Public Sector

We've had the pleasure of working with UK and overseas central and local government departments, including Healthcare (NHS and Foundation Trusts), Defence, Education (Universities and colleges), many of the main Civil Service departments, Emergency Services; also public-owned corporations including the BBC, Bank of England, Ordnance Survey, and regulatory bodies such as Ofgem.

We are registered on Crown Commercial Service’s (CCS) Dynamic Purchasing System (RM6219 Training and Learning) and also with numerous tender portals such as Ariba, Coupa and Delta E-Sourcing.

Read more...

Graduate Training Schemes

Framework Training has a strong track record of providing a solid introduction into the working world for technical graduates across myriad industries. We provide the opportunity to learn and gain valuable hands-on experience in a supportive, friendly and sociable training environment.

Attract & retain the brightest new starters

We know it is vital for our clients to invest in the future of their talented grads; not only to provide them with high-quality, professional training essential for their roles, but to embed them within the organisation’s culture and guide them on the right path to a successful career.

After all, your new hires could well be the next leaders and their creative ideas and unique insights are invaluable to your business.

Read more ...

Learning & Development

Our unique portfolio of high-quality technical courses and training programmes are industry-respected. They’re carefully designed so that delegates can seamlessly apply what they’ve learnt back in the workplace. Our team of domain experts, trainers, and support teams know our field — and all things tech — inside out, and we work hard to keep ourselves up to speed with the latest innovations. 

We’re proud to develop and deliver innovative learning solutions that actually work and make a tangible difference to your people and your business, driving through positive lasting change. Our training courses and programmes are human-centred. Everything we do is underpinned by our commitment to continuous improvement and learning and generally making things much better.

Read more...

Corporate & Volume Pricing

Whether you are looking to book multiple places on public scheduled courses (attended remotely or in our training centres in London) or planning private courses for a team within your organisation, we will be happy to discuss preferential pricing which maximise your staff education budget.

Enquire today about:

  • Training programme pricing models  

  • Multi-course voucher schemes

Read more...

Custom Learning Paths

We understand that your team training needs don't always fit into a "one size fits all" mould, and we're very happy to explore ways in which we can tailor a bespoke learning path to fit your learning needs.

Find out about how we can customise everything from short overviews, intensive workshops, and wider training programmes that give you coverage of the most relevant topics based on what your staff need to excel in their roles.

Read more...

Threat Modelling: Proactive Security by Design

Gain practical experience of analysing and hardening your software applications and APIs against external threat.

About the course

This Threat Modelling workshop equips participants with the knowledge and skills to proactively identify and mitigate security vulnerabilities in software and systems. You'll learn the core principles of Threat Modelling, its importance in the software development lifecycle, and how to "shift left" to address security early in the design phase.

Through practical exercises, you'll learn techniques like identifying assets, vulnerabilities, and threats, assessing risk, and applying the STRIDE methodology. The workshop emphasises preventing insecure design issues by incorporating security and privacy-related controls and secure design patterns.

Instructor-led online and in-house face-to-face options are available - as part of a wider customised training programme, or as a standalone workshop, on-site at your offices or at one of many flexible meeting spaces in the UK and around the World.

    • Understand the principles and importance of Threat Modelling.
    • Identify and document assets, vulnerabilities, and threats.
    • Assess and prioritise risks using established methodologies.
    • Apply the STRIDE methodology to identify common threat categories.
    • Create Threat Models for software and systems.
    • Prevent insecure design issues by applying security and privacy-related controls.
    • Utilise secure design patterns for authentication, access control, and business logic.
    • Integrate Threat Modelling with unit and integration testing.
    • Effectively communicate security risks to stakeholders.
    • Implement mitigation techniques to address identified threats.
  • This workshop is designed for:

    • Software developers

    • System architects

    • Security engineers

    • DevOps engineers

    • Anyone involved in the software development lifecycle

  • To get the most out of this workshop, you should have:

    • Basic understanding of software development processes.

    • Familiarity with software design concepts.

    • Some knowledge of common security vulnerabilities.

  • This Threat Modelling course is available for private / custom delivery for your team - as an in-house face-to-face workshop at your location of choice, or as online instructor-led training via MS Teams (or your own preferred platform).

    Get in touch to find out how we can deliver tailored training which focuses on your project requirements and learning goals.

  • Introduction to Threat Modelling

    • What is it and why should we do it?

    • What do we mean by "Push left"?

    • Threat Modelling Values

    Identifying & Recording the Threat Modelling Triumvirate

    • Assets

    • Vulnerabilities

    • Threats

    • What action can you take?

    Risk

    • Prioritising & Assessing and Rating Risk

    • STRIDE

    Creating a Threat Model

    • Team exercise

    Preventing Insecure Design Issues

    • Security and Privacy-related controls

    • Secure Design Patterns

    • Authentication, Access control, Business logic, and Key Flows

    • Unit / Integration Testing

    • Further mitigation techniques

Trusted by

AMEC company logo OVO Energy company logo Amadeus Services company logo IBM company logo

Public Courses Dates and Rates

Please get in touch for pricing and availability.

Related courses