TM-002 Threat Modelling with the OWASP Top 10

Using the OWASP Top 10 for Web Application Threat Modelling

Focusing on the details of the OWASP Top 10, the list of the most commonly exploited web application vulnerabilities published by OWASP, this workshop goes through how to take a vulnerability list and adapt it for use in fast, effective threat modelling during your web application design process.

Book a course

To arrange one of our classes for your team, or talk about other training options, drop us a line!

Get in touch