The document outlines an agenda for a class on threat modeling express. It introduces the topic and process of threat modeling express, which involves determining goals and scope, gathering information, enumerating threats, determining risk, and determining countermeasures. It provides examples of how to facilitate a threat modeling express session for a fake company application, including discussing motivations, use cases, threats, and risks. Finally, it discusses how to fit the results of a threat modeling express session into an agile development process.