We may earn an affiliate commission when you visit our partners.
Alan Monnox

If you've seen the benefits of threat modeling in action and want to take this popular security approach to the next level, then this course will teach you how to plan, execute, and manage a threat modeling program at scale within your organization.

A successful threat modeling program will quantifiably improve the security of your organization's critical applications and business solutions.

In this course, Building and Leading an Effective Threat Modeling Program, you’ll gain the ability to plan, execute, and manage your own threat modeling program at scale within your organization.

Read more

If you've seen the benefits of threat modeling in action and want to take this popular security approach to the next level, then this course will teach you how to plan, execute, and manage a threat modeling program at scale within your organization.

A successful threat modeling program will quantifiably improve the security of your organization's critical applications and business solutions.

In this course, Building and Leading an Effective Threat Modeling Program, you’ll gain the ability to plan, execute, and manage your own threat modeling program at scale within your organization.

It doesn't take long to become a convert to the benefits of threat modeling, and I'm often being asked by companies how they can get more of their teams to adopt the practices.

Some of the major topics we will cover include preparing a compelling business case so you can secure the resources you need to get your program up and running, using a set of founding principles to guide all your decision making, creating an effective program plan structured around the dimensions of people, process, and technology, and finally, setting, monitoring, and managing key performance indicators so you can track the success of your program.

Before beginning this course, you should be familiar with some of the basic concepts of threat modeling, or otherwise, no previous modeling experience is required.

None.

Enroll now

What's inside

Syllabus

Course Overview
Preparing the Business Case
Founding Principles
Planning for Improvement
Read more
Measuring Success

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Designed for professionals who seek to lead threat modeling teams within organizations
Ideal for those involved in software security and risk management who want to advance their careers
Suitable for security architects, software engineers, and project managers who seek to improve the security of their organization's applications and systems
Relevant for individuals familiar with basic threat modeling concepts or those willing to invest time in gaining foundational knowledge
Teaches a systematic approach to threat modeling, from planning and execution to measurement and improvement
May require additional research or prior knowledge for those new to the subject

Save this course

Save Building and Leading an Effective Threat Modeling Program to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Building and Leading an Effective Threat Modeling Program with these activities:
Revise Threat Modeling Fundamentals
Review the fundamentals of threat modeling, including STRIDE concepts and modeling techniques.
Browse courses on Threat Modeling
Show steps
  • Read through materials on STRIDE threat modeling
  • Review examples of threat models to understand their structure and content
Show all one activities

Career center

Learners who complete Building and Leading an Effective Threat Modeling Program will develop knowledge and skills that may be useful to these careers:
Security Program Manager
A Security Program Manager plans, develops, and manages information security programs to protect an organization's data and systems. This role requires a deep understanding of security best practices and compliance regulations. By taking the course "Building and Leading an Effective Threat Modeling Program," you will gain the skills and knowledge necessary to effectively manage and implement a threat modeling program within your organization, which can be a valuable asset in this role.
Information Security Analyst
An Information Security Analyst is responsible for identifying and mitigating security risks within an organization. They need to have a strong understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" will provide you with the skills and knowledge necessary to identify and mitigate security risks within your organization, making you a more effective Information Security Analyst.
Security Architect
A Security Architect designs and implements security solutions to protect an organization's data and systems. They need to have a deep understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" will provide you with the skills and knowledge necessary to design and implement effective security solutions for your organization, making you a more effective Security Architect.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. They need to have a deep understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" will provide you with the skills and knowledge necessary to provide effective security advice and guidance to your clients, making you a more effective Security Consultant.
Risk Analyst
A Risk Analyst identifies and assesses risks to an organization's data and systems. They need to have a deep understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" will provide you with the skills and knowledge necessary to identify and assess risks to your organization's data and systems, making you a more effective Risk Analyst.
Compliance Analyst
A Compliance Analyst ensures that an organization's data and systems comply with applicable laws and regulations. They need to have a deep understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" will provide you with the skills and knowledge necessary to ensure that your organization's data and systems comply with applicable laws and regulations, making you a more effective Compliance Analyst.
Incident Responder
An Incident Responder investigates and responds to security incidents. They need to have a deep understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" will provide you with the skills and knowledge necessary to investigate and respond to security incidents, making you a more effective Incident Responder.
Penetration Tester
A Penetration Tester evaluates the security of an organization's data and systems by simulating attacks. They need to have a deep understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Penetration Tester.
System Administrator
A System Administrator installs, configures, and maintains an organization's data and systems. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a System Administrator.
Network Engineer
A Network Engineer designs, implements, and maintains an organization's network infrastructure. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Network Engineer.
Software Developer
A Software Developer designs, develops, and maintains software applications. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Software Developer.
Data Analyst
A Data Analyst collects, analyzes, and interprets data to identify trends and patterns. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Data Analyst.
Business Analyst
A Business Analyst analyzes business processes and identifies opportunities for improvement. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Business Analyst.
Project Manager
A Project Manager plans, executes, and closes projects. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Project Manager.
Technical Writer
A Technical Writer creates and maintains documentation for technical products and services. They need to have a good understanding of threat modeling and risk assessment techniques. The course "Building and Leading an Effective Threat Modeling Program" may provide you with some useful skills and knowledge for this role, but it is not specifically tailored to the needs of a Technical Writer.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Building and Leading an Effective Threat Modeling Program.
Is recommended to help prepare for this course. It provides background in threat modeling.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Building and Leading an Effective Threat Modeling Program.
Program Management: Executing Your Program Successfully
Performing Threat Modeling with the OCTAVE Methodology
Threat Modeling with the Microsoft Threat Modeling Tool
Enterprise-Wide Application Security
Requirements, Planning, Direction, and Review (C|TIA Prep)
Advanced Cybersecurity Concepts and Capstone Project
Executing a Team Iteration
Performing Threat Modeling with the PASTA Methodology
Analyzing Security Threats
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser