Microsoft
Microsoft Logo

Threat Modeling Security Fundamentals 

  • Offered byMicrosoft

Threat Modeling Security Fundamentals
 at 
Microsoft 
Overview

Duration

3 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

Threat Modeling Security Fundamentals
 at 
Microsoft 
Course details

Skills you will learn
What are the course deliverables?
  • Introduction to threat modeling
  • Create a threat model using data-flow diagram elements
  • Provide context with the right depth layer
  • Approach your data-flow diagram with the right threat model focus
  • Use a framework to identify threats and find ways to reduce or eliminate risk
  • Prioritize your issues and apply security controls
  • Use recommended tools to create a data-flow diagram
More about this course
  • This learning path takes you through the four main phases of threat modeling, explains the differences between each data-flow diagram element, walks you through the threat modeling framework, recommends different tools and gives you a step-by-step guide on creating proper data-flow diagrams
  • Data-flow diagrams are graphical representations of your system and should specify each element, their interactions and helpful context
  • We start by deciding to focus on either what needs to be protected or who it needs protection from
  • Threat modeling helps you generate a list of potential threats using the threat modeling framework and find ways to reduce or eliminate risk with corresponding security controls

Threat Modeling Security Fundamentals
 at 
Microsoft 
Curriculum

Introduction to threat modeling

Introduction

Threat Modeling Phases

Step 1 - Design

Step 2 - Break

Step 3 - Fix

Step 4 - Verify

Summary

Create a threat model using data-flow diagram elements

Introduction

Data-flow diagram elements

Process - The task element

Data store - The storage element

External entity - The no control element

Data-flow - The data in transit element

Trust boundary - The trust zone change element

Summary

Provide context with the right depth layer

Introduction

Data-flow diagram depth layers

Layer 0 - The system layer

Layer 1 - The process layer

Layer 2 - The subprocess layer

Layer 3 - The lower-level layer

Summary

Approach your data-flow diagram with the right threat model focus

Introduction

Threat Modeling Focused Approaches

System and other focused approaches

Summary

Use a framework to identify threats and find ways to reduce or eliminate risk

Introduction

Threat modeling framework

Spoofing - pretending to be someone or something else

Tampering - changing data without authorization

Repudiation - not claiming responsibility for an action taken

Information disclosure - seeing data I am not supposed to see

Denial of Service - overwhelming the system

Elevation of privilege - having permissions I should not have

Summary

Prioritize your issues and apply security controls

Introduction

Issue prioritization, security control types, and functions

Prioritize security issues

Security control types and functions

Summary

Use recommended tools to create a data-flow diagram

Introduction

Recommended tools

Threat modeling tool

Visio

Summary

Threat Modeling Security Fundamentals
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Threat Modeling Security Fundamentals
 at 
Microsoft 
Admission Process

    Important Dates

    Nov 30, 2024
    Course Commencement Date

    Other courses offered by Microsoft

    Free
    2 hours
    Intermediate
    Free
    4 hours
    Intermediate
    Free
    5 hours
    Beginner
    Free
    1 hours
    Beginner
    View Other 1171 CoursesRight Arrow Icon
    qna

    Threat Modeling Security Fundamentals
     at 
    Microsoft 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...