• Online, Self-Paced
Course Description

Whether you're a developer, executive, ethical hacker, or just have an avid interest in protecting yourself: You cannot protect something unless you understand what you're protecting it from. In this course, Threat Modeling: The Big Picture, you'll be provided with a high-level overview of the ins and outs of threat modeling. First, you'll cover what threat modeling is and how it can be used to identify the types of attacks you might vulnerable to. Next, you'll explore how to use that information to ensure you are protecting yourself. Finally, you'll learn of potential challenges that you may face when attempting to use threat modeling for your day to day activities, projects or environments. When you're finished with this course, you'll have a foundational understanding of threat modeling that will help you strategically identify opportunities for attack, and then use that information to ensure that your applications and environments are protected.

Learning Objectives

  • The Power of Threat Modeling
  • Threat Modeling Tools
  • Improving Application Security with Threat Modeling
  • Expected Challenges

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.