Threat modeler professional

  • Trainer: Marek Šottl
  • Level: Advanced
  • Recommended study time: 1 month 
  • Video time: 6+ hours
  • Final test (85 questions)
Write your awesome label here.
Write your awesome label here.
Threat modeler Professional

Prerequisites

This training is beginner-friendly and does not require prior threat modeling experience. However, to ensure participants can maximize their learning and apply the concepts effectively, the following foundational knowledge is recommended: 

  • Basic Understanding of Security Concepts – Familiarity with fundamental security principles such as confidentiality, integrity, availability (CIA), authentication, and authorization.
  • Experience with Software Development or Infrastructure Management – Some exposure to software development lifecycles, cloud architectures, or system administration is beneficial. 
  • Knowledge of Common Security Risks – Awareness of common vulnerabilities (e.g., OWASP Top 10, CWE, CVE) and security threats in modern applications and cloud environments. 
  • Familiarity with DevOps or CI/CD Processes – Understanding of automated deployment pipelines and cloud-native application development helps apply threat modeling in CI/CD contexts.
No prior threat modeling experience is required, as the course covers fundamental principles before advancing to specialized techniques. 
Write your awesome label here.
Threat modeler Professional

Who Should Attend?

This training is designed for professionals of all experience levels who want to build expertise in threat modeling, including: 

Empty space, drag to resize
  • Cloud Architects & Engineers – To identify and mitigate risks in cloud-native applications and infrastructure. 
  • Site Reliability Engineers (SREs) – To incorporate security into reliability and resilience planning. 
  • Security Engineers & Analysts – To enhance risk assessment and mitigation strategies.
  • DevOps & Platform Engineers – To integrate threat modeling into CI/CD pipelines for secure software delivery. 
  • Software Engineers & Developers – To proactively design secure software components and applications. 
  • Penetration Testers & Red Teamers – To use threat modeling for attack simulations and security assessments. 
  • Compliance & Risk Management Professionals – To align threat modeling with security governance and compliance frameworks.
  • Product Managers & Technical Leads – To understand and drive security-by-design principles in software and infrastructure.
Since the training includes hands-on exercises and practical scenarios, it is suitable for both beginners and experienced professionals looking to strengthen their threat modeling skills. The course is particularly valuable for professionals working in highly regulated industries (finance, healthcare, critical infrastructure) where proactive security assessment is essential. 

Additionally, startups and fast-moving development teams will benefit from templates and rapid prototyping techniques, enabling them to implement lightweight but effective threat modeling practices that support agile innovation without adding unnecessary complexity. 

What You’ll Learn: 

  • Threat Modeling Foundations – What it is, why it matters, and how to use it effectively.
  • Methodologies That Work – STRIDE, DREAD, PASTA, LINNDUN, and when to apply them.
  • Gamification & Hands-On Techniques – Learn with card games, rapid prototyping, and interactive tools.
  • Specialized Threat Modeling – Secure cloud, CI/CD pipelines, and software components with precision.
  • Tooling You Didn’t Know You Needed – Master OWASP Threat Dragon, Microsoft TMT, IRIUS Risk, and more.
  • Evaluating & Improving Models – Make threat models dynamic, effective, and continuously valuable.
  • Templates & Automation – Accelerate your threat modeling process with ready-to-use frameworks.
Empty space, drag to resize
💡  This isn’t just another security checkbox—this is how you build threat models that make a difference. 
🚀  Join us and turn threat modeling into one of your most powerful security tools.
Empty space, drag to resize
  • What is Threat Modeling, and how to use it.

  • Hands-on exercises based on real-world scenarios. 
  • Key elements of a threat model.

  • Evaluating the effectiveness of threat models and reassessing assumptions.
  • Overview of methodologies: STRIDE, DREAD, PASTA, and LINNDUN.

  • Using tools like OWASP Threat Dragon, Microsoft Threat Modeling Tool, IRIUS Risk. 
  • Gamification in Threat Modeling using card games and rapid prototyping tools.

  • Templates for rapid prototyping and advanced Threat Modeling. 
  • Specialized Threat Modeling for:
    • Cloud and infrastructure. 
    • Software components. 
    • CI/CD pipelines. 

  • What is Threat Modeling, and how to use it.

Join ADevSecOps and you won't regret it..

I’m Marek the CEO of HackiHub, a company that built the ADevSecOps. My objective with the platform is to simplify your learning and bring you the knowledge that I gained in the last 15 years in DevOps, SRE, Cloud security, and Principal engineering roles. Don't let learning be a pain with my engaging and interactive online courses designed with your success in mind. 
Write your awesome label here.
Created with