SystemWeaver TARA Module – Increasing your TARA Efficiency
SystemWeaver TARA Module – Increasing your TARA Efficiency
Course description
This training gives an in-depth learning experience of how to navigate and utilize the SystemWeaver TARA tool to its utmost potential.
In this course you will:
Learn how the SystemWeaver TARA tool works
Learn how to utilize the SystemWeaver TARA tool – like an expert
Learning outcomes
Knowledge and understanding
Generic SystemWeaver Cybersecurity model
Beginner level knowledge in the Cybersecurity processes model with its sub processes
Ability to understand included item, parts, and attribute types on a basic level.
Ability to identify what is part of the module at what is not.
Ability to grasp related ISO standards
Ability to recognize and locate all types of domain specific view support.
Applying and creating
Ability to manage all the standard operations* included in each process step.
Ability to create structural separation of TARAs based on Cybersecurity areas.
Ability to utilize all the graphs, grids and views included in the TARA module
Content overview:
This training gives an in-depth learning of how to navigate and utilize the SystemWeaver TARA tool to its utmost potential.
What do you learn
After having taken the training you will have learnt how to:
Create structural separation of TARAs based on Cybersecurity Areas
Create a System Model
Create Damage Scenarios
Score Impact
Create Threat Scenarios
Connecting Damage Scenarios to Threat Scenarios
Create Attack Paths
Connecting Attack Paths to Threat Scenarios
Score Feasibility
Create Goals and Claims
Create Requirements
Allocate Requirements to Goals
Allocate Requirements to Components in the System Model
Learn how to utilize all the graphs, grids and views included in the TARA module
Purpose/scope for the training
Identify assets
Manage item versions and statuses
Use secondary view to work with attributes and graph/grid simultaneously
Add security properties to damage scenarios
Add threats from a catalogue
Add mitigations to attack events
Add mitigations to requirements
Perform validity checks
Create and sign a TARA report
Add custom cataloges
Generate GSN from TARA
This course is in collaboration with our partner: SystemWeaver®
Nohau Training Partner
This course is provided by a Nohau Training Partner, a trusted provider of hands-on training for professionals in embedded systems, software development, and engineering.
