Skip to main content

Home Specialist skills Security Threat Modelling : Designing Secure Systems Through Proactive Threat Analysis and Mitigation

Threat Modelling : Designing Secure Systems Through Proactive Threat Analysis and Mitigation

  • bullet point
    Understand the principles and benefits of threat modelling in software development
  • bullet point
    Create threat models based on system architecture and design
  • bullet point
    Identify and assess potential security threats and vulnerabilities
  • bullet point
    Prioritize risks to focus on the most critical security issues
  • bullet point
    Develop and apply effective mitigation strategies
  • bullet point
    Integrate threat modelling practices into ongoing development processes.

Overview

Off the shelf (OTS)

This course is designed for software developers, security engineers, and technical professionals who want to proactively identify and address security threats during the software development process. It is particularly relevant for those involved in designing and building secure applications.

Familiarity with basic software development concepts and some understanding of security principles is helpful but not mandatory.

The Threat Modelling for Developers Training Course provides a hands-on introduction to identifying, analyzing, and mitigating potential security threats in software applications. Participants learn structured approaches to threat modelling, including how to map system architecture, identify attack vectors, and prioritize risks. The course emphasizes integrating threat modelling into the development lifecycle to enhance security from the design phase. Practical exercises support the application of these techniques to real-world scenarios.

Key Topics Covered:
• Fundamentals of threat modelling and its role in software security
• Mapping system architecture and identifying assets
• Recognizing potential threats and attack vectors
• Risk assessment and prioritization of security issues
• Applying mitigation strategies and controls
• Integrating threat modelling into agile and DevOps workflows

The course is delivered over two days and includes practical exercises to reinforce learning.

Delivery method
Virtual icon

Virtual

Course duration
Duration icon

14 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • Virtual icon

    Virtual

Course duration
Duration icon

14 hours

Competency level
  • Working icon

    Working

chatbotSpark login