{"id":1420,"date":"2020-12-11T16:14:31","date_gmt":"2020-12-11T15:14:31","guid":{"rendered":"https:\/\/staging.ict-improve.nl\/?post_type=training&#038;p=1420"},"modified":"2025-09-13T18:16:58","modified_gmt":"2025-09-13T16:16:58","slug":"foundation-of-security-the-threat-model-en","status":"publish","type":"training","link":"https:\/\/staging.ict-improve.nl\/en\/training\/foundation-of-security-the-threat-model-en\/","title":{"rendered":"Foundation of Security: The Threat Model EN"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>The Threat Model: A Key to Your Security<\/strong><\/h2>\n\n\n\n<p>Would you rather call the fire brigade to put out your burning house, or prevent the fire from happening in the first place? We believe that prevention is better than cure. We also believe that security begins with a comprehensive risk analysis and ends with continuous monitoring and training. A proven method for achieving this is Threat Modelling. This training will show you how to use Threat Modeling to design and implement security solutions in the most optimal way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Threat Model: A Key to Your Security Would you rather call the fire brigade to put out your burning house, or prevent the fire from happening in the first place? We believe that prevention is better than cure. We also believe that security begins with a comprehensive risk analysis and ends with continuous monitoring [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":99991231,"template":"","meta":{"_acf_changed":true,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-1420","training","type-training","status-publish","hentry"],"acf":{"goals":"After this training, you will:\r\n<ul>\r\n \t<li>Understand the principles of security, in relation to the Security Development Life Cycle<\/li>\r\n \t<li>Learn how to use the Threat Model as the basis for Secure Development<\/li>\r\n \t<li>Apply and utilize the Threat Model in your own projects<\/li>\r\n \t<li>Implement Continuous Security with the Threat Model<\/li>\r\n<\/ul>","description":"Security is becoming more and more important in IT. And for a good reason, because as digitization progresses, there is also more and more to protect. A firewall is helpful, but not enough. Security matters at all levels (organization, process, system, applications, network components), and it can be hard to decide which actions are most effective for ensuring security.\r\n\r\nWe believe that preventing problems is better than solving them. We also believe that security starts with a thorough risk analysis and ends with continuous monitoring and training. Threat modelling is the solution to the question of how to create concrete security requirements, stories and acceptance criteria for the technical scope of a project. In this training, we will teach you what Threat Modelling is and how you can use it to design and deploy security measures as efficiently and effectively as possible","target_audience":"<strong>Who should attend this training?<\/strong>\r\n\r\nEverybody involved in developing and maintaining IT systems.\r\n\r\n<strong>Roles of participants in their organization<\/strong><strong>\r\n<\/strong>This training is meant for:\r\n<ul>\r\n \t<li>CIO\u2019s<\/li>\r\n \t<li>IT-managers<\/li>\r\n \t<li>Development managers<\/li>\r\n \t<li>Developers<\/li>\r\n \t<li>Analysts<\/li>\r\n \t<li>Testers<\/li>\r\n \t<li>DevOps engineers<\/li>\r\n<\/ul>\r\n<strong>Prior knowledge or training<\/strong>\r\n\r\nNo prior knowledge or training required.","program":"<strong>Structure of this training<\/strong>\r\nThe training lasts half a day, packed with hands-on knowledge and exercises.\r\n\r\n<strong>Course outline\r\n<\/strong>In half a day, you will learn how the Threat Model forms the foundation of security within your organization and how to implement this model:\r\n<ul>\r\n \t<li>Security Aspects<\/li>\r\n \t<li>Security Measures<\/li>\r\n \t<li>Security Development Life Cycle<\/li>\r\n \t<li>Threat Model\r\n<ul>\r\n \t<li>Interpretation<\/li>\r\n \t<li>Application<\/li>\r\n \t<li>Maintenance and feedback loop<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Threat Model in your daily practice<\/li>\r\n<\/ul>\r\n<strong>Possibilities in-house training<\/strong>\r\n\r\nICT Improve provides this training in-house and tailored to your specific situation and needs upon request. For more information, please contact us at +31 (0)40 - 202 1803 or <a href=\"mailto:opleidingen@ict-improve.nl\">training@ict-improve.nl<\/a>.","practical":"<strong>Training information<\/strong>\r\n<ul>\r\n \t<li>Location and dates: check the<a href=\"https:\/\/staging.ict-improve.nl\/trainingen\/\"> training calender<\/a><\/li>\r\n \t<li>Schedule: 13:00 - 17:00 (half a day)<\/li>\r\n \t<li>Includes coffee, tea, lunch and training material<\/li>\r\n \t<li>Three months free e-coaching<\/li>\r\n<\/ul>\r\nFor more information, please contact us at +31 (0)40 - 202 1803 or <a href=\"mailto:opleidingen@ict-improve.nl\">training@ict-improve.nl<\/a>\r\n\r\nICT Improve also offers bespoke in-house training tailored to your specific requirements and needs upon request.","teacher":"Your trainers are:\r\n<ul>\r\n \t<li><a href=\"https:\/\/staging.ict-improve.nl\/en\/trainers\/patrick-duisters\/\">Patrick Duisters<\/a><\/li>\r\n \t<li>Marco de Groot<\/li>\r\n \t<li><a href=\"https:\/\/staging.ict-improve.nl\/en\/trainers\/pieter-withaar\/\">Pieter Withaar<\/a><\/li>\r\n<\/ul>","session":"no","opleidingscode":"cde8bcfb-53d1-480b-b009-5c113af1d6df"},"_links":{"self":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/1420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training"}],"about":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/types\/training"}],"version-history":[{"count":0,"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/1420\/revisions"}],"wp:attachment":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/media?parent=1420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}