Certified Threat Modeling Professional CTMP

As information security threats continue to explode, your ability to build models becomes increasingly important, because building better models means creating better defenses for your organization—defenses that often increase an application’s resilience against external threats and insider threats alike.

The Certified Threat Modeling Professional (CTMP) is a vendor-neutral course and certification program that is designed to assess the threat modeling expertise of a security professional.

Threat modeling is an essential skill for any security professional. More and more organizations are increasingly seeking threat modeling as an indispensable skill. This course is designed to give students a practical understanding of Threat modeling, covering not only the theory but immediately applicable tools and techniques. The course is project-oriented, with 20+ hands-on labs that will put your newly gained knowledge into action and guide you along the way.

The curriculum will also focus on educating students on Security requirements in agile environments, Agile Threat modeling, Threat Modeling as Code, and Secure Design Principles to help you ensure security in the design phase.

This course is targeted towards individuals or teams interested in devoting their careers to learning and implementing industry security best practices around Threat modeling.

After the training, you will be able to:

  1. Earn the Certified Threat Modeling Professional (CTMP) Certification by passing a 6-hour practical exam.
  2. Demonstrate a practical understanding of the threat modeling process, tools, and techniques.


    1. Course participants should have knowledge of basic security fundamentals like Confidentiality, Integrity, and Availability (CIA)
    2. Basic knowledge of application development is preferred but is not necessary

    Learning Objectives

    1. Build a solid foundation that is required to understand the Threat modeling
    2. Gain a practical understanding of the threat modeling and the tools to automate it
    3. Understand and implement the modern ways of scaling threat modeling

    Module 1: Overview to Threat Modeling

    1. What is Threat Modelling?
    2. Key Concepts and Terminology
    3. Uses, Benefits, and its challenges
    4. Threat Modelling vs. Other Security Practices
    5. Threat modeling Frameworks and Methodologies
      1. List/Library Centric Threat modeling
      2. Asset/Goal Centric Threat Modelling
      3. Threat Actor/Attacker Centric Threat Modelling
    6. Trust Boundaries vs Attack Surfaces
    7. Threat modeling approaches for Agile and DevOps
    8. Strategies for Risk Management with Examples
      1. Avoiding Risks
      2. Accepting Risks
      3. Mitigating Risks
      4. Transferring Risks
    9. Hands-on Exercise: Breakout sessions to identify threats for a multi-tiered application

    Module 2: Threat Modeling Basics

    1. Threat modeling and security requirements
    2. Threat modeling vs. Threat Rating
    3. Introduction to List based modeling approach
    4. Exploring the STRIDE Model
      1. Spoofing
      2. Tampering
      3. Repudiation
      4. Information Disclosure
      5. Denial of service
      6. Elevation of privileges
    5. Pros and Cons of STRIDE technique
    6. STRIDE defenses
      1. Authentication
      2. Integrity
      3. Non-Repudiation
      4. Confidentiality
      5. Availability
      6. Authorization
    7. STRIDE Threat examples
    8. Goal/Asset Based modeling Approach
      1. Attack Trees
      2. Attack Tree Analysis
    9. Threat actor centric modeling Approach
      1. Using MITRE ATT&CK for attacker centric approach
    10.  Other Threat modeling methodologies
      1. PASTA
      2. VAST
      3. Hybrid Threat modeling
      4. RTMP
    11. Gamified approaches for Threat Modelling
      1. Virtual Card Games
      2. Adversary Card Games
    12. Introduction to Threat Rating
      1.  Pros and Cons of DREAD for threat rating
      2.  Pros and Cons of CVSS for threat rating
    13. Defensive tactics for building secure systems
    14. Hands-on Exercises:
      1. Each of the above topics includes a hands-on exercise

    Module 3: Agile Threat Modeling

    1. Modern Agile Threat Modelling Approaches
    2. Transforming security requirements to code with BDD Security
    3. Exploring the events and rituals of Agile Software Development through Scrum
    4. Writing security requirements for Agile Software Development
    5. Writing User cases and Abuse use cases
    6. The Role of Privacy Impact Assessments in Security Requirements
    7. Modern Threat modeling approaches
      1. Rapid Risk Assessment
      2. Rapid Threat Modelling prototyping
    8. Hands-on Exercises
      1. Exploring UML as Code
      2. Exploring Threat Modelling as Code
      3. BDD – Security

    Module 4: Reporting and Deliverables

    1.  How to manage threat models
      1. Documentation (excel, pdf)
      2. Backlog
      3. Bugs/Tickets
      4. Code
      5. Automation
    2. Open source templates and tools
    3. Validating threat models

    Module 5: Defending Containers and Containerized Apps on Scale

    1. Case Study of Kubernetes Threat Model
    2. Case Study of DNS Threat model
    3. Case Study of AWS S3 Threat model
    4. Exploring principles of Secure Design with examples
      1. Secure by Design
        1. Authentication
        2. Authorization
        3. Confidentiality
        4. Integrity
        5. Availability
        6. Defense in Depth
      2. Secure by Default
        1. Least Privilege
      3. Securing Deployment
        1. Hardened
        2. Secure
      4. Trust with Reluctance

    Practical DevSecOps Certification Process

    1. After completing the course, you can schedule the CTMP exam on your preferred date.
    2. Process of achieving Practical DevSecOps CTMP Certification can be found here.

    Ready to learn DevSecOps?

    Get in touch, or Register now!