{"id":2423,"date":"2023-03-01T15:06:24","date_gmt":"2023-03-01T14:06:24","guid":{"rendered":"https:\/\/ict-improve.nl\/?post_type=training&#038;p=2423"},"modified":"2026-04-21T17:09:29","modified_gmt":"2026-04-21T15:09:29","slug":"foundation-of-security-the-threat-model-4","status":"publish","type":"training","link":"https:\/\/ict-improve.nl\/en\/training\/foundation-of-security-the-threat-model-en\/foundation-of-security-the-threat-model-4\/","title":{"rendered":"Foundation of Security: The Threat Model"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>The Threat Model: A Key to Your Security Would you rather call the fire brigade to put out your burning house, or prevent the fire from happening in the first place? We believe that prevention is better than cure. We also believe that security begins with a comprehensive risk analysis and ends with continuous monitoring and training. A proven method for achieving this is Threat Modelling. This training will show you how to use Threat Modeling to design and implement security solutions in the most optimal way. After this training, you will: Understand the principles of security, in relation to the Security Development Life Cycle Learn how to use the Threat Model as the basis for Secure Development Apply and utilize the Threat Model in your own projects Implement Continuous Security with the Threat Model Security is becoming more and more important in IT. And for a good reason, because as digitization progresses, there is also more and more to protect. A firewall is helpful, but not enough. Security matters at all levels (organization, process, system, applications, network components), and it can be hard to decide which actions are most effective for ensuring security. We believe that preventing problems is<\/p>\n","protected":false},"featured_media":0,"parent":1420,"menu_order":99991231,"template":"","meta":{"_acf_changed":true,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-2423","training","type-training","status-publish","hentry"],"acf":{"start_date":null,"duration":"","price":"\u20ac 695 ","early_bird_price":"","early_bird_tot":null,"location":"In-house","location_type":"Classroom","theme":["Requirements","Security"],"training_language":"English","session":"yes","startgarantie":false,"nog_enkele_plaatsen_beschikbaar":false,"uitvoeringscode":"07b9cf5c-5e03-4643-8722-49eae6620044"},"_links":{"self":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training"}],"about":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/types\/training"}],"version-history":[{"count":0,"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2423\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/1420"}],"wp:attachment":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/media?parent=2423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}