Course info
June 27, 2017
1h 5m

Whether you're a developer, executive, ethical hacker, or just have an avid interest in protecting yourself: You cannot protect something unless you understand what you're protecting it from. In this course, Threat Modeling: The Big Picture, you'll be provided with a high-level overview of the ins and outs of threat modeling. First, you'll cover what threat modeling is and how it can be used to identify the types of attacks you might vulnerable to. Next, you'll explore how to use that information to ensure you are protecting yourself. Finally, you'll learn of potential challenges that you may face when attempting to use threat modeling for your day to day activities, projects or environments. When you're finished with this course, you'll have a foundational understanding of threat modeling that will help you strategically identify opportunities for attack, and then use that information to ensure that your applications and environments are protected.

About the author
About the author

Lee Allen is an adversarial engineer and penetration tester at the Columbus Collaboratory. Lee specializes in Penetration Testing and IT Risk Management and has authored four technical books.

More from the author
CISSP® - Security Operations
3h 3m
7 Feb 2017
CISSP®: Security Assessment and Testing
2h 3m
12 Oct 2016
CISSP® - Security and Risk Management
4h 3m
18 Apr 2016

Hi everyone, my name is Lee Allen and welcome to my course Threat Modeling: The Big Picture. I am an author of several security books and a pentester at the Columbus Collaboratory.

Threat Modeling enables you to find threats before you build your systems and can be accomplished by anyone.

This course provides a high level overview of how organizations can take advantage of threat modeling to build secure systems and applications.

Some of the major topics that we will cover include:

  1. An introduction to threat modeling
  2. A practical example of how threat modeling can help secure an application
  3. And a primer on how ethical hackers can take advantage of threat modeling
By the end this course, you’ll know the basics of threat modeling. I hope you’ll join me on this journey to learn threat modeling with the Threat Modeling: The Big Picture course at Pluralsight.