Building and Leading an Effective Threat Modeling Program
Offered By: Pluralsight
Course Description
Overview
Understand the benefits of threat modeling and take this popular security approach to the next level. This course will teach you how to plan, execute, and manage a threat modeling program at scale within your organization.
A successful threat modeling program will quantifiably improve the security of your organization's critical applications and business solutions. In this course, Building and Leading an Effective Threat Modeling Program, you’ll gain the ability to plan, execute, and manage your own threat modeling program at scale within your organization. First, you’ll learn how to prepare a compelling business case to get your program underway. Next, you’ll discover how to create an effective program plan, structured around the dimensions of people, processes, and technology. Finally, you’ll explore how to effectively manage and monitor your program to ensure it delivers ongoing successful results. When you’re finished with this course, you’ll have the skills and knowledge necessary to build and lead your own effective threat modeling program. Software required: none.
A successful threat modeling program will quantifiably improve the security of your organization's critical applications and business solutions. In this course, Building and Leading an Effective Threat Modeling Program, you’ll gain the ability to plan, execute, and manage your own threat modeling program at scale within your organization. First, you’ll learn how to prepare a compelling business case to get your program underway. Next, you’ll discover how to create an effective program plan, structured around the dimensions of people, processes, and technology. Finally, you’ll explore how to effectively manage and monitor your program to ensure it delivers ongoing successful results. When you’re finished with this course, you’ll have the skills and knowledge necessary to build and lead your own effective threat modeling program. Software required: none.
Taught by
Alan Monnox
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network