IriusRisk - Features and Configuration
IriusRisk – Features and Configuration teaches users how to configure diagrams, trust zones, components, risk patterns, workflows, and permissions. This course is essential for mastering platform features and tailoring IriusRisk to your organization’s threat modeling needs.
-
Course duration
3 hours -
Chapters
7 -
Difficulty
Advanced -
CPE credits
3 -
Cost
Free of charge -
Certification
Included -
Badge
Included
Audience
• Threat Modeling Experts aiming to master the customization and configuration of IriusRisk.
• IriusRisk Administrators responsible for managing users, permissions, workflows, and platform-wide settings.
• Security Architects and DevSecOps professionals seeking to embed scalable and adaptable threat modeling into their SDLC processes.
Learning Objective
This course is designed for professionals seeking to harness the full potential of IriusRisk through configuration, customization, and advanced platform features. Beginning with the creation of a basic threat model, participants will learn to tailor visual elements—such as layout, style, and color schemes—to align with their organization’s design standards.
The course then delves into the definition and use of core modeling elements including trust zones, components, and data flows, revealing how each contributes to the effectiveness of threat modeling. Learners will explore the customization of risk patterns to reflect organizational security requirements, with guidance on adapting existing patterns or creating new ones that align with architecture and risk posture.
Practical instruction is provided on managing workflows, implementing role-based access controls, and applying best practices for advanced configuration. Additional hidden gems of the IriusRisk platform are uncovered along the way, encouraging curiosity and exploration beyond the basics.
