercises

    • Exercise: End-to-End Threat Model

    • Make Threat Modeling Part of Your Work

  • 8

    Let's stay in touch!

    • Please sign up for our mailing lists

  • 9

    Optional Learning Content

    • Threat Modeling Lessons From Star Wars

    • Threat Modeling in 2020

    • The Threat Modeling Manifesto