Useful Links
Computer Science
Cybersecurity
Threat Modeling
1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
Scaling a Threat Modeling Program
Creating a Center of Excellence
Governance Structures
Best Practice Sharing
Standards Development
Training and Evangelism
Training Programs
Basic Threat Modeling Training
Advanced Techniques
Awareness Campaigns
Building Security Culture
Developing Templates and Playbooks
Standardized Processes
Reusable Artifacts
Common Threat Libraries
Metrics and Program Management
Program Maturity Assessment
Success Metrics
Continuous Improvement
Previous
9. Tooling and Automation
Go to top
Back to Start
1. Introduction to Threat Modeling