Application Security: Threat Modeling
Prevent vulnerabilities before they occur. In this training, you’ll learn how to systematically identify, analyze, and address security risks and potential threats early on – as an integral part of your development process.
Security by design
Security incidents and data breaches make headlines daily. Yet most vulnerabilities don’t arise from malice, but because security is considered too late in the development process. Threat modeling helps you prevent that.
With threat modeling, you’ll learn to identify and mitigate risks systematically before they reach production. Together with your team, you’ll map out the boundaries of your software and its security, uncover where vulnerabilities can arise, and determine which measures will be most effective.
This is a hands-on, team-based training. You’ll work with a structured approach to assess your own system from a “hacker’s” perspective. The focus is on collaboration: threat modeling is a multidisciplinary process in which developers, testers, security specialists, and product owners work together to create the most complete picture of potential threats.
🕐 Duration: 4 hours (hands-on session)
👥 Audience: Developers, testers, security specialists, architects, and product owners — multidisciplinary collaboration is essential
What you’ll learn
In this interactive training, you’ll combine theory with practical application. You won’t just learn what threat modeling is, but how to apply it effectively in your own software development. As a team, you’ll learn:
- What threat modeling is and how to embed it in your development process
- How to identify vulnerabilities in a pragmatic and effective way
- How to prioritize and define targeted solutions
- Which other shift-left principles you can adopt alongside threat modeling
- How to apply insights from Application Security Fundamentals (optional)
You’ll practically map out the software and security boundaries of an application. Then you’ll identify vulnerabilities, prioritize them, and formulate concrete mitigations. By the end of the training, your team will have a clear overview of the risks and the knowledge to address them structurally.
Embedding security from the start
After this training, you’ll not only be able to detect threats but also prevent them. You’ll learn to apply threat modeling as a structural part of your development process, laying the foundation for secure software from design to implementation.
Interested? We will contact you shortly.
Interested? Talk to Esther about it!
More training courses
-
Application Security: Fundamentals
Understand the basics of secure software development. In this one-day, hands-on training, you’ll learn how to apply the OWASP Top 10 and API Security Top 10 to identify vulnerabilities, minimize risks, and make your software structurally more secure. -
Application Security: Deep Dive
Embed security structurally into your software development. In this one-day hands-on training, you’ll dive deeper into security testing, code analysis, and the risks of AI tools, enabling a security-first approach throughout the entire software development lifecycle.