Course Overview

CEH v13 – Prepare for the CEH certification and learn to think like a hacker while looking for system weaknesses and vulnerabilities.

With CEH v13, you’ll gain access to the world’s first ethical hacking certification powered by AI. By integrating AI into all five phases of ethical hacking, CEH v13 enables you to achieve 40% greater efficiency and double your productivity in cybersecurity tasks.

EC Council’s unique Learn, Certify, Engage, and Compete framework guides you toward ethical hacking mastery. You’ll acquire hands-on experience through 220+ labs, 550+ attack techniques, and 4,000+ tools, while also testing your skills in global Capture the Flag (CTF) competitions. Validate your expertise with a 6-hour practical or 4-hour knowledge-based exam.

Earn a top certification recognized by U.S. DoD 8140, ANAB 17024, and NCSC, adhering to NICE 2.0 and NIST standards.

Open doors to opportunities with top employers by earning a certification trusted worldwide!

This course includes both a knowledge exam voucher and practical exam voucher, subscription to CEH challenges, and over 4000 hacking tools and attack techniques

Course Objectives

This course will provide you with:

  • In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques
  • The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
  • AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods
  • Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks

Course Content

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

Course Overview

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

Overview of other algorithms such as Blowfish, Twofish, and Skipjack
Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.

Participants will also be provided a practical application of the following:

How to set up a VPN
Encrypt a drive
Hands-on experience with steganography
Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

Course Objectives

What is Cryptography?
History
Mono-Alphabet Substitution
Caesar Cipher
Atbash Cipher
ROT 13
Scytale
Single Substitution Weaknesses
Multi-Alphabet Substitution
Cipher Disk
Vigenère Cipher
Vigenère Cipher: Example
Breaking the Vigenère Cipher
Playfair
The ADFGVX cipher
The Enigma Machine
CrypTool

Course Content

Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies

Course Overview

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.

Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

Course Objectives

After completing this course you should be able to:

  • Understand secure SDLC and secure SDLC models in-depth
  • Apply the knowledge of OWASP Top 10, threat modelling, SAST and DAST
  • Capture security requirements of an application in development
  • Define, maintain and enforce application security best practices
  • Perform manual and automated code review of application
  • Conduct application security testing for web applications to assess the vulnerabilities
  • Drive the development of a holistic application security program
  • Rate the severity of defects and publishing comprehensive reports detailing associated risks and mitigations
  • Work in teams to improve security posture
  • Use Application security scanning technologies such as AppScan, Fortify, WebInspect, static application security testing (SAST), dynamic application security testing (DAST), single sign-on, and encryption
  • Follow secure coding standards that are based on industry-accepted best practices such as OWASP Guide, or CERT Secure Coding to address common coding vulnerabilities.
  • Create a software source code review process that is a part of the development cycles (SDLC, Agile, CI/CD)

Course Content


Understanding Application Security, Threats and Attacks

  • What is a Secure Application
  • Need for Application Security
  • Most Common Application Level Attacks
  • Why Applications become Vulnerable to Attacks
  • What Consistutes Comprehensive Application Security ?
  • Insecure Application: A Software Development Problem
  • Software Security Standards, Models and Frameworks

Security Requirements Gathering

  • Importance of Gathering Security Requirements
  • Security Requirement Engineering (SRE)
  • Abuse Case and Security Use Case Modeling
  • Abuser amd Security Stories
  • Security Quality Requirements Engneering (SQUARE)
  • Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)

Secure Application Design and Architecture

  • Relative Cost of Fixing Vulnerabilities at Different Phases of SDLC
  • Secure Application Design and Architecture
  • Goal of Secure Design Process
  • Secure Design Actions
  • Secure Design Principles
  • Threat Modeling
  • Decompose Application
  • Secure Application Architecture

Secure Coding Practices for Input Validation

  • Input Validation
  • Why Input Validation ?
  • Input Validation Specification
  • Input Validation Approaches
  • Input Filtering
  • Secure Coding Practices for Input Validation: Web Forms
  • Secure Coding Practices for Input Validation: ASP.NET Core
  • Secure Coding Practices for Input Validation: MVC

Secure Coding Practices for Authentication and Authorization

  • Authentication and Authorization
  • Common Threats on User Authentication and Authorization
  • Authentication and Authorization: Web Forms
  • Authentication and Authorization: ASP .NET Core
  • Authentication and Authorization: MVC
  • Authentication and Authorization Defensive Techniques : Web Forms
  • Authentication and Authorization Defensive Techniques : ASP .NET Core
  • Authentication and Authorization Defensive Techniques : MVC 

Secure Coding Practices for Cryptography

  • Cryptographic
  • Ciphers
  • Block Ciphers Modes
  • Symmetric Encryption Keys
  • Asymmetric Encryption Keys
  • Functions of Cryptography
  • Use of Cryptography to Mitigate Common Application Security Threats
  • Cryptographic Attacks
  • Techniques Attackers Use to Steal Cryptographic Keys
  • What should you do to Secure .Net Applications for Cryptographic Attacks
  • .NET Cryptographic Name Spaces
  • .NET Cryptographic Class Hierarchy
  • Symmetric Encryption
  • Symmetric Encryption: Defensive Coding Techniques
  • Asymmetric Encryption
  • Asymmetric Encryption: Defensive Coding Techniques
  • Hashing
  • Digital Signatures
  • Digital Certificates
  • XML SIgnatures
  • ASP.NET Core Specific Secure Cryptography Practices

Secure Coding Practices for Session Management

  • What are Exceptions/Runtime Errors ?
  • Need for Secure Error/Exception Handling
  • Consequences of Detailed Error Message
  • Exposing Detailed Error Messages
  • Considerations: Designing Secure Error Messages
  • Secure Exception Handling
  • Handling Exceptions in an Application
  • Defensve Coding practices against Information Disclosure
  • Defensive Coding practices against Improper Error Handling
  • ASP .NET Core: Secure Error Handling Practices
  • Secure Auditing and Logging
  • Tracing .NET
  • Auditing and Logging Security Checklists

