TARA Methodology
This training provides an overview of the threat analysis and risk assessment (TARA) methodology in terms of context establishment, security and privacy threat analysis, risk assessment and risk treatment.
By the end of this course, you will be able to:
- Perform a systematic security and privacy analysis of systems, software and products
- Follow the Threat Analysis, Risk Assessment and Risk Treatment methodology developed by the Security and Privacy Competence Center (SCC)
- Competencies you acquire:
- Analyzing potential Threats; Measuring Risks
- Level:
- Intermediate
- Required prior knowledge:
- IT Security Basic;
Security Risk Analysis
- Duration:
- 30 min