Threat modeler professional

  • Trainer: Marek Šottl
  • Level: Advanced
  • 47 activities
  • Recommended study time: 1 month 
  • Video time: 7+ hours
  • Final test (85 questions)
Write your awesome label here.
kind words by students

Our students love our
approach to learning

"I recently completed the Threat Modeler training from ADevSecOps.com and had an outstanding learning experience. The course was thoughtfully designed with a strong focus on practical applications and real-world scenarios. Marek Sottl, brought exceptional knowledge and clarity to the sessions, his expertise and teaching style made complex concepts easy to understand. The hands-on exercises and sessions were particularly valuable, equipping me with the skills to integrate threat modeling effectively into my security practices. I highly recommend this training to anyone looking to deepen their understanding of secure design and threat modeling."
SUHEL MULTANI
"I really enjoyed this intensive course! The information is well-structured, and every minute felt meaningful. Everything you need to understand threat modeling is clearly explained, with a strong focus on real, practical applications.
I learned about key threat areas in AI, Cloud, CI/CD, and software systems - along with methodologies like STRIDE and PASTA, and how they all come together in tools like OWASP Threat Dragon and IRIUS Risk.The instructor’s extensive experience really shows, and his insights added a lot of value to the learning experience.
I’d highly recommend this course to developers, architects, and security professionals who want to build secure systems from the ground up."
IRINA ZARZU

"I went through the Threat modeller professional course and must say it is something that I'm going to use inside the team. It gives you an overview about Threat modelling and possible usage in on-prem and cloud environments. Comprehensive content gives me insight how to use it, I really loved gamification of threat modelling. After more than 7 hours of course and an overwhelming test, I feel ready to use it in action."

PETR KLANG
Write your awesome label here.
Threat modeler Professional

Prerequisites

This training is beginner-friendly and does not require prior threat modeling experience. However, to ensure participants can maximize their learning and apply the concepts effectively, the following foundational knowledge is recommended: 

  • Basic Understanding of Security Concepts – Familiarity with fundamental security principles such as confidentiality, integrity, availability (CIA), authentication, and authorization.
  • Experience with Software Development or Infrastructure Management – Some exposure to software development lifecycles, cloud architectures, or system administration is beneficial. 
  • Knowledge of Common Security Risks – Awareness of common vulnerabilities (e.g., OWASP Top 10, CWE, CVE) and security threats in modern applications and cloud environments. 
  • Familiarity with DevOps or CI/CD Processes – Understanding of automated deployment pipelines and cloud-native application development helps apply threat modeling in CI/CD contexts.
No prior threat modeling experience is required, as the course covers fundamental principles before advancing to specialized techniques. 
Write your awesome label here.
Threat modeler Professional

Who Should Attend?

This training is designed for professionals of all experience levels who want to build expertise in threat modeling, including: 

Empty space, drag to resize
  • Cloud Architects & Engineers – To identify and mitigate risks in cloud-native applications and infrastructure. 
  • Site Reliability Engineers (SREs) – To incorporate security into reliability and resilience planning. 
  • Security Engineers & Analysts – To enhance risk assessment and mitigation strategies.
  • DevOps & Platform Engineers – To integrate threat modeling into CI/CD pipelines for secure software delivery. 
  • Software Engineers & Developers – To proactively design secure software components and applications. 
  • Penetration Testers & Red Teamers – To use threat modeling for attack simulations and security assessments. 
  • Compliance & Risk Management Professionals – To align threat modeling with security governance and compliance frameworks.
  • Product Managers & Technical Leads – To understand and drive security-by-design principles in software and infrastructure.
Since the training includes hands-on exercises and practical scenarios, it is suitable for both beginners and experienced professionals looking to strengthen their threat modeling skills. The course is particularly valuable for professionals working in highly regulated industries (finance, healthcare, critical infrastructure) where proactive security assessment is essential. 

Additionally, startups and fast-moving development teams will benefit from templates and rapid prototyping techniques, enabling them to implement lightweight but effective threat modeling practices that support agile innovation without adding unnecessary complexity. 

What You’ll Learn: 

  • Threat Modeling Foundations – What it is, why it matters, and how to use it effectively.
  • Methodologies That Work – STRIDE, DREAD, PASTA, LINNDUN, and when to apply them.
  • Gamification & Hands-On Techniques – Learn with card games, rapid prototyping, and interactive tools.
  • Specialized Threat Modeling – Secure cloud, CI/CD pipelines, and software components with precision.
  • Tooling You Didn’t Know You Needed – Master OWASP Threat Dragon, Microsoft TMT, IRIUS Risk, and more.
  • Evaluating & Improving Models – Make threat models dynamic, effective, and continuously valuable.
  • Templates & Automation – Accelerate your threat modeling process with ready-to-use frameworks.
Empty space, drag to resize
💡  This isn’t just another security checkbox—this is how you build threat models that make a difference. 
🚀  Join us and turn threat modeling into one of your most powerful security tools.
Empty space, drag to resize
  • What is Threat Modeling, and how to use it.

  • Hands-on exercises based on real-world scenarios. 
  • Key elements of a threat model.

  • Evaluating the effectiveness of threat models and reassessing assumptions.
  • Overview of methodologies: STRIDE, DREAD, PASTA, and LINNDUN.

  • Using tools like OWASP Threat Dragon, Microsoft Threat Modeling Tool, IRIUS Risk. 
  • Gamification in Threat Modeling using card games and rapid prototyping tools.

  • Templates for rapid prototyping and advanced Threat Modeling. 
  • Specialized Threat Modeling for:
    • Cloud and infrastructure. 
    • Software components. 
    • CI/CD pipelines. 

  • What is Threat Modeling, and how to use it.

Join ADevSecOps and you won't regret it..

I’m Marek the CEO of HackiHub, a company that built the ADevSecOps. My objective with the platform is to simplify your learning and bring you the knowledge that I gained in the last 15 years in DevOps, SRE, Cloud security, and Principal engineering roles. Don't let learning be a pain with my engaging and interactive online courses designed with your success in mind. 
Write your awesome label here.
Created with