Static and Dynamic Application Security Testing (SAST and DAST)

  • Static Application Security Testing
  • Manual Secure Code Review for Most Common Vulnerabilities
  • Code Review: Check List Approach
  • SAST Finding
  • SAST Report
  • Dynamic Application Security Testing
  • Automated Application Vulnerability Scanning Tools
  • Proxy-based Security Testing Tools
  • Choosing between SAST and DAST

Secure Deployment and Maintenance

  • Secure Deployment
  • Prior Deployment Activity
  • Deployment Activities: Ensuring Security at Various Levels
  • Ensuring Security at Host Level
  • Ensuring Security at Network Level
  • Ensuring Security at Application Level
  • Web Application Firewall (WAF)
  • Ensuring Security at IIS Level
  • Sites and Virtual Directories
  • ISAPI Filters
  • Ensuring Security at .NET Level
  • Ensuring Security at SQL Server Level
  • Security Maintenance and Monitoring

Course Overview

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.

Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

Course Objectives

After completing this course you should be able to:

  • Understand secure SDLC and secure SDLC models in-depth
  • Apply the knowledge of OWASP Top 10, threat modelling, SAST and DAST
  • Capture security requirements of an application in development
  • Define, maintain and enforce application security best practices
  • Perform manual and automated code review of application
  • Conduct application security testing for web applications to assess the vulnerabilities
  • Drive the development of a holistic application security program
  • Rate the severity of defects and publishing comprehensive reports detailing associated risks and mitigations
  • Work in teams to improve security posture
  • Use Application security scanning technologies such as AppScan, Fortify, WebInspect, static application security testing (SAST), dynamic application security testing (DAST), single sign-on, and encryption
  • Follow secure coding standards that are based on industry-accepted best practices such as OWASP Guide, or CERT Secure Coding to address common coding vulnerabilities.
  • Create a software source code review process that is a part of the development cycles (SDLC, Agile, CI/CD)

Course Content

Understanding Application Security, Threats and Attacks

  • What is a Secure Application
  • Need for Application Security
  • Most Common Application Level Attacks
  • Why Applications become Vulnerable to Attacks
  • What Consistutes Comprehensive Application Security
  • Insecure Application: A Software Development Problem
  • Software Security Standards, Models and Frameworks

Security Requirements Gathering

  • Importance of Gathering Security Requirements
  • Security Requirement Engineering (SRE)
  • Abuse Case and Security Use Case Modeling
  • Abuser amd Security Stories
  • Security Quality Requirements Engneering (SQUARE)
  • Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)

Secure Application Design and Architecture

  • Relative Cost of Fixing Vulnerabilities at Different Phases of SDLC
  • Secure Application Design and Architecture
  • Goal of Secure Design Process
  • Secure Design Actions
  • Secure Design Principles
  • Threat Modeling
  • Decompose Application
  • Secure Application Architecture

Secure Coding Practices for Input Validation

  • Input Validation Pattern
  • Validation and Security Issues
  • Impact of Invalid Data Input
  • Data Validation Techniques
  • Input Validation using Frameworks and APIs
  • Open Source Validation Framework for Java
  • Servlet Filters Validation Filters for Servlet
  • Data Validation using OWASP ESAPI
  • Data Validation: Struts Framework
  • Data Validation: Spring Framework
  • Input Validation Errors
  • Common Secure Coding Practices

Secure Coding Practices for Authentication and Authorization

  • Introduction to Authentication
  • Types of Authentication
  • Authentication Weaknesses and Prevention
  • Introduction to Authorization
  • Access Control Model
  • EJB Authorization
  • Java Authentication and Authorization (JAAS)
  • Java EE Security
  • Authorization Common Mistakes and Countermeasures
  • Authentication and Authorization in Spring Security Framework
  • Defensive Coding Practices against Broken Authentication and Authorization
  • Secure Development Checklists: Broken Authentication and Session Management

Secure Coding Practices for Cryptography

  • Java Cryptographic
  • Encryption and Secret Keys
  • Cipher Class
  • Digital Signatures
  • Secure Socket Layer (SSL)
  • Key Management
  • Digital Signatures
  • Signed Code Sources
  • Hashing
  • Java Card Cryptography
  • Spring Security: Crypto Module
  • Do’s and Dont’s in Java Cryptography
  • Best Practices for Java Cryptography

Secure Coding Practices for Session Management

  • Session Management
  • Session Tracking
  • Session Management in Spring Security
  • Session Vulnerabilities and their Mitigation Techniques
  • Best Practices and Guidelines for Secured Sessions Management
  • Checklist to Secure Credentials and Session ID’s
  • Guidelines for Secured Session Management

Secure Coding Practices for Error Handling

  • Introduction to exceptions
  • Erroneous Exceptional Behaviors
  • Dos and Don’ts in Error Handling
  • Spring MVC Error Handling
  • Exception Handling in Struts 2
  • Best Practices for Error Handling
  • Introduction to Logging
  • Logging using Log4j
  • Secure Coding in Logging

Static and Dynamic Application Security Testing (SAST and DAST)

  • Static Application Security Testing
  • Manual Secure Code Review for Most Common Vulnerabilities
  • Code Review: Check List Approach
  • SAST Finding
  • SAST Report
  • Dynamic Application Security Testing
  • Automated Application Vulnerability Scanning Tools
  • Proxy-based Security Testing Tools
  • Choosing between SAST and DAST

Secure Deployment and Maintenance

  • Secure Deployment
  • Prior Deployment Activity
  • Deployment Activities: Ensuring Security at Various Levels
  • Ensuring Security at Host Level
  • Ensuring Security at Network Level
  • Ensuring Security at Application Level
  • Ensuring Security at Web Container Level (Tomcat)
  • Ensuring Security in Orcale
  • Security Maintenance and Monitoring

Course Overview

This 3-day course provides networking professionals a functional understanding of iRules development. 

The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. 

Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. 

This hands-on course includes lectures, labs, and discussions.

Course Topics

• Setting up the BIG-IP system

• Getting started with iRules

• Leveraging DevCentral resources for iRule development

• Exploring iRule elements, including events, functions, commands, variables, and operators

• Using control structures for conditional branching and looping

• Mastering whitespace, grouping, and special symbols

• Measuring iRule efficiency using timing statistics

• Logging from an iRule using syslog-ng and high-speed logging (HSL)

• Optimizing iRules execution, including implementing efficiency best practices

• Modularizing iRules for administrative efficiency, including using procedures

• Securing web applications with iRules, including preventing common HTTP attacks, securing HTTP headers and cookies, and implementing HTTP strict transport security (HSTS)

• Working with strings, including using Tcl parsing commands and iRules parsing functions

• Accessing and manipulating HTTP traffic, including applying selective HTTP compression

• Working with iFiles and data groups

• Using iRules with universal persistence and stream profiles

• Gathering statistics using STATS and ISTATS

• Incorporating advanced variables, including arrays, static variables, and the session table

Course Objectives

At the end of this course, the student will be able to: 

• Describe the role of iRules in customizing application delivery on a BIG-IP system

• Describe best practices for using iRules

• Define event context, and differentiate between client-side and server-side contexts, request and response contexts, and local and remote contexts

• Trigger an iRule for both client-side and server-side request and response events

• Assign multiple iRules to a virtual server and control the order in which duplicate events trigger

• Describe and use a testing methodology for iRule development and troubleshooting

• Use local variables, static variables, lists, arrays, the session table, and data groups to store information needed for iRule execution

• Write iRules that are optimized for runtime and administrative efficiency

• Use control structures to conditionally branch or loop within an iRule

• Log from an iRule using Linux syslog-ng or TMOS high-speed logging (HSL)

• Incorporate coding best practices during iRule development

• Use analyzer tools to capture and view traffic flow on both client-side and server-side contexts

• Collect and use timing statistics to measure iRule runtime efficiency

• Write iRules to help mitigate and defend from some common HTTP attacks

• Differentiate between decimal, octal, hexadecimal, floating-point, and exponential notation

• Parse and manipulate strings using Tcl commands and iRule functions

• Write iRules to access and manipulate HTTP header information

• Write iRules to collect customized statistics

• Implement universal persistence via an iRule

• Modify payload content using an iRule with a stream profile

Course Content

Chapter 1: Setting Up the BIG-IP System

• Introducing the BIG-IP System

• Initially Setting Up the BIG-IP System

• Archiving the BIG-IP System Configuration

• Leveraging F5 Support Resources and Tools

Chapter 2: Getting Started with iRules

• Customizing Application Delivery with iRules

• Triggering an iRule

• Leveraging the DevCentral Ecosystem

• Creating and Deploying iRules

Chapter 3: Exploring iRule Elements

• Introducing iRule Constructs

• Understanding iRule Events and Event Context

• Working with iRule Commands

• Logging from an iRule Using SYSLOG-NG (LOG Command)

• Working with User-Defined Variables

• Working with Operators and Data Types

• Working with Conditional Control Structures (IF and SWITCH)

• Incorporating Best Practices in iRules

Chapter 4: Developing and Troubleshooting iRules

• Mastering Whitespace and Special Symbols

• Grouping Strings

• Developing and Troubleshooting Tips

• Using Fiddler to Test and Troubleshoot iRules

Chapter 5: Optimizing iRule Execution

• Understanding the Need for Efficiency

• Measure iRule Runtime Efficiency Using Timing Statistics

• Modularizing iRules for Administrative Efficiency

• Using Procedures to Modularize Code

• Optimizing Logging

• Using High-Speed Logging Commands in an iRule

• Implementing Other Efficiencies

• Using Looping Control Structures (WHILE, FOR, FOREACH Commands)

Chapter 6: Securing Web Applications with iRules

• Integrating iRules into Web Application Defense

• Mitigating HTTP Version Attacks

• Mitigating Path Traversal Attacks

• Using iRules to Defends Against Cross-Site Request Forgery (CSRF)

• Mitigating HTTP Method Vulnerabilities

• Securing HTTP Cookies with iRules

• Adding HTTP Security Headers

• Removing Undesirable HTTP Headers

Chapter 7: Working with Numbers and Strings

• Understanding Number Forms and Notation

• Working with Strings (STRING and SCAN Commands)

• Combining Strings (Adjacent Variables, CONCAT and APPEND Commands)

• Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands)

Chapter 8: Processing the HTTP Payload

• Reviewing HTTP Headers and Commands

• Introducing iRule HTTP Header Commands

• Accessing and Manipulating HTTP Headers (HTTP::header Commands)

• Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri)

• Parsing the HTTP URI (URI::path, URI::basename, URI::query)

• Parsing Cookies with HTTP::cookie

• Selectively Compressing HTTP Data (COMPRESS Command)

Chapter 9: Working with iFiles and Data Groups

• Working with iFiles

• Introducing Data Groups

• Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH)

Chapter 10: Using iRules with Universal Persistence, Stream, and Statistics Profiles

• Implementing Universal Persistence (PERSIST UIE Command)

• Working with the Stream Profile (STREAM Command)

• Collecting Statistics Using a Statistics Profile (STATS Command)

• Collecting Statistics Using iStats (ISTATS Command)

Chapter 11: Incorporating Advanced Variables

• Reviewing the Local Variable Namespace

• Working with Arrays (ARRAY Command)

• Using Static and Global Variables

• Using the Session Table (TABLE Command)

• Processing Session Table Subtables

• Counting “Things” Using the Session Table

Course Changes since v15

The Developing iRules for BIG-IP v16.1 course presents much of the same content as v15.1, with removal of deprecated Data Group MATCHCLASS and FINDCLASS topics being the primary change. Passwords are 8 digits in length i.e.. f5trn0XX.

Course Overview

The Designing and Implementing Secure Cloud Access for Users and Endpoints course will provide you with the skills to design and implement cloud security architectures, user and device security, network and cloud security, application and data security, visibility and assurance, and threat response.

Some of the Cisco solutions covered in this course include Cisco SecureX, Cisco XDR, Cisco Duo, Cisco ISE, Cisco Catalyst SD-WAN, Cisco Umbrella, Cisco Secure Firewall, Cisco Secure Workload, Cisco Secure Analytics, and more.

This course prepares you for the 300-740 SCAZT exam. If passed, you will satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification as well the Secure Cloud Access Specialist Certification.

This course is worth 40 Continuing Education (CE) Credits

Course Objectives

After completing this course you should be able to:

  • Compare and contrast the National Institute of Standards and Technology (NIST), Cybersecurity and Infrastructure Security Agency (CISA), and Defense Information Systems Agency (DISA) security frameworks, and understand the importance of adopting standardized frameworks for cybersecurity in enhancing an organization’s security posture 
  • Describe the Cisco Security Reference Architecture and its five main components 
  • Describe commonly deployed use cases and recommend the necessary capabilities within an integrated security architecture to address them effectively 
  • Describe the Cisco Secure Architecture for Everyone (SAFE) architecture 
  • Review the benefits, components, and process of certificate-based authentication for both users and devices 
  • Enable Duo multi-factor authentication (MFA) to protect an application from the Duo Administration Portal, and then configure the application to use Duo MFA for user login authentication 
  • Install Cisco Duo and implement its multifactor authentication on remote access virtual private network (VPN) 
  • Configure endpoint compliance 
  • Review and demonstrate the ability to understand Stateful Switchover (SSO) using security assertion markup language (SAML) or OpenID Connect together with Cisco Duo 
  • Describe Cisco software-defined wide-area network (SD-WAN) on-box and integrated threat prevention security services 
  • Describe SD-WAN on-box and integrated content filtering security services 
  • Describe the features and capabilities of Cisco Umbrella Secure Internet Gateway (SIG), such as DNS Security, Cloud-Delivered Firewall (CDFW), intrusion prevention systems (IPS), and interaction with Cisco SD-WAN 
  • Introduce the reverse proxy for internet-facing applications protections 
  • Explore the Cisco Umbrella SIG use case to secure cloud application access, the limitations and benefits of the solution, and the features available to discover and control access to cloud delivered applications 
  • Explore the Cisco ThousandEyes capabilities for monitoring the Cisco SD-WAN deployment 
  • Describe the challenges of accessing SaaS applications in modern business environments and explore the Cisco SD-WAN Cloud OnRamp for SaaS solution with direct or centralized internet access 
  • Introduce the Cisco Secure Firewall platforms, use cases, and security capabilities 
  • Demonstrate a comprehesive understanding of web application firewalls 
  • Demonstrate a comprehensive understanding of Cisco Secure Workload capabilities, deployment options, agents, and connectors 
  • Demonstrate a comprehensive understanding of Cisco Secure Workload application dependency mapping and policy discovery 
  • Demonstrate a comprehensive understanding of common cloud attack tactics and mitigation strategies 
  • Demonstrate a comprehensive understanding of multicloud security requirements and policy capabilities 
  • Introduce the security issues with the adoption of public clouds and common capabilities of cloud visibility and assurance tools to mitigate these issues 
  • Introduce Cisco Secure Network Analytics and Cisco Security Analytics and Logging 
  • Describe Cisco Attack Surface Management 
  • Describe how Application Program Interfaces (APIs) and automation can help in troubleshooting cloud policy, especially in the context of misconfigurations 
  • Demonstrate a comprehensive knowledge of the appropriate responses to cloud threats in specific scenarios 
  • Demonstrate the comprehensive knowledge required to use automation for cloud threat detection and response 

Course Content

Certificate-Based User and Device Authentication

  • PKI Overview
  • PKI Operations
  • User versus Machine or Device-Based Certificates
  • 802.1X and EAP Methods
  • Cisco ISE Certificate Services
  • Cisco ISE BYOD Client Certificate Configuration 

Cisco Duo Multifactor Authentication for Application Protection

  • Zero Trust Security Using MFA
  • About Duo MFA and Splunk 

Cisco Duo with AnyConnect VPN for Remote Access

  • Use Cisco Duo Authentication
  • About Cisco Duo MFA and Remote Access VPN

Introducing Cisco ISE Endpoint Compliance Services

  • Endpoint Compliance Services Overview 

SSO using SAML or OpenID Connect

  • SSO using Security Assertion Markup Language
  • Using SAML or OpenID Connect
  • Single Sign-On with Cisco Duo

Reverse Proxy

  • Reverse Proxy
  • Reverse Proxy Implementation to Protect Applications

Cisco SD-WAN Security Content Filtering

  • Cisco SD-WAN Content Filtering
  • Secure Direct Internet Access
  • Impelmenting Unified Security Polices 

Cisco SD-WAN to Cisco Umbrella SIG Integration

  • SIG Overview
  • Integrating SIG and Cisco SD-WAN
  • Cisco Umbrella DNS Deep Dive
  • Cisco Umbrella CDFW and IPS
  • Cisco Umbrella Secure Web Gateway

Cisco Umbrella Cloud Access Security Broker

  • Cloud Application Security Overview
  • Implementing Cisco Umbrella CASB

Security Policies for Remote Access VPN 

  • Cisco Secure Firewall Remote Access VPN Security
  • Cisco IOS XE SD-WAN Remote Access VPN Security

Cisco Secure Access

  • Cisco Secure Access: SSE Reimagined
  • Cisco Secure Client New Capabilities
  • QUIC and MASQUE Protocol Benefits
  • Cisco Secure Access Use Cases

Cisco Secure Firewall 

  • Cisco Secure Firewall Platforms
  • Cisco Secure Firewall Use Cases
  • Cisco Secure Firewall Policies Configuration

Web Application Firewall 

  • Introduction to WAFs
  • Cisco Secure WAF Best Practices

Cisco Secure Workload Deployments, Agents, and Connectors

  • Cisco Secure Workload Capabilities and Deployments
  • Cisco Secure Workload Deployments, Agents and Connectors

Cisco Secure Workload Structure and Policy

  • Cisco Secure Workload Inventory and Scopes
  • Cisco Secure Workload Workspaces
  • Cisco Secure Workload Policy Discovery

Multicloud Security Policies

  • Multicloud Security Policies Benefits and Requirements
  • Multicloud Security Architecture
  • Cisco Multicloud Defense

Cloud Security Attacks and Mitigations

  • Cloud Security Models
  • MITRE ATT&CK®  Framework
  • MITRE ATT&CK®  Matrix for Enterprise Cloud-Based Techniques
  • Practical Application of MITRE ATT&CK®
  • MITRE ATT&CK® Navigator

Cloud Visibility and Assurance

  • Cloud Visibility and Assurance Requirements
  • Cloud Visibility and Assurance Tools
  • Cloud Visibility and Assurance Automation

Cisco Secure Network Analytics and Cisco Secure Analytics and Logging

  • Cisco Secure Network Analytics
  • Cisco Secure Network Analytics Components
  • Secure Network Analytics Use Cases
  • Cisco Security Analytics and Logging (SAL)

Cisco XDR

  • Cisco XDR Overview
  • Cisco XDR Components
  • Cisco Secure Cloud Analytics

Cisco Attack Surface Management

  • Cisco Attack Surface Management Introduction
  • Cisco XDR Integration
  • Cisco Attack Suface Management Use Cases

Cloud Applications and Data Access Verifications

  • User Cloud Access Verification
  • User Cloud Access Verification Using Cisco Duo
  • User Cloud Access Verification Using Cisco Cloud Analytics
  • User Cloud Access Verification Usng Cisco Secure Workload
  • User Cloud Access Verification Usng Cisco Umbrella
  • User Cloud Access Verification Usng Cisco Secure Firewall

Industry Security Frameworks

  • Introduction to Security Frameworks
  • National Institute of Standards and Technologies Cybersecurity Framework
  • Cybersecurity and Infrastructure Security Agency Framework
  • Defense Information System Agency Framework
  • Comparison of Security Frameworks

Cisco Security Reference Architecture Fundamentals

  • Talos Threat Intelligence
  • XDR Security Operations Toolset
  • User/Device Security
  • Network Security: Cloud Edge and On-Premises
  • Workload, Application and Data Security

Cisco Security Reference Architecture Common Use Cases

  • Common Identity
  • Converged Multicloud Policy
  • SASE Integration
  • ZeroTrust Network Access
  • XDR Telemetry and Orchestration

Cisco SAFE Architecture

  • Cisco SAFE Framework
  • Key Components of Cisco SAFE
  • Cisco SAFE Phases

Exploring Cisco SD-WAN ThousandEyes

  • Cisco ThousandEyes Overview
  • Deploying Cisco ThousandEyes with Cisco SD-WAN

Automation of Cloud Policy

  • Automation of Cloud Policy
  • Tools for Automation of Cloud Policy and Troubleshooting

Response to Cloud Threats

  • Threat Response Fundamentals
  • Response to Data Breaches and User or Application Compromises
  • Regulartory Changes and Security Audit Responses

Automation of Cloud Threat Detection and Response

  • Cloud Threat Detection and Respnse Automation
  • Automation of Cloud Threat Detection and Response Tools
  • Cisco XDR Response Tasks and MITRE ATT&CK® Mappings 

Labs:

  • Discovery Lab 1:  Windows Client BYOD Onboarding Interactive Activity 
  • Discovery Lab 2:  Use Cisco Duo MFA to Protect the Splunk Application 
  • Discovery Lab 3:  Integrate the Cisco Duo Authentication Proxy to Implement MFA for Cisco Security Secure Firewall AnyConnect Remote Access VPN 
  • Discovery Lab 4:  Test and Monitor Compliance – Based Access 
  • Discovery Lab 5 : Implement Web Security 
  • Discovery Lab 6:  Deploy DIA Security with Unified Security Policy 
  • Discovery Lab 7:  Configure Cisco Umbrella DNS Policies 
  • Discovery Lab 8 : Deploy Cisco Umbrella Secure Internet Gateway 
  • Discovery Lab 9:  Implement CASB Security
  • Discovery Lab 10:: Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Discovery Lab 11:  Configure Cisco Secure Firewall Policies
  • Discovery Lab 12:  Explore Cisco Secure Workload 
  • Discovery Lab 13:  Explore the ATT&CK Matrix Cloud-Based Techniques 
  • Discovery Lab 14:  Explore Cisco Secure Network Analytics
  • Discovery Lab 15: Explore Cisco XDR Control Center and Investigate 
  • Discovery Lab 16: Explore Cisco XDR Incident Response Tasks 

Course Overview

This four-day course is designed to provide students with the knowledge required to configure and manage subscriber management on devices running the Junos operating system. 

This course focuses on the main configuration components of subscriber management, including subscriber authentication, authorization, and accounting (AAA), Dynamic Host Configuration Protocol (DHCP) local server and DHCP relay/proxy agent, the Point-to-Point Protocol (PPP), subscriber addressing, dynamic profiles, subscriber interfaces, Layer 3 and Layer 2 wholesale services, Pseudowire Head-end Termination (PHT), L2TP, dynamic firewall services, subscriber class of service (CoS), dynamic multicast services, basic NAT and CGN functions, and Subscriber Secure Policy (SSP, or Lawful Intercept). 

