Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.


Course Summary

The HEAVENS training course is designed to help students understand the HEAVENS security model. Safety and Security are two seemingly contradictory system features, which have challenged researchers for decades. Traditionally, these two features have been treated separately, but due to the increasing knowledge about their mutual impacts, similarities, and interdisciplinary values, they have become more important. The HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS) security model analyzes threats based on Microsoft's STRIDE approach and ranks the threats based on a risk assessment.

The course begins with a discussion of the HEAVENS model and then compares the model to other models such as SAHARA. Next, the course covers threat analysis using STRIDE. The course concludes with a discussion on how to transition threat modeling output to the HEAVENS format and concludes with several case studies and exercises.

Learn about the HEAVENS security model and how to transition output to HEAVENS format.
Any technical professional looking to align existing processes for functional safety with usability for non-security specialists.
Business Analyst - Project Manager - Software Developer - System Administrator - Technical Manager - Web Developer
Skill Level
Learning Spikes
1 Day
Related Technologies
Design Patterns | Testing


Productivity Objectives
  • Describe the HEAVENS security model
  • Compare and Contrast HEAVENS model to other models
  • Evaluate how to transition outputs to HEAVENS

What You'll Learn:

In the HEAVENS training course, you'll learn:
  • Introduction to HEAVENS
    • What is the HEAVENS security model?
    • Background
  • Approaches to Security Modeling
    • How is HEAVENS used to model threats to automate security?
    • Comparison with other security models (e.g., SAHARA)
    • Workflow
  • Threat Analysis
    • STRIDE and security attributes
    • Threats and vulnerabilities
  • Risk Assessment
    • Threat Level (TL)
    • Impact Level (IL)
    • Security Level (SL)
  • Security Requirements
  • Heavens Security Model and Common Criteria
  • How to Transition Threat Modeling Output to HEAVENS
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”


Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.