Threat Modeling Challenge
Interactive threat modeling simulator: classify threats with STRIDE, identify trust boundaries, classify PII, build attack trees, prioritise by severity, and rank mitigations across 6 production scenarios. Free, no signup.
Interactive threat modeling lab. Six scenarios cover STRIDE classification of token-enumeration as spoofing, identifying the API-to-database trust boundary as the highest-stakes, GDPR PII classification of hashed device fingerprints, attack tree analysis prioritising CI/CD compromise over RCE, severity prioritisation by impact-times-likelihood, and mitigation ranking by blast-radius reduction.
What You Practice
- Recognizing production failure modes before they become incidents.
- Connecting security, reliability, and operational choices to real engineering outcomes.
- Building intuition through short interactive scenarios instead of passive reading only.
Related Practice
Continue with free courses or read production engineering articles.