Agile Threat Modeling

The Netherlands

Agile
Software Testing

Think like a hacker to prevent a hack. Join our one-day Agile Threat Modeling training and learn how to recognize vulnerabilities, protect your software, and map risks the Agile way. Developers, testers, architects — this one is for you!

Download training guide

Any questions?

Michiel will gladly help you further with any personal or in-company needs you might have.

Get in touch

What will you learn?

In today’s fast-paced digital landscape, we can’t emphasize the importance of security enough. Whether you’re a developer, tester, or architect, understanding and implementing powerful security measures is not an option; it’s a necessity. And that is where our one-day Agile Threat Modeling training comes in.

This training — a blend of theoretical know-how and practical experience — is your gateway to finding vulnerabilities and strengthening your software against potential threats. It’s about diving deep into the mindset of hackers to understand their strategies, methodologies, tactics, and techniques, enabling your organization to stay one step ahead.

Key takeaways

  1. Adopt a hacker mindset for proactive protection.  
  2. Identify risks at every development stage.  
  3. Prioritize and mitigate potential threats.  
  4. Create security-focused User Stories.  
  5. Grasp a wide range of vulnerabilities, including OWASP’s top 10.  
  6. Boost your skills and career prospects! 

Program

Master the art of proactive protection in just one day! You will learn to safeguard your software by uncovering vulnerabilities and recognizing and managing security risks. We will dive deep into hacker thinking and explore various ways to identify risks and mitigate potential threats.

  • Identify security risks: How do you spot risks during the transition from Epic to User Stories and during each refinement phase?  
  • Prioritize risks and mitigate measures: Learn to assess the magnitude of any risk.   
  • Be proactive: Create Security User Stories and include them in the backlog.  
  • Types of risks: We will study a wide range of common threats, including OWASP’s top 10.

Who is it for?

This training is designed for developers, testers, product owners, software architects, and anyone involved in software development and delivery. Whether you are interested in the tactics of hackers or want to proactively secure your software, this training will certainly put you on the right track! 

Requirements

Basic knowledge of the topic is beneficial.

Why should I do this training?

Hack the hackers

Develop a hacker’s perspective for proactive defense.  

Risk mastery

Recognize, prioritize, and mitigate threats effectively.  

Security stories

Craft Security User Stories to strengthen your software.  

What else
should I know?

Course information

Materials included: We will provide all necessary study materials. 

Lunch included: A delicious lunch and a variety of snacks are part of the deal! 

Languages: Training is in English or Dutch.

CPE-points: This training entitles you to 8 CPE points.

Gift: You will receive a copy of the Microsoft Elevation of Privilege game. 

T&A: Travel and accommodation expenses are not included. 

Meet our trainers

Marinus Kuivenhoven

Marinus Kuivenhoven is a Security trainer and Head of Security Learning and Coaching at Xebia Academy.

Download the Agile Threat Modeling Training Guide

Also interesting for you

View all training courses
Applied DevSecOps   

Level up your security skills with our 2-day Applied DevSecOps training. Automation, threat modeling, and more. Are you in?

DevOps
Docker
Software Development
View training
Pentesting Web and API Application Foundation Training  

Defend against cyber threats. Join our Pentesting Web and API Training to master hacker tactics from the inside out.

Software Testing
View training
Certified Information Systems Security Professional (CISSP®) Preparation Course  

Prepare for the CISSP® exam and become a skilled information security specialist with our comprehensive and practical CISSP® Preparation Course.

Security in Google Cloud Platform  

Unlock GCP security mastery. Get certified as a Professional GCP Security Engineer. Join us now!

Google Cloud Platform (GCP)
View training
Secure Coding Foundation Training  

Master secure coding in just one day. Learn to detect vulnerabilities and write better software. Join now!

Back-End Development
Software Development
View training

Can’t find the course you’re looking for? There’s more!