5,000+ Learners Certified

Certified Threat Modeling ProfessionalTM

Discover how threat modeling reduces security vulnerabilities by up to 65%. The curriculum covers STRIDE, PASTA frameworks, data flow analysis, ASVS and threat modeling as code techniques for modern DevOps environments that 
83% of security professionals consider essential for modern app protection

Monitor iconSelf-paced learning

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Monitor iconSelf-paced learning mode

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Monitor iconSelf-paced learning mode

Globe iconBrowser based lab access

Headset icon24/7 Instructor support

Video thumbnail

Trusted by top companies across industries, empowering thousands of professionals worldwide. Join the ranks of security leaders

Course Chapters

Loading chapters...

CTMP Threat Modeling Training Course Prerequisites

  1. Course participants should have knowledge of basic security fundamentals like Confidentiality, Integrity, and Availability (CIA)
  2. Basic knowledge of application development is preferred but is not necessary

Chapter 1: Threat Modeling Overview

  1. What is Threat Modeling?
  2. The Threat Model Parlance
    1. Security is a Balancing Act
    2. Design Flaws and Risk Rating
  3. Why Threat Model?
  4. Threat Modeling vs. Other Security Practices
  5. Threat Modeling Frameworks and Methodologies
    1. List/Library Centric Threat Modeling
    2. Asset/Goal Centric Threat Modeling
    3. Threat Actor/Attacker Centric Threat Modeling
    4. Software Centric Threat Modeling
  6. Trust Boundaries vs. Attack Surfaces
  7. Modern Threat Modeling Approaches for Agile and DevOps
  8. Risk Management Strategies with Examples
    1. Avoiding Risks
    2. Accepting Risks
    3. Mitigating Risks
    4. Transferring Risks
    1. Hands-on Exercises:
      1. Breakout Sessions to Identify Threats for a Multi-Tiered Application

    Chapter 2: Threat Modeling Basics

    1. Threat Modeling and Security Requirements
    2. Threat Modeling vs Threat Rating
    3. Diagramming for Threat Modeling
    4. List Centric Threat Modeling
    5. Exploring the STRIDE Model
      1. Spoofing
      2. Tampering
      3. Repudiation
      4. Information Disclosure
      5. Denial of Service
      6. Elevation of Privileges
    6. Pros and Cons of STRIDE
    7. STRIDE defenses
      1. Authentication
      2. Integrity
      3. Non-Repudiation
      4. Confidentiality
      5. Availability
      6. Authorization
    8. STRIDE Threat examples
    9. Goal/Asset Based modeling Approach
      1. Attack Trees
      2. Attack Tree Analysis
    10. Attacker/Threat Actor Centric Modeling Approach
      1. Using MITRE ATT&CK for Attacker Centric Threat Modeling
    11. Software Centric Threat Modeling
    12. Other Threat modeling methodologies
      1. PASTA
      2. VAST
      3. Hybrid Threat modeling
      4. RTMP
      5. OCTAVE
    13. Gamified approaches for Threat Modelling
      1. Virtual Card Games
      2. Adversary Card Games
    14. Introduction to Threat Rating
      1. DREAD
      2. OWASP Risk Rating Methodology
      3. Bug Bar
      4. Rapid Risk Assessment
    15. Hands-on Exercises:
      1. Creating a Data Flow Diagram for Threat Modeling
      2. Using OWASP Cornucopia to Identity Web Related Threats
      3. Creating Threat Actor Personas
      4. Using Threat Actor Personas to Identify Threats
      5. Risk Rating with OWASP Risk Rating Methodology

