Traditional threat modeling too often comes late to the party, or sometimes not at all. In addition, creating manual data flows and reports can be extremely time-consuming. The goal of pytm is to ...
The course material is organised into two interactive Notebooks, where the participants can actively follow the instructors' examples, as well as explore the provided source code. In this repository, ...