Exceptional training for software & Information security professionals

Threat Modelling for Developers Training Course

NEXT COURSE
7 Jan London
request info

Capita Marks and Spencer Telefonica Cisco BBC Lloyds Sony

Threat Modelling for Developers training course (code: THREATMOD)

Learn how to identify Vulnerabilities and tackle them with Threat Models.


SEE MORE COURSES IN THIS CATEGORY

TRAINING COURSE OVERVIEW

Threat modelling is a procedure for optimizing security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system.

Our threat modelling training course is designed for software developers in mind. Having said that, Threat modelling is completely language agnostic.  The programming language will not be used to make any decisions whatsoever for the threat model.  

Our course will teach you how to address security concerns faced by developers by performing multiple Threat Models on typical inhouse Applications, and enabling a discussion between participants on the best way to execute them. It is key that all key players in an Application Development workflow know what questions to ask (or should be asked), and more importantly, what is the ‘measurable difference’ between teams that have performed Threat Models vs teams that have pushed products/services into production without evaluating its security profile and risks

Integrating threat modelling with existing Agile / DevOps / Continuous Integration developer workflows will require some modification of the current processes. Threat modelling training provides a detailed overview of the necessary disciplines, and how to identify and resolve application architecture / design security issues according to OWASP best practice

We aim to instill skills which allow you to perform threat modelling in a Rapid, Repeatable and  Measurable manner

 

AUDIENCE

Security minded Developers

DETAILHIGHLIGHTS

  1. Overview of secure SDLC
  2. How Agile Architecture fits in
  3. Introduction to several common security classification systems
  4. Defining elements of software that are security concerns
  5. Threat Model types
  6. Traditional threat model process
  7. Dependencies
  8. Rapid Threat Model prototyping process
  9. Zones of trust
  10. Using Zone rules to find threats
  11. How to quickly classify threats
  12. Mitigation analysis
  13. Validation and triaging of threats
  14. Lab – threat modelling an internal system
  1. Overview of secure SDLC
  2. How Agile Architecture fits in
  3. Introduction to several common security classification systems
  4. Defining elements of software that are security concerns
  5. Threat Model types
  6. Traditional threat model process
  7. Dependencies
  8. Rapid Threat Model prototyping process
  9. Zones of trust
  10. Using Zone rules to find threats
  11. How to quickly classify threats
  12. Mitigation analysis
  13. Validation and triaging of threats
  14. Lab – threat modelling an internal system
Receive the latest version of this course into your inbox


PUBLIC COURSES (LONDON, UK)
 

7th Jan 2019 - 2 days £1500
Book

see all dates


X

Show Discount for this course


PRIVATE COURSES


  Bring a JBI course to your office
  and train a whole team onsite
  0800 028 6400
or request quote


  You can customise this course to
  suit your exact needs here
  0800 028 6400 or request quote


Get in touch
0800 028 6400




Excellent feedback, consistently !

►"great tips help reduce build times"
► "we got access to exclusive content"
► "Short course meant less time off"

►"what an inspiring trainer !"
► "colleagues at 2 sites joined via web"
► "I passed my exam the next day"


Newsletter ! Get exclusive news about upcoming programs, technical insights & special offers