Learn More

Welcome to the Learn More section!

This is a collection of documentation, examples and reference material.

Example Models

The collection of Example Models contains downloadable models with descriptions. They are a good starting point for modeling similar environments or for incorporating in your existing models.


The use of components is highly encouraged while creating models. And if there is no suitable component available, you can create your own.

Importing External Data

Importing data from different sources can be useful both for adding detail to an existing high level model or to outline an environment not yet modeled. Importing external data is a feature that is part of securiCAD Enterprise.

Attack Vectors

An Attack Vector is a combination of attacker methodology and attacker resources. From a modeling perspective, we see the Attack Vector as the starting point of an attack, possibly with some suitable attenuation. This document describes how to model different types of attack vectors.

Modeling from Scratch

Starting from a minimalistic piece of input, this is your guide to low level modeling. It will lead you through building a model from scratch using basic modeling objects. Different types of objects and connections are described along the way. This is a very good start when you want to start creating your own tailor made components or for a deeper understanding in securiCAD modeling in general.

securiCAD User Manual

Description of more general functions in the securiCAD Community Edition and Professional Edition softwares.

securiLang Reference

securiCAD modeling objects and connections are defined by securiLang. This module is your securiLang documentation on object, connection, attack step and defense definitions.

Behind the Scenes

If you want to know how the simulations work, how an attack path is calculated, how probabilities weigh together and how the research and statistics relate to the simulation results in securiCAD, this “Behind the Scenes” section is for you.

Foreseeti research blog series

This blog series aims to summarize and describe some of the best and most recent research efforts from KTH in cyber security, threat modeling, attack simulations, risk analysis, and ethical hacking.