Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Modelling Threats - Strategies in Threat Modelling

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. In this course, you will develop a deep understanding of threat modeling methods and their real-world applications. You'll learn about different threat models, such as STRIDE, DREAD, and MITRE ATT&CK, and how to integrate them within the software development life cycle (SDLC). By the end, you'll be equipped with strategies to analyze and mitigate security risks effectively. The course walks you through the process of building and applying threat models, beginning with foundational concepts and advancing into complex areas like Attack Trees and Threagile. It includes practical hands-on activities with tools like Deciduous, OWASP Threat Dragon, and Microsoft Threat Model, ensuring that you gain both theoretical knowledge and practical experience. Ideal for professionals looking to enhance their cybersecurity skills, this course also benefits anyone interested in protecting systems from evolving threats. Whether you're a beginner in security or looking to deepen your threat modeling expertise, this course will guide you in developing a comprehensive approach to identifying and managing risks.

Syllabus

  • Introduction
    • In this module, we will explore the foundational concepts of threat modeling, laying the groundwork for understanding its significance in protecting systems. We will introduce key terms, practices, and why threat modeling is a critical step in cybersecurity.
  • Threat Modeling Methods and Types
    • In this module, we will dive into various threat modeling methods and types, exploring how frameworks like STRIDE and DREAD help identify and address potential security threats. We’ll also discuss their role in securing software development throughout the SDLC.
  • Advanced Threat Modeling
    • In this module, we will explore advanced threat modeling techniques, including Attack Trees and Threagile, and their applications in real-world scenarios. Additionally, we'll discuss how to implement continuous threat modeling and how it applies in cloud security contexts.
  • Dealing with the Findings
    • In this module, we will focus on how to effectively handle the risks identified through threat modeling. You will learn how to develop risk mitigation strategies, define security controls, and ensure that these controls are adapted as new threats emerge.
  • Conclusion
    • In this module, we will wrap up the course with a review of the core concepts and techniques introduced throughout. You will be encouraged to continue applying threat modeling methods to enhance your cybersecurity approach.
  • Hands-on Activities
    • In this module, we will give you practical experience with various threat modeling tools, helping you understand how to implement what you've learned. Hands-on activities will include using real-world platforms such as OWASP Threat Dragon, Deciduous, and Microsoft Threat Model.

Taught by

Packt - Course Instructors

Reviews

Start your review of Modelling Threats - Strategies in Threat Modelling

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.