OWASP Application Threat Modeling


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Download PDF

Upcoming Dates

Sep 19 - Sep 20, 2022
09:00 - 17:00

Oct 17 - Oct 18, 2022
09:00 - 17:00

Nov 14 - Nov 15, 2022
09:00 - 17:00

Dec 12 - Dec 13, 2022
09:00 - 17:00

Jan 9 - Jan 10, 2023
09:00 - 17:00

Feb 6 - Feb 7, 2023
09:00 - 17:00

OWASP Application Threat Modeling
2 days  (Instructor Led Online)  |  Threat Modeling
Download PDF

Course Details

As skilled and experienced professionals we know that there is a gap between academic knowledge of threat modeling and the real world. To close that gap, we developed practical use cases, based on real-world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using the OWASP Application Threat Modeling methodology, we provide our students with the best training possible and the templates to incorporate threat modeling best practices in their daily work.

Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on:

  • B2B web and mobile applications, sharing the same REST back-end
  • An IoT deployment with a gateway and a cloud-based update service
  • OAuth scenarios for an HR application
  • Privacy of a new face recognition system in an airport
  • Get into the defenders’ head, attacking a nuclear facility


See other courses available


Day 1

  • Threat modelling introduction
  • Threat modelling in a secure development lifecycle
  • What is threat modelling?
  • Why perform threat modelling?
  • Threat modelling stages
  • Different threat modelling methodologies
  • Document a threat model
  • Diagrams –what are you building?
  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagram B2B web and mobile applications, sharing the same REST backend
  • Identifying threats –what can go wrong?
  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on-premise gateway and secure update service

Day 2

  • Addressing each threat
  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: threat mitigations OAuth scenarios for web and mobile applications

Target Audience

Threat modeling is a crucial technique to assure more secure software and systems. The OWASP Application Threat Modeling training will provide our students with the know-how, templates, and exercises to start threat modeling themselves. Key takeaways are:

  • becoming a better (security) professional
  • understanding the process and technique of threat modeling
  • knowing when and how to introduce and improve threat modeling


Students should be familiar with basic knowledge of web and mobile applications, databases & Single sign-on (SSO) principles