Course
digicode: THRMOD
Threat Modeling with STRIDE
Course facts
Download as PDF- Creating meaningful data flow diagrams with correctly defined trust boundaries for web, mobile, cloud, and IoT architectures
- Systematically identifying threats using STRIDE (per trust boundary)
- Prioritizing identified threats through a structured risk assessment, as well as selecting and documenting appropriate countermeasures
- Establishing and scaling a threat modeling program within your organization
Threat modeling is ideally applied as early as the design and architecture phase of modern systems. In this process, you analyze your architecture in a structured manner from an attacker’s perspective, identify potential threats early on, and detect security risks before they develop into actual vulnerabilities.
1 Fundamentals and Modeling
- What is Threat Modeling
- When and how often is modeling performed
- Who performs the modeling
- Integration into agile methodologies and DevSecOps
- Methodology Overview:
- Comparison of common approaches (STRIDE, PASTA, LINDDUN)
- Diagrams – «What are we building?»: Data flow diagrams (DFDs), trust boundaries, and practical exercises
- Identifying threats – «What could go wrong?»:
- STRIDE per trust boundary
- Practical STRIDE analysis of a cloud/IoT solution
2. In-depth analysis and rollout
- Countermeasures – «What are we doing about it?»: Proven mitigation patterns, risk prioritization, and tracking of open threats and assumptions made
- Threat modeling for AI systems
The course is designed to be consistently practice-oriented: the theoretical component is intentionally kept concise, while the focus is on guided exercises at the whiteboard. You will work in small groups throughout the course. Each phase of the threat modeling methodology follows a clear sequence consisting of theoretical input, practical application to realistic scenarios, and subsequent cross-group discussion and a collaborative sample solution. A variety of scenarios from web, cloud, IoT, critical infrastructure, and AI environments ensure broad practical relevance and a comprehensive understanding of threats.
Please bring your own laptop to the course.
Optional session on the second day: Application to a system you bring yourself, while maintaining confidentiality within the class.
This course is designed for professionals who want to apply or establish threat modeling in architecture, development, or security teams. Specifically, this includes:
- Security architects who design or review secure-by-design architectures
- Application security engineers, security champions, and experienced software developers who want to integrate threat modeling into agile development processes
- DevSecOps engineers and cloud architects
- Cyber policy and strategy planners, as well as information security officers, who are rolling out threat modeling as a management tool across the enterprise
Please bring your own laptop to the course.
Prerequisites for the course include a solid understanding of fundamental security concepts such as authentication, authorization, and encryption, as well as common types of vulnerabilities (e.g., the OWASP Top 10), similar to these courses: