ShieldSprint Academy
Promotional still for Threat Modeling Cohort

Enterprise Security Training

Threat Modeling Cohort

You bring anonymized feature sketches; we stress them with structured prompts. Output is a repeatable review checklist your team can reuse. Sessions stay small so every sketch receives attention.

Duration
3 weeks · small cohort
Format
Live online
Instructor
Yerin Song
Tuition
KRW 1,180,000
Schedule a call

What is inside

  • Structured prompts for data flows and trust boundaries
  • Pairing blocks for PM + engineer duos
  • Checklist you can drop into design review templates
  • Optional critique from curriculum designer on clarity
  • Libraries of assumptions to challenge politely

Outcomes you can show

  1. Facilitate a 60-minute modeling session with notes
  2. Publish a checklist adopted by your squad
  3. Capture three recurring assumptions your product makes

Lead instructor

Photo of Yerin Song

Yerin Song

Curriculum designer who edits sentences until threats read like plain facts.

Participant questions

Can solo learners join?

Yes, but you will be paired for exercises. Bring a feature sketch you are allowed to discuss.

NDA expectations?

Do not share customer-identifying details. Coaches will stop sessions that drift into sensitive specifics.

Deliverables?

You leave with artifacts, not a certificate. Certification is not the focus here.

Notes from cohorts

“Threat Modeling Cohort gave our squad a calmer review ritual. Yerin’s prompts cut circular debates.”

— Priya · Product manager · Google

“Some prompts felt repetitive until I saw how repetition exposed hidden trust boundaries.”

— Chris