Learn how to identify, assess, and address threats in system design. Begin with an introduction to threat modeling, the Four-Question Framework, and advanced models like STRIDE, DREAD, and PASTA. You'll also map security requirements using the Requirements Traceability Matrix (RTM) and explore AI-driven threat modeling. Case studies and exercises are integrated throughout, with hands-on labs at the end for practical application.
Designed for developers, IT professionals, and the cybersecurity-curious, this course offers insights into strengthening software security with threat modeling techniques.
The key to a successful open technology project is to ensure a neutral playing field for all developers, technologists, and companies to collectively contribute to project evolution and growth. The Linux Foundation was built on the idea of the democratization of code and scaling adoption, for all projects equally. Expert legal and governance support programs ensure everyone is on the same playing field.