Simple play icon Course

Building and Leading an Effective Threat Modeling Program

by Alan Monnox

If you've seen the benefits of threat modeling in action and want to take this popular security approach to the next level, then this course will teach you how to plan, execute, and manage a threat modeling program at scale within your organization.

What you'll learn

A successful threat modeling program will quantifiably improve the security of your organization's critical applications and business solutions.

In this course, Building and Leading an Effective Threat Modeling Program, you’ll gain the ability to plan, execute, and manage your own threat modeling program at scale within your organization.

  • First, you’ll learn how to prepare a compelling business case to get your program underway.
  • Next, you’ll discover how to create an effective program plan, structured around the dimensions of people, processes, and technology.
  • Finally, you’ll explore how to effectively manage and monitor your program to ensure it delivers ongoing successful results.
When you’re finished with this course, you’ll have the skills and knowledge necessary to build and lead your own effective threat modeling program. Software required: none.

Course FAQ

Who is this course for?

It doesn't take long to become a convert to the benefits of threat modeling, and I'm often being asked by companies how they can get more of their teams to adopt the practices.

What will I learn in this course?

Some of the major topics we will cover include preparing a compelling business case so you can secure the resources you need to get your program up and running, using a set of founding principles to guide all your decision making, creating an effective program plan structured around the dimensions of people, process, and technology, and finally, setting, monitoring, and managing key performance indicators so you can track the success of your program.

What prerequisites do I need?

Before beginning this course, you should be familiar with some of the basic concepts of threat modeling, or otherwise, no previous modeling experience is required.

What software is required?


About the author

Alan is the Lead Architect for the cyber security company Reveille Security. He is also the author of the book Rapid J2EE Development published by Prentice Hall. Alan’s tenure in the IT industry goes back over several decades and during that time he has been fortunate to work on many large-scale systems for a range of business-sectors and industries, including energy, finance, retail and healthcare. His core skills are in information security, solution architecture, and systems integration. Much... more

Ready to upskill? Get started