Threat Modeling with STRIDE 2026

Threat Modeling with STRIDE

Fast-Track Hands-on Bootcamp

7th & 8th February 2026
10:30 AM - 2:30 PM (IST)
8 CPE
Hands-on Sessions
Assessment Integrated
STRIDE Framework
Why Attend?

In an age of advanced cyber threats, proactive defence starts with intelligent design. This immersive hands-on bootcamp will equip you with practical experience in Threat Modeling using STRIDE, a framework trusted by top security architects and auditors worldwide.

You’ll learn to identify vulnerabilities before code is written or deployed, ensuring your systems are secure by design, not by chance.

By the end of this course, you'll be able to:

  • Understand the fundamentals of threat modeling and its role in secure design
  • Apply the STRIDE methodology to systematically uncover threats
  • Create data flow diagrams and mark trust boundaries effectively
  • Conduct structured threat analysis sessions across complex systems
  • Develop prioritized mitigation strategies based on risk severity
  • Document and communicate your findings for audit and compliance
Expert Speaker
Pushpinder

Pushpinder

17+ Years of Experience

CCIE R&S (#40412) | SABSA CSF | AWS Security Speciality | AWS Networking Speciality | AWS Solutions Architect | CCSP | CCSK

Pushpinder is a seasoned cybersecurity and cloud architecture professional with a proven track record in designing, securing, and governing large-scale enterprise infrastructures across hybrid and multi-cloud environments.

His specializations include:

  • Secure cloud and network architecture design (Azure, AWS, on-prem)
  • Zero Trust implementation and DevSecOps integration
  • Cloud compliance and risk governance frameworks (ISO 27001, NIST 2.0)
  • Identity and access management (IAM) and data protection strategies
  • Threat surface reduction through proactive architecture hardening

Having led security transformation initiatives across global enterprises, Pushpinder brings a practitioner's perspective on how to integrate threat modeling and risk mitigation directly into system design. He doesn't just secure systems—he teaches you how to think like an attacker, design like an architect, and defend like an auditor.

🔒 Limited Seats Available!

Secure Your Spot Now!

Claim the early-bird offer before it expires!

Bootcamp Agenda

DAY 1: Foundations of Threat Modeling

Introduction to Threat Modeling

  • What is threat modeling and why it matters
  • Integration into the software development lifecycle
  • Common threat modeling methodologies overview

STRIDE Methodology Deep Dive

  • Spoofing - Identity verification failures
  • Tampering - Unauthorized data modification
  • Repudiation - Denial of actions performed
  • Information Disclosure - Unauthorized data access
  • Denial of Service - System availability attacks
  • Elevation of Privilege - Unauthorized access escalation

Data Flow Diagrams and Trust Boundaries

  • External entities, processes, and data stores
  • Drawing effective DFDs for threat modeling
  • Identifying and marking trust boundaries
  • Q&A and Session Wrap-up

DAY 2: Hands-on Workshops

Workshop 1 Activities

  • Analyze provided system architecture
  • Create comprehensive data flow diagram
  • Identify key trust boundaries
  • Systematic application of each STRIDE category
  • Document potential threats for each component
  • Prioritize threats based on likelihood and impact
  • Develop countermeasures for high-priority threats
  • Consider implementation feasibility and cost

Workshop 2 Activities

  • Review domain-specific attack vectors and considerations
  • Analyze system-specific data storage and transmission threats
  • Create data flow diagram for complex system architecture
  • Team-based STRIDE analysis across all components
  • Consider various operational modes and scenarios
  • Evaluate business impact of identified threats
  • Create risk matrix with likelihood vs. impact scoring

Workshop 3 Activities

  • Review specialized threat landscape and technology-specific vulnerabilities
  • Analyze communication threats and supply chain considerations
  • Map complex interconnections between system components
  • Apply STRIDE across heterogeneous system elements
  • Address specialized communication security concerns
  • Discuss implementation constraints and environmental factors
  • Balance security with usability and performance considerations

Workshop 4 Activities

  • Review security fundamentals and common vulnerabilities
  • Analyze authentication and authorization patterns
  • Identify inter-component communication threats
  • Model distributed system security considerations
  • Apply STRIDE to containerized and orchestrated environments
  • Address data consistency and integrity across components
  • Map threat model to regulatory and compliance requirements
  • Establish documentation standards for audit purposes
Prerequisites
  • Basic understanding of software architecture and system design
  • Familiarity with common security concepts
  • Experience with system documentation or diagramming (preferred)
Key Takeaways
Earn 8 CPE Credits
Hands-on STRIDE Application
Get exclusive career guidance & mentorship
Certificate of Completion
Access to Post-Bootcamp Community & Resources
Regulatory Mapping & Audit Readiness Skills

Interested in Joining the

Bootcamp?

Please Fill the Form

Our advisor will contact you with event details, payment options, and exclusive offers!

42 people have registered