How to Integrate the Microsoft MS SDL into Your SDLC
Learn the fundamentals of the Microsoft Security Development Lifecycle (SDL) process. [*Course release date: 10/1/2017]
How to Create Application Security Design Requirements
This course examines how to apply the application security maturity model to the development process.
How to Create an Application Security Threat Model
This course will identify goals of threat modeling and the corresponding Software Development Lifecycle requirements.
Attack Surface Analysis and Reduction
Learn about attack surface analysis and reduction as an exercise in risk reduction.
How to Perform a Security Code Review
Learn how to perform a security code review from start to finish.
How to Create an Automotive Systems Threat Model
This course provides step-by-step instructions for performing threat modeling and its recommendations are aligned with the NHTSA’s proposed “Characterization of Potential Security Threats in Modern Automobiles."
Create an Application Security Threat Model for IoT Embedded Systems
Learn how to create an application security threat model for IoT embedded systems.
Attack Surface Analysis and Reduction for IoT Embedded Systems
Learn about attack surface analysis and reduction for IoT embedded systems.
How to Perform a Security Code Review for ioT Embedded Systems
Learn how to perform an IoT embedded system security code review from start to finish.
Effective Threat Modeling
This Instructor-Led course introduces the technique of threat modeling, its primary goals, and its role within software development.
T.P.S.S.E. Certification Test Prep
Prepare for the T.P.S.S.E. certification exam with this prep course covering foundational skills.