Threat modeling intensive

Our most popular course

For technology professionals looking to deliver secure systems, threat modeling is an essential skillset. Learn from Adam Shostack, who wrote the most popular book on the topic. May 10-14, 9AM-11 AM Pacific. Equivalent to a 2 day in-person course, 20 hours including classes and homework. Limited to 25 participants. Course enrollment is $3400.00.

Every participant recieves

printed and electronic copies of:

  • Slidebook (125 pages, spiral bound)

  • Elevation of Privilege game

  • Exercises booklet

  • Threat modeling stencil

  • Whiteboard sketchbook

Reviews

"One of the top professional development courses in my 35+ year career. - Charles F."

Course curriculum

  • 1

    Getting Ready (Work due by first class, May 10)

    • Preparing for Distributed Learning

    • Shipping Information

    • Exercises File (downloadable)

    • Welcome and Introduction

    • Learning Online

    • Welcome to Threat Modeling

      FREE PREVIEW
    • Slide Book (downloadable)

    • Syllabus (downloadable)

  • 2

    First Live Class

    • Monday May 10

  • 3

    What Are We Working On? (Due: second class)

    • The Question: What Are We Working On?

    • DFDs: Diagrams and Models

      FREE PREVIEW
    • Trust Boundaries (Introduction)

    • Exercises: DFD Essay + DFD Creation

    • Models Answer Key

    • Exercises: Trust Boundary Essay, Make Trust Boundaries Explicit

  • 4

    Second Live Class

    • Tuesday May 11

  • 5

    What Can Go Wrong? (Due: third class)

    • Sketching

    • DFDs in Depth

    • Boundaries In Depth

    • What Can Go Wrong? Brainstorming

    • STRIDE (Introduction)

    • Applying STRIDE

      FREE PREVIEW
    • Tracking Threats & Assumptions

    • Exercises: STRIDE Essay, Apply STRIDE

  • 6

    Third Live Class

    • Wednesday May 12

  • 7

    What Are We Going To Do About It? (Due: fourth class)

    • Tools in Context

    • Elevation of Privilege

    • Attack Trees

    • Final Tips & Recap: What Can Go Wrong

    • Mitigations

    • Strategies for Addressing Threats

    • Addressing Threats

    • Exercises: Design many controls, Design controls in depth, risk mitigation

    • Did We Do A Good Job?

    • Retrospectives

  • 8

    Fourth Live Class

    • Thursday May 13

  • 9

    Did We Do A Good Job? (Due: fifth class)

    • Introduction to Kill Chains

    • Applying the Kill Chain

    • "Act On Objectives" Stage of the Kill Chain

    • MITRE'S ATT&CK Kill Chain

    • Exercises: Kill Chain Essay, Kill Chain Applied

    • (optional) Kill Chain Cheat Sheet

    • (Optional) A Sense of Urgency

    • (Optional) Models of Change

    • (Optional) Managing "What We're Going to Do About it"

    • (Optional) Chess and Arms Races

    • Optional (Prioritization)

    • Exercise: End to End Threat Model

  • 10

    Fifth Live Class

    • Friday May 14

  • 11

    How Did We Do?

    • How Did We Do? Give us survey feedback

  • 12

    Bonus Content

    • Threat Modeling Lessons From Star Wars

    • Threat Modeling in 2020

    • The Threat Modeling Manifesto

Time until kickoff

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds