• Online, Self-Paced
Course Description

Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. In this course, you will learn how to quickly create a basic threat model for your application scenario that can be used to help refine application design through all stages of development and serve as a central reference among teams. Additionally, this course will introduce the five steps of the threat modeling process and the tasks performed in each step while teaching learners how to adapt the process to their own situation.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Identify and evaluate application threats and vulnerabilities
  • Create a basic threat model for application scenarios
  • Identify the five steps of the threat modeling process
  • Describe the tasks performed in each step
  • Adapt the process to the organization’s needs

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.