Understand the four main phases of threat modeling.
Microsoft Learn
Updated Jul 26, 2024
What you'll learn
Understand the importance of capturing requirements and assumptions to help create a data-flow diagram
Read about the framework that helps you find security issues in a system
Learn about the security control categories that help you reduce or eliminate potential threats
Highlight the importance of verifying assumptions, requirements, and fixes before deployment
Course DescriptionThis learning path takes you through the four main phases of threat modeling, explains the differences between each data-flow diagram element, walks you through the threat modeling framework, recommends different tools and gives you a step-by-step guide on creating proper data-flow diagrams.