    Chapter 3: Agile Threat Modeling

    1. Agile Threat Modeling Approaches
      1. Threat Modeling Diagrams as Code
      2. Threat Modeling Inside The Code
      3. Threat Modeling as Code
      4. Compliance and Audit as Code
      5. Rapid Threat Model Prototyping
    2. Security Requirements as Code With BDD Security
    3. Events of Agile Software Development Through Scrum
    4. Writing Security Requirements for Agile Software Development
    5. Writing Use Cases and Abuse Cases
    6. Privacy Impact Assessments and Security Requirements
    7. Identifying Privacy Related Threats
    8. Hands-on Exercises:
      1. Writing Abuse Cases for Password Reset Workflow
      2. Threat Modeling Privacy for your system
      3. Exploring UML as Code
      4. Creating Attack Trees Using Code
      5. Writing Threat Models Alongside Code
      6. Writing Threat Models With Code
      7. Writing Threat Models As Code
      8. Writing Compliance As Code for PCI-DSS

    Chapter 4: Reporting and Deliverables

    1. How To Manage Threat Models
      1. Documentation
      2. Backlog
      3. Bugs, and Tickets
      4. Code
      5. Automatio
    2. Threat Modeling Tools and Templates
      1. Microsoft Threat Modeling Tool
      2. OWASP Threat Dragon
      3. CAIRIS Platform
      4. Threat Modeling As Code Tools
      5. Freemium Tools
      6. Threat Model Templates and Examples
    3. Validating Threat Models
      1. Threat Model Versus Reality
      2. All Threats Accounted For Risk
      3. Mitigations Are Tested
      4. Are We Done Threat Modeling?
      1. Hands-On Exercises:
        1. Threat Modeling with OWASP Threat Dragon
        2. Threat Modeling Multi-Tiered Application with Irius Risk
        3. Threat Modeling for Multi-Cloud with Irius Risk
        4. Validating Threats with Automated Tests
        5. Validating Mitigations with Automated Tests

      Chapter 5: Secure Design Principles and Threat Modeling Native, and Cloud Native Applications

      1. Exploring Principles of Secure Design with Examples
        1. Principle of Economy of Mechanism
        2. Principle of Fail Safe Defaults
        3. Principle of Complete Mediation
        4. Principle of Open Design
        5. Principle of Separation of Privilege
        6. Principle of Least Privilege
        7. Principle of Least Common Mechanism
        8. Principle of Psychological Acceptability
      2. Case Study of AWS S3 Threat model
      3. Case Study of Kubernetes Threat Model
      4. Case Study of Very Secure FTP daemon

      CTMP Course Certification Process

      1. After completing the course, you can schedule the CTMP exam on your preferred date.
      2. Process of achieving Practical DevSecOps CTMP Certification can be found here.

        Become a Threat Modeling Professional in 60 Days

        CTMP-left-img

        What you’ll learn from the
        Certified Threat Modeling Professional Course?

        Threat Modeling Methodologies

        • Apply STRIDE, PASTA, VAST, and RTMP frameworks
        • Identify vulnerabilities before security incidents.
        • Protect your systems and applications using proven techniques

        Agile Threat Modeling Security Integration

        • Build threat models into DevOps pipelines
        • Integrate security within CI/CD workflows
        • Transform security from blocker to enabler

        Industry-Standard Tools

        • Perform threat modeling with IriusRisk and Threat Modeler
        • Create models with OWASP Threat Dragon and CAIRIS.
        • Apply "Threat Modeling as Code" techniques

        Risk Assessment Frameworks

        • Prioritize risks using DREAD, OWASP Risk Rating Methodology and Mozilla RRA.
        • Implement risk management techniques
        • Communicate risks to stakeholders

        Cloud-Native Security

        • Design secure applications and Kubernetes workloads
        • Analyze real-world enterprise case studies
        • Validate cloud application security controls

        Security Operations at Scale

        • Build automation and reusable templates
        • Coordinate security across multiple teams
        • Meet PCI-DSS and compliance requirements

        Benefits of Enrolling in the Practical DevSecOps Courses

        Master today’s security challenges with our updated curriculum and hands-on labs, preparing you for real-world threats.

        Browser-based lab

        Access all tools and exercise directly in your browser. Enjoy a practical, hassle-free learning experience - no downloads or installations needed!

        Explore commands with our new AI-Powered 'Explain to me' feature

        Gain detailed insights into any command with our AI-powered feature, designed to enhance your understanding and accelerate your learning.

        Master cutting-edge tools

        Enhance your security skills through hands-on experience with the latest industry tools in our labs. Get equipped for real-world applications and stay ahead of industry changes.

        Become a Threat Modeling Professional in 60 Days

        Hear from our learners

        Explore the global impact of our Practical DevSecOps Certifications through our learners’ testimonials.

        ★★★★★

        Recently I completed the Certified Threat Modeling Professional (CTMP) course, and exam, from @pdevsecops…..

        Adin Ermie
        Adin Ermie
        Cloud Solutions Architect/Engineer…

        ★★★★★

        I’m grateful to share that I’ve earned the Certified Threat Modeling Professional (CTMP) certification.

        This milestone wouldn’t have been possible without the unwavering support of my family—thank you for being my constant source of strength…

        Akanksha Pathak
        Akanksha Pathak
        Senior Cybersecurity Consultant …

        ★★★★★

        Pleased to announce that I have achieved the Certified Threat Modeling Professional (CTMP) certification by Practical DevSecOps.

        My favourite part of the course was Threat Modeling as Code, especially using pyTM….

        Kenechukwu Ojiteli
        Kenechukwu Ojiteli
        Cloud DevOps Engineer | Security-First…

        ★★★★★

        So glad that I took the Certified Threat Modeling Professional course and the exam.

        I ended up working more than 12 hours just on the exam and to perfect the report alone – not to mention the great courseware. It gave me…

        Balázs Greksza
        Balázs Greksza
        Director Advanced Threat Operations…

        ★★★★★

        Threat Modeling is always one of the best and overlooked tool to develop your security requirements and identify your security control gaps.

        Interestingly, you may have already performed…

        Dickie Kai Ching Ku
        Dickie Kai Ching Ku
        Senior Cyber Security Operations…

        ★★★★★

        I am excited to announce that I have successfully cleared the CTMP (Certified Threat Modeling Professional) Certification from Practical DevSecOps.

        Huge Thanks to Marudhamaran Gunasek….

        Naveen Bhat
        Naveen Bhat
        InfoSec Professional | CTMP | CEH…

        ★★★★★

        🌟 I’m thrilled to share that I have successfully passed the Certified Threat Modeling Professional (CTMP) certification by Practical DevSecOps. This certification was long overdue, and completing it has been an incredible learning journey.

        The #CTMP not only deepened my…

        Arun K. Mishra
        Arun K. Mishra
        Advance Product Security Engineer

        ★★★★★

        I am happy to share that I earned my Threat Modeling Certification from Practical DevSecOps.

        This hands-on training deepened my understanding of threat modeling methodologies such as STRIDE, Attack Trees and Data Flow Diagrams (DFDs) — all essential for building secure-by-design…

        Leotrim Dani
        Leotrim Dani
        Manager IT Operations and Architecture

        ★★★★★

        In today’s cybersecurity landscape, waiting for threats isn’t a strategy—it’s a liability.

        While others plug holes, let’s design systems that don’t leak.
        Proud to have earned the Certified Threat Modeling….

        Priyam Bhavsar
        Priyam Bhavsar
        Pentester & DevSecOps Professional NF…

        ★★★★★

        This certification program of Practical DevSecOps validates expertise in threat modeling, helps identify potential weaknesses, and develops strategies to mitigate threats using UML, STRIDE, OWASP ASVS, Use Cases and Abuse Cases.

        Certifies the ability to understand,…

        Víctor Pacajoj
        Víctor Pacajoj
        MA. of Information Security | DevSecOps…

        ★★★★★

        🎉 I’m thrilled to announce that I have successfully completed the Certified Threat Modeling Professional (CTMP) by Practical DevSecOps! 🚀

        This certification journey has been an eye-opening experience, diving deep into the world of **Threat Modeling** and its critical role in building…

        Marcos Martín Gutiérrez
        Marcos Martín Gutiérrez
        Cybersecurity Engineer | Master‘s…

        ★★★★★

        This is a course with a big emphasis on learning by doing, and exam was the most intensive since OSCP almost ten years ago.

        Would totally recommend this course to anyone interested in building systems that are secure by design and default. Thanks for a great…

        Kim Syversen
        Kim Syversen
        Senior Manager @ EY | Cybersecurity

        Frequently asked questions

        What are the prerequisites required before enrolling in the Certified Threat Modeling Professional Course?

        To enroll in the CTMP course, students should have a basic understanding of security fundamentals such as confidentiality, integrity, and availability. While application development knowledge is beneficial, it is not mandatory.

        What's included in the Certified Threat Modeling Professional course package?

        The course includes 3 years of video access, 60 days of browser-based labs, 30+ guided lab exercises, a PDF manual, 24/7 student support, and a one exam attempt.

        Do the labs for the Certified Threat Modeling Professional course start immediately after enrollment?

        No, The Threat Modeling course does not begin automatically upon enrollment. After purchasing the course, students will have the opportunity to select their desired start date, which will mark the beginning of their course access period.

        Does the course come with CPE points?

        Yes, the course offers 24 CPE (Continuing Professional Education) points upon completion.

        What is the exam format?

        The exam consists of 5 challenges to be solved within 6 hours, followed by a 24-hour window to complete and submit the report for evaluation. For more information, visit this link.

        Should I go to an exam center, or is the exam online?

        Yes, it is an online exam. You can take the exam from the comfort of your home or office.

        How long is the Certified Threat Modeling Professional course Valid?

        Threat Modeling Certification is a lifetime credential. Once you’ve earned your certification, it will last throughout your career.

        What's the Financial Return on completing the Certified Threat Modeling Professional course?

        Here’s the reality: threat modeling is so specialized that even Fortune 500 companies have maybe a handful of experts who truly understand it. That scarcity is your opportunity.

        While most security professionals earn $85,000–$95,000, CTMP-certified threat modelers command $140,000–$180,000. Why the massive difference? Because you’re one of the rare few who can actually do this work. The market is exploding from $1.06 billion today to a projected $58.13 billion by 2034, but there’s almost nobody qualified to fill these roles.

        This isn’t just another security certification where you’re competing with thousands of others. Threat modeling is so niche that having CTMP certification basically makes you a unicorn. Security analysts, software architects, and senior developers are trying to break into this field, but very few actually master it.

        Why Certified Threat Modeling Professional Course from Practical DevSecOps?

        The first of its kind vendor-neutral Certified Threat Modeling Professional Certification delivers hands-on training through real-world exercises across all five chapters. Unlike theoretical courses, it focuses on practical implementation in DevSecOps environments with expert instructors who’ve successfully integrated threat modeling into Agile and CI/CD workflows.

        What will you learn:

        Implement four proven methodologies (STRIDE, PASTA, VAST, RTMP) to identify vulnerabilities before deployment. 

        • Create threat models using industry tools and “Threat Modeling as Code” techniques. Apply risk frameworks to prioritize issues and communicate effectively with stakeholders.
        • Build scalable security processes that work across teams while meeting compliance standards.

        Unmatched practical focus

        70% hands-on labs for Mastering real-world scenario’s.

        Expert-crafted curriculum

        Get real-world insights from the experienced Security Experts.

        Practical exam

        Take a 6-hour examination to show what you have learned.

        24/7 expert support

        Unbeatable guidance throughout your learning journey.
        future-proof-sec-img

        Future-Proof Your Career with Threat Modeling Training

        Unlock your potential with Threat Modeling Training! Our Certified Threat Modeling Professional Course equips you with job-ready skills. Conquer the 6-hour exam with confidence and open doors to exciting opportunities and Challenges.

        Morty Proxy This is a proxified and sanitized view of the page, visit original site.