{"id":2108,"date":"2021-03-12T11:53:20","date_gmt":"2021-03-12T10:53:20","guid":{"rendered":"https:\/\/staging.ict-improve.nl\/?post_type=training&#038;p=2108"},"modified":"2025-09-18T12:19:31","modified_gmt":"2025-09-18T10:19:31","slug":"foundation-of-security-the-threat-model-2","status":"publish","type":"training","link":"https:\/\/staging.ict-improve.nl\/en\/training\/foundation-of-security-the-threat-model-nl\/foundation-of-security-the-threat-model-2\/","title":{"rendered":"Foundation of Security: The Threat Model"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Het Threat Model: De sleutel tot jouw beveiliging Wil je liever de brandweer bellen om je brandende huis te blussen, of voorkomen dat de brand \u00fcberhaupt ontstaat? Wij geloven dat voorkomen beter is dan genezen. Wij geloven ook dat beveiliging begint met een uitgebreide risicoanalyse en eindigt met continue monitoring en training. Een beproefde methode om dit te bereiken is Threat Modelling. Deze training laat je zien hoe je Threat Modeling kunt gebruiken om beveiligingsoplossingen optimaal te ontwerpen en te implementeren. Na deze training zul je: De principes van beveiliging begrijpen, in relatie tot de Security Development Life Cycle Weten hoe je het Threat Model kunt gebruiken als basis voor veilige ontwikkeling Het Threat Model toepassen en gebruiken in jouw eigen projecten Continue beveiliging implementeren met het Threat Model Beveiliging wordt steeds belangrijker in IT. En daar is een goede reden voor, want naarmate de digitalisering voortschrijdt, is er ook steeds meer te beschermen. Een firewall helpt, maar is niet genoeg. Beveiliging speelt op alle niveaus een belangrijk rol (organisatie, proces, systeem, applicaties, netwerkcomponenten) en het kan moeilijk zijn om te beslissen welke acties het meest effectief zijn om de beveiliging te garanderen. Wij geloven dat problemen voorkomen beter is<\/p>\n","protected":false},"featured_media":0,"parent":1418,"menu_order":99991231,"template":"","meta":{"_acf_changed":true,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-2108","training","type-training","status-publish","hentry"],"acf":{"start_date":null,"duration":"","price":"\u20ac 695 ","early_bird_price":"","early_bird_tot":null,"location":"In-house","location_type":"Classroom","theme":["Requirements","Security"],"training_language":"Nederlands","session":"yes","startgarantie":false,"nog_enkele_plaatsen_beschikbaar":false,"uitvoeringscode":"3efd9e6d-4072-419e-b4f2-1352c7de5950"},"_links":{"self":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training"}],"about":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/types\/training"}],"version-history":[{"count":0,"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2108\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/1418"}],"wp:attachment":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/media?parent=2108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}