Are you interested in being part of the wider roll out for Spark, our new AI-powered, learning chatbot? Register your interest here.
Home Specialist skills Security Threat Modelling : Designing Secure Systems Through Proactive Threat Analysis and Mitigation
Threat Modelling : Designing Secure Systems Through Proactive Threat Analysis and Mitigation
-
Understand the principles and benefits of threat modelling in software development
-
Create threat models based on system architecture and design
-
Identify and assess potential security threats and vulnerabilities
-
Prioritize risks to focus on the most critical security issues
-
Develop and apply effective mitigation strategies
-
Integrate threat modelling practices into ongoing development processes.
Overview
Off the shelf (OTS)
This course is designed for software developers, security engineers, and technical professionals who want to proactively identify and address security threats during the software development process. It is particularly relevant for those involved in designing and building secure applications.
Familiarity with basic software development concepts and some understanding of security principles is helpful but not mandatory.
The Threat Modelling for Developers Training Course provides a hands-on introduction to identifying, analyzing, and mitigating potential security threats in software applications. Participants learn structured approaches to threat modelling, including how to map system architecture, identify attack vectors, and prioritize risks. The course emphasizes integrating threat modelling into the development lifecycle to enhance security from the design phase. Practical exercises support the application of these techniques to real-world scenarios.
Key Topics Covered:
• Fundamentals of threat modelling and its role in software security
• Mapping system architecture and identifying assets
• Recognizing potential threats and attack vectors
• Risk assessment and prioritization of security issues
• Applying mitigation strategies and controls
• Integrating threat modelling into agile and DevOps workflows
The course is delivered over two days and includes practical exercises to reinforce learning.
Delivery method
Virtual
Course duration
14 hours
Competency level
Working

Delivery method
-
Virtual
Course duration
14 hours
Competency level
-
Working
