Threat Modeling Course

Find, prioritize and mitigate cybersecurity threats using modeling techniques.

56 minutes

Course description

In this course, we will introduce students to threat modeling and examine four popular threat modeling methodologies: Microsoft STRIDE, the Process for Attack Simulation and Threat Analysis, the Operationally Critical Threat Assessment and Vulnerability Evaluation, and Trike. We will also explore the importance of incorporating threat modeling into the security architecture development process.


Attack Trees

Video - 00:15:00

Representing attacks against an information resource in a tree structure.
Trike Threat Modeling Methodology

Video - 00:05:00

An open-source, repeatable threat modeling methodology.
OCTAVE Threat Modeling Methodology

Video - 00:07:00

A look at the Operationally Critical Threat Assessment and Vulnerability Evaluation.
P.A.S.T.A. Threat Modeling Methodology

Video - 00:13:00

A look at the Process for Attack Simulation and Threat Analysis.
STRIDE Threat Modeling Methodology

Video - 00:09:00

Using Microsoft’s STRIDE mnemonic to find security problems.
Threat Modeling Methodologies

Video - 00:01:00

An introduction to the most popular threat modeling methodologies.
Threat Modeling and Security Architecture

Video - 00:03:00

Why is threat modeling a key component of security architecture?
Threat Modeling

Video - 00:03:00

Using a model to find, prioritize and mitigate security problems.

Meet the author

Luciana Obregon

I am the CEO & founder of BetterCyber Consulting, a cybersecurity company offering the same level of expertise and service as the "Big Four", but without the high cost and unnecessary frills, ensuring that all businesses can benefit from effective cybersecurity measures, regardless of their size or budget.

Before leaving corporate America, I held several cybersecurity positions, from operations to strategy and architecture, in Fortune 100 companies, such as PayPal Holdings, Inc. and Marathon Petroleum Corporation. I have a bachelor's degree in Telecommunications Engineering from the Airforce University in Argentina, a master's degree in Information Security Engineering from the SANS Technology Institute, and many cybersecurity certifications, including CISSP (Certified Information Systems Security Professional) and GSE (GIAC Security Expert).

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust