CUSTOMISED
Expert-led training for your team
Dismiss

Enhancing RTMP training course

Enhancing the RTMP; adding new capabilities to the threat model process."Rapid Threat Model Prototyping" explores agile techniques for swift threat model development. Learn to integrate new capabilities like privacy, pattern-tagging, and triage calculation into your threat modeling process.

JBI training course London UK

"Our tailored course provided a well rounded introduction and also covered some intermediate level topics that we needed to know. Clive gave us some best practice ideas and tips to take away. Fast paced but the instructor never lost any of the delegates"

Brian Leek, Data Analyst, May 2022

Public Courses

27/01/25 - 2 days
£1500 +VAT
10/03/25 - 2 days
£1500 +VAT
21/04/25 - 2 days
£1500 +VAT

Customised Courses

* Train a team
* Tailor content
* Flex dates
From £1200 / day
EDF logo Capita logo Sky logo NHS logo RBS logo BBC logo CISCO logo
JBI training course London UK

Enhancing RTMP Training: 

  • Strengthen threat model processes
  • Integrate privacy and pattern-tagging
  • Implement triage calculation techniques
  • Foster development of new capabilities
  • Enhance security measures through practical application
  • Hands-on sessions with security frameworks
  • Swift threat model prototyping techniques

Empower your security strategies with our Enhancing "Rapid Threat Model Prototyping" (RTMP ) course. Join us to revolutionize your threat modeling approach and fortify your defenses against evolving threats

Review of RTMP

  • STRIDE
  • breakdown of a general TM (flows, nodes, etc.)
  • RTMP Zones-of-Trust
  • RTMP math rules
  • Understanding the security implications through the STRIDE framework
  • Breaking down the components of a general Trust Model (flows, nodes, etc.)
  • Exploring RTMP Zones-of-Trust for enhanced security measures
  • Delving into the mathematical rules governing RTMP

Applying the attack Killchain to STRIDE and ATT&CK

  • mapping killchain to STRIDE
  • mapping killchain to nodes and flows
  • Exploring the application of the Killchain methodology to STRIDE
  • Analyzing the correlation between Killchain phases and STRIDE elements
  • Mapping the Killchain framework to nodes and flows within the system
  • Investigating the alignment of Killchain stages with ATT&CK tactics 

Inspecting OSI protocols and applying OSI model to threat modeling

  • mapping Defense-In-Depth to Zones-of-Trust
  • mapping OSI 
  • mapping OSI to Defense-In-Depth
  • mapping OSI to design using Defense-In-Depth

Using LINNDUN for privacy

  • Introducing LINNDUN
  • GDPR 6 Principles
  • vs
  • 7 Data Privacy Principles
  • mapping LINNDUN to design using principles

 

 

JBI training course London UK

For RTMP practitioners who want more in-depth threat model tools

 Ideal for:

  • Security professionals
  • Threat analysts
  • System architects
  • Software developers
  • IT administrators
  • Compliance officers
  • Anyone involved in security and risk management

5 star

4.8 out of 5 average

"Our tailored course provided a well rounded introduction and also covered some intermediate level topics that we needed to know. Clive gave us some best practice ideas and tips to take away. Fast paced but the instructor never lost any of the delegates"

Brian Leek, Data Analyst, May 2022



“JBI  did a great job of customizing their syllabus to suit our business  needs and also bringing our team up to speed on the current best practices. Our teams varied widely in terms of experience and  the Instructor handled this particularly well - very impressive”

Brian F, Team Lead, RBS, Data Analysis Course, 20 April 2022

 

 

JBI training course London UK

Newsletter

 

Sign up for the JBI Training newsletter to stay updated with world-class technology training opportunities, including Analytics, AI, ML, DevOps, Web, Backend and Security. Our Power BI Training Course is especially popular.  Gain new skills, useful tips, and validate your expertise with an industry-leading organisation, all tailored to your schedule and learning preferences.



                                                                                                    Enhancing the RTMP; adding new capabilities to the threat model process

In this intensive "Enhancing RTMP Training course", participants will embark on a journey to master the art of threat modeling in today's dynamic cybersecurity landscape. Through a blend of theoretical insights and hands-on practical exercises, attendees will learn to rapidly prototype threat models, integrate cutting-edge capabilities such as privacy and pattern-tagging, and implement triage calculation techniques to assess threats comprehensively.

Led by seasoned cybersecurity experts, the course offers a deep dive into agile methodologies for threat modeling, equipping participants with the skills to fortify security measures and anticipate emerging threats.

Moreover, participants will have the opportunity to engage in immersive hands-on sessions with security frameworks, enabling them to translate theoretical knowledge into practical applications.

By the end of the course, attendees will emerge with a heightened understanding of threat modeling methodologies and the confidence to navigate complex security challenges with precision. Whether you're a seasoned security professional or an aspiring cybersecurity enthusiast, this course offers invaluable insights and practical skills to stay ahead in today's ever-evolving threat landscape.

Who is this course designed for?

  • This course is designed for security professionals, threat analysts, system architects, software developers, IT administrators, compliance officers, and anyone involved in security and risk management.

What will participants learn in this course?

  • Participants will learn agile methodologies for threat model prototyping, integration of new capabilities into threat modeling, implementation of privacy and pattern-tagging, triage calculation methodologies, and hands-on sessions with security frameworks.

Is any prior experience required to enroll in this course?

  • While prior experience in cybersecurity is beneficial, it is not mandatory. Basic familiarity with security concepts and principles is recommended.

How is the course delivered?

  • The course is delivered through interactive online sessions led by seasoned cybersecurity experts.

What are the outcomes of completing this course?

  • Participants will emerge with enhanced skills in threat modeling, practical experience with security frameworks, and the ability to fortify security measures against emerging threats.

What resources are available to participants after completing the course?

  • Participants will have access to course materials, resources for further learning, and ongoing support from the instructor and course community.

How long is the course, and what is the schedule?

  • The course duration is flexible, typically spanning for 2 or 3 days, depending on the customization level. The schedule will be communicated to participants upon enrollment.

CONTACT
+44 (0)20 8446 7555

[email protected]

SHARE

 

Copyright © 2024 JBI Training. All Rights Reserved.
JB International Training Ltd  -  Company Registration Number: 08458005
Registered Address: Wohl Enterprise Hub, 2B Redbourne Avenue, London, N3 2BS

Modern Slavery Statement & Corporate Policies | Terms & Conditions | Contact Us

POPULAR

Rust training course                                                                          React training course

Threat modelling training course   Python for data analysts training course

Power BI training course                                   Machine Learning training course

Spring Boot Microservices training course              Terraform training course

Kubernetes training course                                                            C++ training course

Power Automate training course                               Clean Code training course