• Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Threat Modeling Methodologies

Threat modeling can inject more security into your software development lifecycle. This course will teach you all about the various threat modeling methodologies, their key elements, and how to choose the correct one for your specific application.

Peter Mosmans - Pluralsight course - Threat Modeling Methodologies
by Peter Mosmans

What you'll learn

Threat modeling is a growing field of interest for software architects, developers, and security professionals. In this course, Threat Modeling Methodologies, you’ll learn how to select the correct methodology. First, you’ll explore the various threat modeling approaches. Next, you’ll discover the different methodologies. Finally, you’ll learn how to pick the correct methodology for specific scenarios. When you’re finished with this course, you’ll have the skills and knowledge of thread modeling methodologies needed to apply the correct methodology in practice.

Table of contents

About the author

Peter Mosmans - Pluralsight course - Threat Modeling Methodologies
Peter Mosmans

Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. Since 2004, he started specializing in pentesting complex and feature-rich web applications. Currently, he leads a global team of highly skilled and enthusiastic penetration testers as lead pentester.

More Courses by Peter