Threat modelling is a process to identify security weaknesses in software design and architecture, and define countermeasures that mitigate the malicious effects of the discovered weaknesses Threat modelling is a process to identify security weaknesses in software design and architecture, and define countermeasures that mitigate the malicious effects of the discovered weaknesses before any code is cut.
Our training course is designed for software developers and architects in mind. Threat modelling is language-agnostic. It can be easily used for any software development project and with any modern workflow such as Agile or DevOps. The analysis work is done on the design of the software system in order to improve the quality of the code that will be delivered in-sprint.
You will learn how to address security design concerns faced by software development teams with a combination of teaching modules and practical threat model exercises. The participants will be encouraged to work in teams, to foster discussions on how to implement security controls for the modelled threats on their software architecture.
All key stakeholders in an Application Development workflow should know how to assess the weak points in their systems and what questions to ask. The course will provide a framework to assess these questions and will yield immediate beneficial results.
The JBI THREAT MODELLING FOR DEVELOPERS TRAINING COURSE uses the Rapid Threat Model Prototyping methodology (RTMP). RTMP enables a development team to seamlessly integrate threat modelling with existing Agile / DevOps workflows.
You will learn a practical overview of the necessary disciplines for resolving application architecture and design issues according to OWASP good security practices.
We aim to instill skills which allow you to perform rapid threat modelling in a Consistent, Repeatable and Measurable manner.
Security focused Developers and software architects.
The target audience for this course are developers and architects who have identified themselves as wanting to take on the role of security champion; they will probably have minimal experience in security risk assessments and threat modelling. The course will provide a strong baseline of knowledge in these areas.
08/02/2018: The need for increased application security is dramatically changing the way software is built – for the better. By prioritising security during...
22/01/2018: The new Global Data Protection Regulation (GDPR) promises to be the biggest change in corporate information security since the original Data...
15/01/2018: As 2018 gets under way, now is the perfect time to revisit the OWASP 2017 conference – and apply the best-practice guidelines discussed at the...
19/10/2017: A leading Financial Services organisation was keen to get several of its teams working consistently in an "Agile" way. Agile is an iterative...
13/10/2017: The BBC, who have a very substantial investment in technology, were keen to improve the quality of software development: to instil developers...
07/10/2017: This client was expanding its capability to deliver technical training across EMEA. It had recently acquired a large technology company which...
Bring a JBI course to your office
and train a whole team onsite
0800 028 6400 or request quote
0800 028 6400
Why JBI ?
"great technology tips"
"Access to exclusive content"
"Short course means less time off"
"Joined via web"
"Knowledgable sales staff"