SystemWeaver TARA Module Increasing your TARA Efficiency

SystemWeaver TARA Module – Increasing your TARA Efficiency

Date: Ask for date
Place: Onsite/online
Language: English or Swedish
Price: Ask for price

Request more information

Magnus Kindberg (SE, NO)
Phone: +46 (0)40 59 22 22
magnus.kindberg@nohau.se

Heidi Lehtomäki – Finland
phone: +358 40 196 0142
heidi.lehtomaki@nohau.fi

Klaus Ahrensbach – Denmark
Phone: +45 3116 1019
ka@nohau.dk

SystemWeaver TARA Module – Increasing your TARA Efficiency

 

Course description

This training gives an in-depth learning experience of how to navigate and utilize the SystemWeaver TARA tool to its utmost potential.

 

In this course you will:

    • Learn how the SystemWeaver TARA tool works
    • Learn how to utilize the SystemWeaver TARA tool – like an expert

Learning outcomes

Knowledge and understanding

  • Generic SystemWeaver Cybersecurity model
  • Beginner level knowledge in the Cybersecurity processes model with its sub processes
  • Ability to understand included item, parts, and attribute types on a basic level.
  • Ability to identify what is part of the module at what is not.
  • Ability to grasp related ISO standards
  • Ability to recognize and locate all types of domain specific view support.

Applying and creating  

  • Ability to manage all the standard operations* included in each process step.
  • Ability to create structural separation of TARAs based on Cybersecurity areas.
  • Ability to utilize all the graphs, grids and views included in the TARA module

 

Content overview:

This training gives an in-depth learning of how to navigate and utilize the SystemWeaver TARA tool to its utmost potential.

What do you learn 

  • After having taken the training you will have learnt how to:
    • Create structural separation of TARAs based on Cybersecurity Areas
    • Create a System Model
    • Create Damage Scenarios
    • Score Impact
    • Create Threat Scenarios
    • Connecting Damage Scenarios to Threat Scenarios
    • Create Attack Paths
    • Connecting Attack Paths to Threat Scenarios
    • Score Feasibility
    • Create Goals and Claims
    • Create Requirements
    • Allocate Requirements to Goals
    • Allocate Requirements to Components in the System Model
    • Learn how to utilize all the graphs, grids and views included in the TARA module

Purpose/scope for the training 

  • Identify assets
  • Manage item versions and statuses
  • Use secondary view to work with attributes and graph/grid simultaneously
  • Add security properties to damage scenarios
  • Add threats from a catalogue
  • Add mitigations to attack events
  • Add mitigations to requirements
  • Perform validity checks
  • Create and sign a TARA report
  • Add custom cataloges
  • Generate GSN from TARA

 

This course is in collaboration with our partner: SystemWeaver logo

Do you wish more information!

Contact us for offers, information or advice!