The Threat Model: A Key to Your Security
Would you rather call the fire brigade to put out your burning house, or prevent the fire from happening in the first place? We believe that prevention is better than cure. We also believe that security begins with a comprehensive risk analysis and ends with continuous monitoring and training. A proven method for achieving this is Threat Modelling. This training will show you how to use Threat Modeling to design and implement security solutions in the most optimal way.
After this training, you will:
- Understand the principles of security, in relation to the Security Development Life Cycle
- Learn how to use the Threat Model as the basis for Secure Development
- Apply and utilize the Threat Model in your own projects
- Implement Continuous Security with the Threat Model
Security is becoming more and more important in IT. And for a good reason, because as digitization progresses, there is also more and more to protect. A firewall is helpful, but not enough. Security matters at all levels (organization, process, system, applications, network components), and it can be hard to decide which actions are most effective for ensuring security.
We believe that preventing problems is better than solving them. We also believe that security starts with a thorough risk analysis and ends with continuous monitoring and training. Threat modelling is the solution to the question of how to create concrete security requirements, stories and acceptance criteria for the technical scope of a project. In this training, we will teach you what Threat Modelling is and how you can use it to design and deploy security measures as efficiently and effectively as possible
Who should attend this training?
Everybody involved in developing and maintaining IT systems.
Roles of participants in their organization
This training is meant for:
- CIO’s
- IT-managers
- Development managers
- Developers
- Analysts
- Testers
- DevOps engineers
Prior knowledge or training
No prior knowledge or training required.
Structure of this training
The training lasts half a day, packed with hands-on knowledge and exercises.
Course outline
In half a day, you will learn how the Threat Model forms the foundation of security within your organization and how to implement this model:
- Security Aspects
- Security Measures
- Security Development Life Cycle
- Threat Model
- Interpretation
- Application
- Maintenance and feedback loop
- Threat Model in your daily practice
Possibilities in-house training
Improve provides this training in-house and tailored to your specific situation and needs upon request. For more information, please contact us at +31 (0)40 – 202 1803 or training@improveqs.nl.
Training information
- Location and dates: check the training calender
- Schedule: 13:00 – 17:00 (half a day)
- Fee: € 695, excluding VAT
- Includes coffee, tea, lunch and training material
- Three months free e-coaching
For more information, please contact us at +31 (0)40 – 202 1803 or training@improveqs.nl
Improve also offers bespoke in-house training tailored to your specific requirements and needs upon request.
Your trainers are:
- Patrick Duisters
- Marco de Groot
- Pieter Withaar