SystemWeaver TARA Module – Increasing your TARA Efficiency
Date: On request
Place: Onsite or Online
Language: English or Swedish
Place: Onsite or Online
Language: English or Swedish
Price: 1.100 EUR, 12.500 SEK, 8.200 DKK
Request more information
Magnus Kindberg (SE, NO)
Phone: +46 (0)40 59 22 22
magnus.kindberg@nohau.se
Heidi Lehtomäki – Finland
phone: +358 40 196 0142
heidi.lehtomaki@nohau.fi
Klaus Ahrensbach – Denmark
Phone: +45 3116 1019
ka@nohau.dk
SystemWeaver TARA Module – Increasing your TARA Efficiency
Course description
This training gives an in-depth learning experience of how to navigate and utilize the SystemWeaver TARA tool to its utmost potential.
In this course you will:
- Learn how the SystemWeaver TARA tool works
- Learn how to utilize the SystemWeaver TARA tool – like an expert
Learning outcomes
Knowledge and understanding
- Generic SystemWeaver Cybersecurity model
- Beginner level knowledge in the Cybersecurity processes model with its sub processes
- Ability to understand included item, parts, and attribute types on a basic level.
- Ability to identify what is part of the module at what is not.
- Ability to grasp related ISO standards
- Ability to recognize and locate all types of domain specific view support.
Applying and creating
- Ability to manage all the standard operations* included in each process step.
- Ability to create structural separation of TARAs based on Cybersecurity areas.
- Ability to utilize all the graphs, grids and views included in the TARA module
Content overview:
This training gives an in-depth learning of how to navigate and utilize the SystemWeaver TARA tool to its utmost potential.
What do you learn
- After having taken the training you will have learnt how to:
- Create structural separation of TARAs based on Cybersecurity Areas
- Create a System Model
- Create Damage Scenarios
- Score Impact
- Create Threat Scenarios
- Connecting Damage Scenarios to Threat Scenarios
- Create Attack Paths
- Connecting Attack Paths to Threat Scenarios
- Score Feasibility
- Create Goals and Claims
- Create Requirements
- Allocate Requirements to Goals
- Allocate Requirements to Components in the System Model
- Learn how to utilize all the graphs, grids and views included in the TARA module
Purpose/scope for the training
- Identify assets
- Manage item versions and statuses
- Use secondary view to work with attributes and graph/grid simultaneously
- Add security properties to damage scenarios
- Add threats from a catalogue
- Add mitigations to attack events
- Add mitigations to requirements
- Perform validity checks
- Create and sign a TARA report
- Add custom cataloges
- Generate GSN from TARA