Exceptional training for APP & InfO securitY

Threat Modelling for Developers Training Course

Learn how to identify Vulnerabilities and tackle them with Threat Models.

16 Sep London
request info

Capita Marks and Spencer Telefonica Cisco BBC Lloyds Sony

Threat Modelling for Developers training course (code: THREATMOD)


Threat modelling is a process to identify security weaknesses in software design and architecture, and define countermeasures that mitigate the malicious effects of the discovered weaknesses Threat modelling is a process to identify security weaknesses in software design and architecture, and define countermeasures that mitigate the malicious effects of the discovered weaknesses before any code is cut.
Our training course is designed for software developers and architects in mind. Threat modelling is language-agnostic. It can be easily used for any software development project and with any modern workflow such as Agile or DevOps. The analysis work is done on the design of the software system in order to improve the quality of the code that will be delivered in-sprint.
You will learn how to address security design concerns faced by software development teams with a combination of teaching modules and practical threat model exercises. The participants will be encouraged to work in teams, to foster discussions on how to implement security controls for the modelled threats on their software architecture.
All key stakeholders in an Application Development workflow should know how to assess the weak points in their systems and what questions to ask. The course will provide a framework to assess these questions and will yield immediate beneficial results.
The JBI THREAT MODELLING FOR DEVELOPERS TRAINING COURSE uses the Rapid Threat Model Prototyping methodology (RTMP).  RTMP enables a development team to seamlessly integrate threat modelling with existing Agile / DevOps  workflows.
You will learn a practical overview of the necessary disciplines for resolving application architecture and design issues according to OWASP good security practices.
We aim to instill skills which allow you to perform rapid threat modelling in a Consistent, Repeatable and Measurable manner.




Security focused Developers and software architects.

The target audience for this course are developers and architects who have identified themselves as wanting to take on the role of security champion; they will probably have minimal experience in security risk assessments and threat modelling. The course will provide a strong baseline of knowledge in these areas.



• The main recipients for the course are security subject-matter experts,  technical non-security professionals who have no/little experience of threat modelling (e.g. software devs, architects and engineers) and technically-oriented project leaders.
• The purpose of the course is to deliver the concept of threat modelling and to be able to complete a basic threat model using the Rapid Threat Model Prototyping methodology.
• By the end of the course, the class will understand threats, mitigations and risk rankings and will be able to use basic threat modelling techniques to drastically improve secure design of software.
• The course will enable participants to integrate RTMP into any software development process.
Threat modelling 101
• Overview of secure SDLC
• How Threat Modelling fits into a secure SDLC
• How Agile Architecture fits in
• Introduction to several common security classification systems
• What are STRIDE and OWASP Top 10
• Mini Lab - mapping system relationships
• Defining elements of software that are security concerns
• Threat Model types
• Traditional threat model process and its shortcomings
• The importance of context diagrams to threat modelling and reusing existing software designs
• Dependencies
• Mini Lab - discovering dependencies
Rapid Threat Model Prototyping 201
• Pareto Rule (80/20 ratio) and use in secure software development
• Introduction to the Rapid Threat Model Prototyping methodology
• Elements of a threat model
• How to integrate RTMP in an Agile/DevOps process
• Zones of Trust and using Zone rules to find threats
• Adding Zone and threat metadata to a software diagram
• Mini Lab - applying Zone rules
• Mitigation analysis
• Mini Lab - discovering mitigations
• Validation and triaging of results in an Agile/DevOps process
• Lab – full threat model of an internal system
Rapid Threat Model Prototyping 301
• How to convert risks into backlog items that are prioritised accordingly (e.g. into Jira, MS DevOps or similar workflow systems)
• Examples and open conversation of threat models that you have from the real world, starting with simple systems and building up to more complicated systems
• How to use RTMP to quickly highlight flows/processes/etc that are high risk
• Advanced techniques using calculation of the RTMP elements. Formulae are outlined and broken down for comprehension.
• Discussion around how to implement a good security champion program to drive deep adoption of Rapid Threat Model Prototyping across the software development lifecycle.
• Use of RTMP in other parts of a business.
  1. Overview of secure SDLC
  2. How Agile Architecture fits in
  3. Introduction to several common security classification systems
  4. Defining elements of software that are security concerns
  5. Threat Model types
  6. Traditional threat model process
  7. Dependencies
  8. Rapid Threat Model prototyping process
  9. Zones of trust
  10. Using Zone rules to find threats
  11. How to quickly classify threats
  12. Mitigation analysis
  13. Validation and triaging of threats
  14. Lab – threat modelling an internal system

Receive the latest version of this course into your inbox


16th Sep 2019 - 2 days £1500

see all dates


Show Discount for this course


  Bring a JBI course to your office
  and train a whole team onsite
  0800 028 6400
or request quote

  You can customise this course to
  suit your exact needs here
  0800 028 6400 or request quote

0800 028 6400

Why JBI ?

►"great technology tips"
► "Access to exclusive content"
► "Short course means less time off"

►"Inspiring trainers"
► "Joined via web"
► "Knowledgable sales staff"

Get exclusive news about upcoming programs, technical insights & special offers