![](/data/products/ESCRYPT/escypt-teaser-risk-management-training-orange_rdax_90.jpg)
Why, when, and how to perform a security risk analysis. We support you to create a security risk analysis for one of your own systems.
A solid threat analysis and risk assessment (TARA) is the basis of a thorough security concept and thus of all security-related steps in the development process. In this advanced coaching, we explain an established and approved TARA methodology that is based on the Common Criteria and fully aligned with ISO/SAE 21434.
The theoretical part is complemented by a practical part. Here, the customer team creates a TARA for one of their systems, while the ETAS trainer provides support and reviews.
- Duration: 3 days (spread over approx. 3 month)
- Level: coaching
Participants
- Product and project managers who need to understand the methodology of a threat analysis and risk assessment in the context of the product development process
- Security managers who are responsible for conducting the threat analysis and risk assessment during the product development process
Coaching topics
- Learn and understand how the threat analysis and risk assessment contributes to efficient and effective risk management, e.g., in the context of ISO/SAE 21434
- Get to know a methodology how a threat analysis and risk assessment is performed
- Carry out a threat analysis and risk assessment for one of your systems
Requirements
- Basic knowledge of product development processes
- Detailed understanding and awareness of security risks for your product category
- Overview and description of the system that is to be evaluated
![message icon](/data/icon_2023_/etas-icon-mail-525x150-20221220.jpg)
Do you have any questions about our trainings?
Feel free to send us a message. We will be more than happy to help you.