Through demonstrations and hands-on labs, students will gain experience in configuring, monitoring, and troubleshooting subscriber management features on MX Series Universal Edge Routers running the Junos OS. This course is based on the Junos OS Release 20.1R1.11.

The Junos Subscriber Management (JSM) course is an intermediate-level course.

Course Objectives

• Describe the fundamentals of subscriber management on a device running the Junos OS, including broadband access design concepts, hardware and software requirements, and configuration components.

• Configure subscriber AAA.

• Configure, verify, and troubleshoot extended DHCP local server, extended DHCP relay agent, and DHCP relay proxy mode.

• Configure dynamic Point-to-Point Protocol over Ethernet (PPPoE) for subscriber access.

• Configure subscriber addressing.

• Configure, verify, and troubleshoot dynamic profiles.

• List predefined Junos variables used in subscriber management.

• Configure, verify, and troubleshoot static and dynamic virtual LANs (VLANs).

• Configure, verify, and troubleshoot static and dynamic subscriber interfaces.

• Describe Layer 2 and Layer 3 wholesale services.

• Configure and implement Layer 2 and Layer 3 wholesale services.

• Configure, verify, and troubleshoot pseudowire head-end termination.

• Configure, verify, and troubleshoot L2TP.

• Configure, verify, and troubleshoot dynamic firewall services.

• Configure, verify, and troubleshoot subscriber CoS.

• Configure, verify, and troubleshoot dynamic multicast services.

• Configure, verify, and troubleshoot basic NAT functions.

• Configure, verify, and troubleshoot Subscriber Secure Policy (Lawful Intercept).

Course Content

Day 1

Course Introduction

Introduction to Subscriber Management

• Overview and Terminology

• Broadband Access Network Design and Concepts

• Configuration and Operational Flow

• Software Licensing

Access Management

• Access Management Overview

• AAA Services

• Extended DHCP Local Server 

• Extended DHCP Relay

• Subscriber Addressing

• L2TP Subscriber Access

Lab 1: Configuring Subscriber Access 

Subscriber Interfaces and Dynamic Profiles

• Junos Interfaces Overview

• VLAN Types

• Dynamic Profiles

• Subscriber Interfaces

• Monitoring and Troubleshooting Tools

Lab 2: Configuring Interfaces and Dynamic Profiles

Day 2

Dynamic PPPoE for Subscriber Access

• PPPoE Overview

• Dynamic PPPoE Overview and Operational Flow

• Dynamic PPPoE Interface Configuration 

• PPPoE Service Table Names

Lab 3: Configuring Dynamic PPPoE Subscriber Access

Layer 3 and Layer 2 Wholesale Services 

• Wholesale Services Overview

• Layer 3 DHCP Wholesale 

• Layer 3 PPPoE Wholesale 

• Layer 2 Wholesale 

Lab 4: Configuring Layer 3 Wholesale Services 

Layer 2 Tunneling Protocol (L2TP)

• L2TP Overview 

• LAC and LNS Functions 

• LAC Tunnel Selection

• L2TP Configuration 

Lab 5: Configuring L2TP for Subscriber Access

Day 3

Pseudowire Head-End Termination (PHT) 

• MPLS Pseudowire for Subscribers

• Pseudowire Subscriber Interfaces

• Configuring Hierarchical CoS Pseudowire Subscriber Interfaces

Lab 6: Configuring MPLS Pseudowire for Subscribers 

Subscriber Class of Service

• Class of Service Overview

• Traffic Classification, Queuing, and Scheduling 

• Implementing Subscriber Class of Service 

• Monitoring and Troubleshooting Tools

Lab 7: Configuring Subscriber Class of Service

Dynamic Firewall Services

• Firewall Filters Overview

• Implementing Dynamic Firewall Services

• Monitoring Firewall Filters and Counters

Lab 8: Configuring Dynamic Firewall Services

Day 4

Dynamic Multicast Services

• IGMP Overview

• Implementing Dynamic Multicast Services

• Monitoring Multicast and IGMP

Lab 9: Configuring Dynamic Multicast Services 

Carrier Services

• NAT and CGNAT Services

• Subscriber Secure Policy (Lawful Intercept)

Course Overview

This four-day course is designed to provide students with the knowledge required to implement Juniper Networks vSRX in AWS and Azure environments.

Through demonstrations and hands-on labs, students will gain in-depth knowledge about the manual and automated methods used to deploy the vSRX in multicloud environments.

This course uses various releases of the vSRX as well as Junos Space, Security Director, Policy Enforcer and ATP Cloud.

This is an intermediate level course.

Relevant Juniper Product

• Juniper ATP Cloud • Juniper Connected Security • Junos PyEZ • Junos Space Security Director

• Policy Enforcer • SRX Series • vSRX Series

Course Objectives

• Describe cloud concepts.

• Describe how virtualization is used in the cloud.

• Describe various security designs used in the cloud.

• Describe the AWS architecture and explain how each component is used.

• Access the AWS management console.

• Launch AWS EC2 instances.

• Navigate the AWS Marketplace and locate Juniper products.

• Describe the operation of the vSRX in AWS.

• Launch a vSRX instance in AWS.

• Configure a vSRX instance to forward traffic.

• Describe CloudFormation features.

• List CloudFormation template formats.

• Describe JSON and YAML fundamentals.

• Deploy vSRX instances using a CloudFormation template.

• Describe Microsoft Azure cloud services.

• Describe Microsoft Azure cloud architecture.

• Navigate the Microsoft Azure portal.

• Launch Microsoft Azure virtual machine instances.

• Navigate the Microsoft Azure Marketplace and locate Juniper products.

• List the vSRX offerings in Microsoft Azure.

• Describe pre-launch considerations for the vSRX in Microsoft Azure.

• List the steps required to launch the vSRX in Microsoft Azure.

• Describe the configuration needed for the vSRX to function in Microsoft Azure.

• Describe the Microsoft Azure Resource Manager Features.

• Describe the Microsoft Azure Resource Manager template format.

• Deploy a vSRX instance using Microsoft Azure Resource Manager.

• List different methods used to connect cloud resources.

• Describe secure connection options.

• Establish an IPsec tunnel between an enterprise/SRX and an AWS Virtual Private Gateway.

• Establish an IPsec tunnel between an enterprise SRX and a vSRX instance in AWS.

• List advanced vSRX security features that are used to protect cloud resources.

• Describe the benefits of Terraform in multicloud environments.

• Deploy and destroy vSRX instances in AWS and Microsoft Azure using Terraform.

• Describe Juniper Connected Security components.

• Configure the components used to support Juniper Connected Security in the cloud.

• Configure Security Director, Policy Enforcer, and ATP Cloud.

• Implement Juniper Connected Security to dynamically secure AWS resources.

• Implement an AWS Transit Gateway to secure cloud resources.

• Deploy an AWS Elastic Load Balancer and Auto Scaling Group to provide highly available cloud security capabilities.

Course Content

DAY 1

Course Introduction

Cloud Overview

• Cloud Concepts

• Cloud Virtualization

• Cloud Security

Introduction to AWS

• Describe AWS architecture

• Access the AWS Management Console

• Launch AWS EC2 instances

• Explore the AWS Marketplace

Lab 1: Introduction to AWS

Implementing vSRX in AWS

• Explain the operation of an AWS vSRX instance

• Launch an AWS vSRX instance

• Configure an AWS vSRX instance

Lab 2: Implementing vSRX in AWS

DAY 2

AWS CloudFormation

• Describe AWS CloudFormation

• Describe CloudFormation templates

• Describe JSON and YAML fundamentals

• Use CloudFormation to deploy a vSRX instance

Lab 3: CloudFormation

Introduction to Microsoft Azure

• Describe Microsoft Azure services

• Describe Microsoft Azure architecture

• Navigate the Microsoft Azure portal

• Launch a Microsoft Azure virtual machine

• Locate Juniper Networks products in the MicrosoftAzure Marketplace

Lab 4: Introduction to Microsoft Azure

Implementing vSRX in Azure

• Describe prelaunch considerations for MicrosoftAzure vSRX instances

• Launch a Microsoft Azure vSRX instance

• Describe the required vSRX Microsoft Azureconfiguration

Lab 5: Implementing vSRX in Microsoft Azure

DAY 3

Microsoft Azure Resource Manager

• Describe Microsoft Azure Resource Managercapabilities

• Describe Microsoft Azure Resource Managertemplates

• Create Microsoft Azure Resource Managertemplates

• Deploy a vSRX instance using a Microsoft AzureResource Manager template

Lab 6: Microsoft Azure Resource Manager

Cloud Connectivity

• List cloud connectivity options

• Describe how IPsec tunnels are established

• Establish an IPsec tunnel between an enterpriseSRX and an AWS VPC

• Configure an IPsec tunnel between an enterpriseSRX and an AWS vSRX instance

• Use the vSRX to configure an IPsec tunnelbetween AWS VPCs

Lab 7: Cloud Connectivity

AWS Transit Gateway

• Explain AWS Transit Gateway use cases

• Deploy an AWS Transit Gateway and a vSRXinstance

Lab 8: AWS Transit Gateway

DAY 4

Load Balancing and Auto Scaling

• Describe load balancing and auto scaling•Load-balance and auto scale vSRX instances

Terraform

• Explain multicloud complexity

• Explain Terraform concepts

• Manage multicloud infrastructure usingTerraform

Lab 9: Terraform

Class of Service

• Describe Juniper Connected Security

• Configure AWS components for JuniperConnected Security

• Implement Juniper Connected Security withAdvanced Threat Prevention

Lab 10: Advanced Cloud Security

Course Overview

Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats.

Note: You’ll need to have access to a Microsoft 365 E5 Tenant with a Microsoft Defender for Endpoint P2 license to perform the exercises.

Course Objectives

In this course you will learn:

  • How the Microsoft Defender portal provides a unified view of incidents from the Microsoft Defender family of products.
  • How to eploy the Microsoft Defender for Endpoint environment, including onboarding devices and configuring security.
  • How to configure settings to manage alerts and notifications. You’ll also learn to enable indicators as part of the detection process.
  • Howto configure automation in Microsoft Defender for Endpoint by managing environmental settings.
  • How to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint, and onboard devices. You also configured policies, mitigated threats and responded to incidents with Defender XDR.

Course Content


Module 1: Mitigate incidents using Microsoft Defender

  • Introduction
  • Use the Microsoft Defender portal
  • Manage incidents
  • Investigate incidents
  • Manage and investigate alerts
  • Manage automated investigations
  • Use the action center
  • Explore advanced hunting
  • Investigate Microsoft Entra sign-in logs
  • Understand Microsoft Secure Score
  • Analyze threat analytics
  • Analyze reports
  • Configure the Microsoft Defender portal
  • Knowledge check
  • Summary and resources

Module 2: Deploy the Microsoft Defender for Endpoint environment

  • Introduction
  • Create your environment
  • Understand operating systems compatibility and features
  • Onboard devices
  • Manage access
  • Create and manage roles for role-based access control
  • Configure device groups
  • Configure environment advanced features
  • Knowledge check

Module 3: Configure for alerts and detections in Microsoft Defender for Endpoint

  • Introduction
  • Configure advanced features
  • Configure alert notifications
  • Manage alert suppression
  • Manage indicators
  • Knowledge check
  • Summary and resources

Module 4: Configure and manage automation using Microsoft Defender for Endpoint

  • Introduction
  • Configure advanced features
  • Manage automation upload and folder settings
  • Configure automated investigation and remediation capabilities
  • Block at risk devices
  • Knowledge check
  • Summary and resources

Module 5: Perform device investigations in Microsoft Defender for Endpoint

  • Introduction
  • Use the device inventory list
  • Investigate the device
  • Use behavioural blocking
  • Detect devices with device discovery
  • Knowledge check
  • Summary and resources

Module 6: Defend against Cyberthreats with Microsoft Defender XDR lab exercises

  • Introduction
  • Configure the Microsoft Defender XDR environment
  • Deploy Microsoft Defender for Endpoint
  • Mitigate Attacks with Microsoft Defender for Endpoint
  • Summary

Course Overview

Understand and apply threat modeling techniques to enhance cybersecurity.

Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course covers various threat modeling frameworks such as STRIDE, PASTA, and VAST, and their application in different contexts, including microservices, containerized architectures, and IoT systems. By integrating threat intelligence and advanced risk assessment techniques, students will gain the skills to develop robust threat models that enhance security operations and DevSecOps pipelines.

Throughout the course, attendees will engage in hands-on exercises using tools like OWASP Threat Dragon and Microsoft Threat Modeling Tool to create and evaluate threat models. They will also explore the role of threat intelligence in dynamic environments and learn to automate threat modeling processes within CI/CD pipelines. By the end of the course, participants will be equipped to design and implement effective threat models for various scenarios, ensuring comprehensive security coverage for their organizations.

This course is ideal for professionals looking to deepen their understanding of threat modeling and its practical applications in real-world environments. Join us to enhance your cybersecurity skills and stay ahead of emerging threats.

Course Objectives

  • Describe the concepts of Security as Code and DevSecOps.
  • Explain the characteristics of advanced persistent threats, social engineering, supply chain attacks, and insider threats.
  • Compare and contrast different threat modeling frameworks like STRIDE, PASTA, and VAST, and their applicability in complex contexts.
  • Analyze and evaluate different threat modeling techniques and tools for modeling microservices and containerized architectures, hybrid, multi-cloud, and edge computing environments, and IoT systems.
  • Summarize and interpret the role of threat intelligence in dynamic environments and the ways to integrate it into threat models and security operations.
  • Create attack trees and threat models for distributed systems using open-source tools like OWASP Threat Dragon and Microsoft Threat Modeling Tool.
  • Adapt multiple frameworks to a sample complex system and develop a threat model for a multi-cloud architecture or IoT ecosystem.
  • Implement advanced risk assessment techniques for a complex system, map threat models to security controls, and develop a threat model for a microservices-based app.
  • Evaluate the effectiveness of different threat modeling tools and techniques to enhance static and dynamic code analysis and tool compatibility and limitations.
  • Analyze and compare the characteristics of different attack chains, such as APTs and ransomware, and develop threat models for specific attack vectors.
  • Assess the strengths and weaknesses of group-based threat modeling activities and provide constructive feedback to peers.
  • Design a threat model for Zero Trust policies, integrate it with SOAR tools, and automate threat modeling in a DevSecOps pipeline.
  • Develop adaptable and reusable threat models in Agile using modular approaches and reusable templates for microservices.
  • Build and align a threat model with a sample application SDLC and create an iterative feedback loop for security improvement.
  • Critique and analyze the success stories and lessons learned from case studies of CI/CD integrations in large organizations.
  • Evaluate the appropriateness of different threat modeling frameworks, techniques, and tools in different complex contexts, and propose solutions to mitigate identified security threats.

Course Content


Introduction to Advanced Threat Modeling
Review of STRIDE, PASTA, and VAST in complex contexts
Integrating threat modeling with attack trees, attack vectors, and data flow analysis
Threat modeling for large-scale distributed systems
Combining multiple frameworks for a holistic approach

Threat modeling for hybrid, multi-cloud, and edge computing environments
Advanced techniques for modeling microservices and containerized architectures (e.g., Kubernetes, Docker)
Modeling for IoT systems: securing device communication and protocols

The role of threat intelligence in dynamic environments
Using Open-Source and Commercial Threat Intelligence Feeds
Integration of threat intelligence into threat models and security operations
Automating threat intelligence collection for continuous threat modeling updates

Quantitative vs. Qualitative Risk Assessment
Advanced risk prioritization: Bayesian networks, Monte Carlo simulations, and decision trees
Using threat modeling results to drive prioritization of security controls
Real-time risk assessment tools and technologies

Key principles and strategies of Zero Trust
Threat modeling for Zero Trust: securing identity, authentication, and access controls
Integrating threat modeling with Security Automation and Orchestration (SOAR)
Automating threat modeling in a DevSecOps pipeline

Security as Code: Embedding Threat Modeling into Automated Workflows
Integrating Threat Modeling Tools with DevSecOps Pipelines (e.g., Jenkins, GitLab)
Continuous Threat Detection and Monitoring Using Automated Threat Models
Case Studies of CI/CD Integrations in Large Organizations
Lessons learned and best practices

Threat Modeling in Agile and Scrum Teams
Modeling Security Risks in Rapidly Changing Architectures and Microservices
Techniques for Creating Adaptable and Reusable Threat Models in Agile
Collaboration Between Developers, Security, and Operations Teams

Best Practices for Embedding Threat Modeling at Each Phase of the SDLC
Threat Modeling Tools and Techniques to Enhance Static and Dynamic Code Analysis
Continuous Feedback Loops: Incorporating Findings into Subsequent Development Phases

Advanced Persistent Threats (APTs): Threat Modeling for Long-term, Sophisticated Attacks
Social Engineering, Supply Chain Attacks, and Insider Threats Modeling
Modeling for Advanced Malware and Ransomware Threats
Simulating Complex Attack Chains with Attack Trees and Kill Chains

Group-based Threat Modeling: Collaborative Analysis of a Multi-layered Enterprise System
Presentations and Peer Reviews of Group Models