Threat Modeling Professional
Threat Modeling Professional by Practical DevSecOps
Your Instructor
Learn DevSecOps from Industry experts with practical, hands-on training in our state of the art online lab and achieve your DevSecOps Certification.
Course Curriculum
Introduction
Available in
days
days
after you enroll
Chapter 1: Threat Modeling Overview
Available in
days
days
after you enroll
-
StartWhat is Threat Modeling? (10:35)
-
Start[Quiz] What is Threat Modeling?
-
StartThe Threat Model Parlance (17:16)
-
Start[Quiz] The Threat Model Parlance
-
PreviewSecurity is a Balancing Act (7:43)
-
StartDesign Flaws and Risk Rating (2:57)
-
StartWhy Threat model? (5:19)
-
StartOther Security Practices (4:57)
-
StartThreat Modeling Frameworks and Methodologies (1:18)
-
StartIntroduction To List Centric Threat Modeling (2:08)
-
StartIntroduction To Asset Centric Threat Modeling (3:10)
-
StartIntroduction To Software Centric Threat Modeling (2:41)
-
StartIntroduction To Attacker Centric Threat Modeling (1:53)
-
Start[Quiz] Frameworks and Methodologies
-
PreviewTrust Boundaries vs. Attack Surfaces (3:08)
-
Start[Quiz] Trust Boundaries vs. Attack Surfaces
-
StartModern Threat Modeling (14:32)
-
Start[Quiz] Modern Threat Modeling
-
StartRisk Management Strategies (6:12)
-
StartAvoiding Risks (3:01)
-
StartMitigating Risks (3:06)
-
StartAccepting Risks (3:11)
-
StartTransferring Risks (1:43)
-
StartIgnoring Risks (1:02)
-
Start[Quiz] Risk Management Strategies
-
StartSummary (0:47)
-
Start[DevSecOps-labs] Getting Started With Labs
-
Start[DevSecOps-labs] Linux Basics
-
Start[Feedback] Share Your Feedback for Chapter 1
Chapter 2: Threat Modeling Basics
Available in
days
days
after you enroll
-
StartThreat Modeling and Security Requirements (2:56)
-
StartThreat Modeling vs Threat Rating (1:03)
-
StartDiagramming for Threat Modeling (8:53)
-
Start[Quiz] Diagramming for Threat Modeling
-
StartList Centric Threat Modeling (3:50)
-
StartExploring the STRIDE Model (10:15)
-
Start[Quiz] Exploring the STRIDE Model
-
StartPros and Cons of STRIDE (1:23)
-
StartSTRIDE Defenses (6:47)
-
Start[Quiz] STRIDE Defenses
-
StartSTRIDE Threat Examples (5:35)
-
StartAsset Centric Threat Modeling (2:31)
-
StartAttack Trees (1:15)
-
PreviewAttack Tree Analysis (7:22)
-
StartAttacker Centric Threat Modeling (5:52)
-
StartUsing MITRE ATT&CK for Attacker Centric Threat Modeling (1:42)
-
StartSoftware Centric Threat Modeling (6:08)
-
Start[Quiz] Software Centric Threat Modeling
-
StartOther Threat Modeling Methodologies (5:26)
-
StartGamified Threat Modeling Approaches (1:28)
-
StartVisual Card Games (2:03)
-
StartAdversary Card Games (4:48)
-
Start[Quiz] Gamified Threat Modeling Approaches
-
StartIntroduction to Threat Rating (4:07)
-
StartOWASP Risk Rating Methodology (3:26)
-
StartBug Bar (2:19)
-
StartRapid Risk Assessment (4:32)
-
Start[Quiz] Introduction to Threat Rating
-
StartSummary (0:49)
-
Start[DevSecOps-labs] Getting Started With Threat Modeling
-
Start[Feedback] Share Your Feedback for Chapter 2
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.