- Chapter 1. Course Introduction
- Chapter 2. Getting Started with Threat Modeling
- Chapter 3. The Four-Question Framework
- Chapter 4. Advanced Threat Modeling Frameworks
- Chapter 5. Threat Modeling Approaches
- Chapter 6. Going Beyond Traditional Methods: Using Artificial Intelligence in Threat Modeling
-
Chapter 7. Threat Modeling in Practice: The Elevation of Privilege Card Game
Course description
Build valuable expertise for advancing in cybersecurity, software, and systems leadership roles. Learn to spot threats early, assess their impact, and design defenses that strengthen both security and professional credibility.
