partner-offering-banner.png

Practical Threat Modeling

HandsOn-Training

Select

Threat Modeling is considered as one of the most effective ways to reduce the risk and increase the security of applications and systems of any kind (PC, Mobile, Web, Server/Cloud, Embedded, IoT, Automotive, Aviation, Medical, etc.). As a structured process, it can be used to help to identify potential threats, attacks, vulnerabilities, and countermeasures that could impact your applications. Whether you're a developer, executive, security engineer, or just interest in protecting your product, this training is for you! You cannot protect something unless you understand what you're protecting it from. In this hands-on training, you'll be the ins and outs of Threat Modeling.

In this hands-on training, you'll be the ins and outs of Threat Modeling: • What Threat Modeling is? • The pros and cons are of common Threat Modeling methodologies. • How to choose the best Threat Modeling methodology suited for you. • How to perform the generic ...

Threat Modeling is considered as one of the most effective ways to reduce the risk and increase the security of applications and systems of any kind (PC, Mobile, Web, Server/Cloud, Embedded, IoT, Automotive, Aviation, Medical, etc.). As a structured process, it can be used to help to identify potential threats, attacks, vulnerabilities, and countermeasures that could impact your applications. Whether you're a developer, executive, security engineer, or just interest in protecting your product, this training is for you! You cannot protect something unless you understand what you're protecting it from. In this hands-on training, you'll be the ins and outs of Threat Modeling.

In this hands-on training, you'll be the ins and outs of Threat Modeling: • What Threat Modeling is? • The pros and cons are of common Threat Modeling methodologies. • How to choose the best Threat Modeling methodology suited for you. • How to perform the generic Threat Modeling process. • How Threat Modeling can be used to identify attacks that your products might be vulnerable to? • How to successfully draw architecture diagrams for Threat Modeling. • How to use Threat Modeling outcome to ensure you your product is secured. • What are the challenges and pitfalls you might face when attempting to use Threat Modeling and how to work around those. • How to successfully apply Threat Modeling in your day-to-day activities, projects, or environments. The techniques we discuss are applicable to all system types (mobile, , web, embedded systems, IoT, cloud, etc.)

Key Features

  • How to choose the best Threat Modeling methodology suited for you.
  • How to perform the generic Threat Modeling process. How to successfully draw architecture diagrams for Threat Modeling.
  • How to use Threat Modeling outcome to ensure you your product is secured.
  • How to successfully apply Threat Modeling in your day-to-day activities, projects, or environments.

Offering Brief

Offering Brief

Device Family Arria® 10 SX SoC FPGA, Cyclone® IV GX FPGA, Agilex® 5 FPGAs and SoC FPGAs E-Series, MAX® 10 FPGA, Cyclone® V SX SoC FPGA, Arria® V GZ FPGA, Agilex® 9 FPGAs and SoC FPGAs Direct RF-Series, MAX® V CPLD, Agilex® 7 FPGAs and SoC FPGAs I-Series, Arria® V SX SoC FPGA, Stratix® 10 DX FPGA, Stratix® 10 SX SoC FPGA, Agilex® 7 FPGAs and SoC FPGAs M-Series, Cyclone® V GT FPGA, Arria® 10 GT FPGA, Arria® V ST SoC FPGA, Arria® 10 GX FPGA, Stratix® 10 TX FPGA, Cyclone® V SE SoC FPGA, Stratix® IV E FPGA, Stratix® IV GX FPGA, Arria® V GX FPGA, Cyclone® V E FPGA, Agilex® 3 FPGAs and SoC FPGAs C-Series, Cyclone® V GX FPGA, Stratix® V GS FPGA, Stratix® V GX FPGA, Cyclone® V ST SoC FPGA, Agilex® 5 FPGAs and SoC FPGAs D-Series, Stratix® 10 GX FPGA, Arria® V GT FPGA, Cyclone® 10 LP FPGA, Agilex® 7 FPGAs and SoC FPGAs F-Series, Cyclone® 10 GX FPGA, Stratix® 10 AX SoC FPGA, Cyclone® IV E FPGA, Stratix® III FPGA
Offering Status Production
Prerequisites None
Languages English
Target Audience FPGA, embedded software and system engineers
Hands On Lab False

Course book

lab's handbook

Documentation & Resources

Market Segment and Sub-Segments