Current Status
Pre-order
Price
$499.00
Get Started
This course is currently closed

Threat Modeling and Attack Trees

Today, cybersecurity threats are more sophisticated than ever. Mastering the art of threat modeling and attack tree analysis is essential for security professionals at all levels. This 40-hour Self-Paced Course is designed to provide you with a deep understanding of threat modeling frameworks and tools, along with practical lab sessions to apply your knowledge in scenarios pulled from real-world events.

This course applies equally to cybersecurity experts, aspiring security professionals, and software and system developers.

What You Will Learn:

  • How to apply various threat modeling frameworks to identify and assess potential threats.
  • Effective use of the Microsoft Threat Modeling Tool, including advanced customization techniques.
  • Building comprehensive attack trees and leveraging the MITRE ATT&CK framework.
  • Practical skills in risk scoring using CVSS and OWASP methodologies.
  • Interactive learning through the Elevation of Privilege Game to solidify your understanding of threat modeling concepts.

Course Format:

  • 20 Hours of In-Depth Lectures covering theoretical aspects of threat modeling and attack tree development.
  • 20 Hours of Hands-On Lab Work where you’ll apply what you’ve learned to real-world scenarios using leading tools like the Microsoft Threat Modeling Tool and OWASP Threat Dragon.
Threat model with target reticle

This course offers a comprehensive exploration of key topics, including:

DFD icon

Threat Modeling Frameworks

Gain insights into various frameworks that provide the foundation for structured threat identification and analysis.

Microsoft tool

Microsoft Threat Modeling

Learn how to effectively use Microsoft’s threat modeling approach, including the Microsoft Threat Modeling Tool basics.

Categorization Diagram

Categorization Tools

Understand how to categorize and prioritize threats using industry-standard tools. like STRIDE and DREAD

Scenario Icon

Scenario and Diagram Development

Develop skills in creating detailed scenarios and diagrams that visualize potential security risks.

Microsoft TMT customization

Microsoft Threat Modeling Tool Customization

Explore advanced customization options to tailor the Microsoft Threat Modeling Tool to your specific needs.

Threat dragon icon

OWASP Threat Dragon

Discover how to leverage OWASP’s open-source threat modeling tool to enhance security assessments.

Dos Attack icon

Attack Tree Development

Learn to build attack trees that break down potential threats into manageable components, making it easier to design countermeasures.

MITRE icon

MITRE ATT&CK Framework

Integrate the MITRE ATT&CK framework into your threat modeling process to map out potential attacker behavior.

scoring icon

CVSS Scoring and Customization

Master the Common Vulnerability Scoring System (CVSS) and learn how to customize it for accurate risk assessment.

OWASP Risk Scoring

Apply OWASP’s risk scoring methodologies to prioritize security measures effectively.

Hands on Labs and Exercises

Refine and reinforce learning through labs and exercises that apply learning concepts in fun and exciting ways

DFD icon

Elevation of Privilege Game

This interactive card game is designed to teach the fundamentals of threat modeling in a fun and engaging way.