-
Course
- Security
Threat Modeling Methodologies
Threat modeling can inject more security into your software development lifecycle. This course will teach you all about the various threat modeling methodologies, their key elements, and how to choose the correct one for your specific application.
What you'll learn
Threat modeling is a growing field of interest for software architects, developers, and security professionals. In this course, Threat Modeling Methodologies, you’ll learn how to select the correct methodology. First, you’ll explore the various threat modeling approaches. Next, you’ll discover the different methodologies. Finally, you’ll learn how to pick the correct methodology for specific scenarios. When you’re finished with this course, you’ll have the skills and knowledge of thread modeling methodologies needed to apply the correct methodology in practice.
Table of contents
About the author
Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. Since 2004, he started specializing in pentesting complex and feature-rich web applications. Currently, he leads a global team of highly skilled and enthusiastic penetration testers as lead pentester.
More Courses by Peter