Agile Threat Modeling
The Netherlands
Think like a hacker to prevent a hack. Join our one-day Agile Threat Modeling training and learn how to recognize vulnerabilities, protect your software, and map risks the Agile way. Developers, testers, architects — this one is for you!
Download training guideAny questions?
Michiel will gladly help you further with any personal or in-company needs you might have.
Get in touchWhat will you learn?
In today’s fast-paced digital landscape, we can’t emphasize the importance of security enough. Whether you’re a developer, tester, or architect, understanding and implementing powerful security measures is not an option; it’s a necessity. And that is where our one-day Agile Threat Modeling training comes in.
This training — a blend of theoretical know-how and practical experience — is your gateway to finding vulnerabilities and strengthening your software against potential threats. It’s about diving deep into the mindset of hackers to understand their strategies, methodologies, tactics, and techniques, enabling your organization to stay one step ahead.
Key takeaways
- Adopt a hacker mindset for proactive protection.
- Identify risks at every development stage.
- Prioritize and mitigate potential threats.
- Create security-focused User Stories.
- Grasp a wide range of vulnerabilities, including OWASP’s top 10.
- Boost your skills and career prospects!
Program
Master the art of proactive protection in just one day! You will learn to safeguard your software by uncovering vulnerabilities and recognizing and managing security risks. We will dive deep into hacker thinking and explore various ways to identify risks and mitigate potential threats.
- Identify security risks: How do you spot risks during the transition from Epic to User Stories and during each refinement phase?
- Prioritize risks and mitigate measures: Learn to assess the magnitude of any risk.
- Be proactive: Create Security User Stories and include them in the backlog.
- Types of risks: We will study a wide range of common threats, including OWASP’s top 10.
Who is it for?
This training is designed for developers, testers, product owners, software architects, and anyone involved in software development and delivery. Whether you are interested in the tactics of hackers or want to proactively secure your software, this training will certainly put you on the right track!
Requirements
Basic knowledge of the topic is beneficial.
Why should I do this training?
Hack the hackers
Develop a hacker’s perspective for proactive defense.
Risk mastery
Recognize, prioritize, and mitigate threats effectively.
Security stories
Craft Security User Stories to strengthen your software.
What does it look like?
What else
should I know?
Course information
Materials included: We will provide all necessary study materials.
Lunch included: A delicious lunch and a variety of snacks are part of the deal!
Languages: Training is in English or Dutch.
CPE-points: This training entitles you to 8 CPE points.
Gift: You will receive a copy of the Microsoft Elevation of Privilege game.
T&A: Travel and accommodation expenses are not included.
Meet our trainers
Marinus Kuivenhoven
Marinus Kuivenhoven is a Security trainer and Head of Security Learning and Coaching at Xebia Academy.