Shield Signal — Your digital defense briefing  ·  Get breach alerts
Resource Guide

The Complete Threat Modeling Resource Guide

Figure out what you actually need to protect — without the paranoia or the jargon.

35+ Resources Updated January 2026 Free & Paid
Browse Resources

Getting Started (7)

EFF Surveillance Self-Defense Free Article

Electronic Frontier Foundation's beginner-friendly guide to understanding who might want your data and why it matters.

Schneier on Threat Modeling Basics Free Article

Bruce Schneier's plain-English explanation of why threat modeling isn't just for spies and corporations.

Privacy Guides: Threat Modeling 101 Free Article

Community-maintained walkthrough covering assets, adversaries, capabilities, and likelihood — with real examples.

Threat Modeling for Developers — YouTube Free Video

45-minute talk breaking down the four-question framework: What are you building? What can go wrong? What will you do? Did you do it?

Microsoft Threat Modeling Tool Free Tool

Free desktop tool for creating data flow diagrams and identifying threats using Microsoft's STRIDE methodology.

OWASP Threat Modeling Page Free Article

Open-source security community's comprehensive threat modeling resource with cheat sheets and methodology comparisons.

Threat Modeling: Designing for Security Paid Article

Adam Shostack's definitive book. 600+ pages covering every methodology, with practical exercises for beginners and pros.

Frameworks & Methodologies (7)

STRIDE Framework Free Article

Microsoft's Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege model.

PASTA: Process for Attack Simulation Free Article

Risk-centric 7-stage methodology that aligns technical requirements with business objectives. Popular in enterprise.

Threat Model Templates (GitHub) Free Tool

Copy-paste templates for STRIDE, LINDDUN, and attack trees. Fill in your context and identify gaps immediately.

LINDDUN Privacy Framework Free Article

Privacy-focused threat modeling: Linkability, Identifiability, Non-repudiation, Detectability, Disclosure, Unawareness, Non-compliance.

OWASP Threat Dragon Free Tool

Open-source, cross-platform threat modeling tool with a web app and desktop version. Visual diagrams + auto-generated threats.

CISA Zero Trust Maturity Model Free Article

U.S. government's framework for assessing zero trust readiness. Useful for understanding modern security architecture assumptions.

NIST Cybersecurity Framework Free Article

The gold standard. Identify, Protect, Detect, Respond, Recover. Threat modeling maps directly to the Identify function.

Assessment & Mapping Tools (7)

IriusRisk Paid Tool

Automated threat modeling platform. Integrates with CI/CD pipelines. Free community edition available for small teams.

Sqreen (Datadog) Paid Tool

Runtime application security that identifies threats in production. Useful for validating threat model assumptions against real attacks.

draw.io (diagrams.net) Free Tool

Free diagramming tool perfect for creating data flow diagrams — the foundation of any threat model. No account needed.

MITRE ATT&CK & CAPEC Free Tool

Real-world attack patterns database. Map your threats to known adversary tactics. The industry standard for threat intelligence.

securiCAD Paid Tool

Attack simulation tool that models your architecture and calculates risk probabilities. Enterprise-grade with academic roots.

Have I Been Pwned Free Tool

Check if your email appears in known data breaches. Essential first step — you can't model threats to assets you don't know are exposed.

Shodan Free Tool

Search engine for Internet-connected devices. See what's publicly exposed on your network — a real eye-opener for threat modeling.

Personal Threat Models (7)

EFF: Assess Your Risks Free Article

Step-by-step worksheet: identify what you want to protect, who you're protecting it from, and how likely the threat is.

EFF Security Education Companion Free Article

Teaching materials designed for non-technical people. Includes personal threat model worksheets for journalists, activists, and everyday users.

Threat Modeling for Normal People — Video Free Video

30-minute practical walkthrough for people who aren't in tech. Covers common personal scenarios: travel, dating apps, smart home.

Privacy Guides: Personal Models Free Article

Pre-built threat model templates for common personas: journalist, activist, business owner, parent, student, and retiree.

OSINT Techniques Workbook Paid Article

Michael Bazzell's companion workbook. Includes personal threat assessment exercises and data exposure reduction checklists.

Troy Hunt on Phone Number Exposure Free Article

Real-world example of modeling the threat of phone number exposure. Shows how one data point leads to cascading vulnerabilities.

WIRED: Privacy Is Not Dead Free Article

Counter-argument to fatalism. Explains why threat modeling is more productive than giving up — and how to set realistic privacy goals.

Courses & Deep Dives (7)

Coursera: IT Security (Google) Free Video

Google's IT security module includes a solid threat modeling section. Free to audit. Certificate available for $49.

SECOM Social Engineering Course Paid Video

Understand the human element of threats. Covers pretexting, elicitation, and how attackers model YOU to exploit trust.

Pluralsight: Threat Modeling Fundamentals Paid Video

3-hour course covering STRIDE, DREAD, and attack trees. Hands-on exercises with real scenarios. Free 10-day trial available.

Threat Modeling Playlist — YouTube Free Video

Curated 12-video playlist from various security conferences. Covers beginner to advanced threat modeling techniques.

Threat Modeling: A Practical Guide Paid Article

Short, focused book aimed at non-experts. 180 pages of practical exercises you can complete in a weekend.

Krebs on Security: Threat Thinking Free Article

Brian Krebs on how he personally threat models. Real examples from covering cybercrime for 20+ years. Practical and sobering.

SANS Cyber Aces Free Video

Free online cybersecurity courses from SANS Institute. Includes threat identification modules suitable for complete beginners.

Know a great resource we missed? Let us know.

We update this list monthly

Get notified when we add new threat modeling resources, tools, and guides.

Join 4,200+ readers · No spam · Unsubscribe anytime
You're in. Check your inbox to confirm.