Completed
Capture 'Who', 'Where', and 'What'
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Simplifying Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Today's Threat Modeling Theme
- 3 What is a Threat?
- 4 Threat Example - Mobile Architecture
- 5 Anatomy of an Attack
- 6 Threat Traceability Matrix
- 7 Elements of a Threat Model
- 8 Simplified Threat Modeling Framework
- 9 Diagram Software Architecture
- 10 Enumerate Attack Surface(s)
- 11 Each User Class Becomes a Threat
- 12 Malicious Intent Creates New Threat
- 13 Visualize Normal Users as Threats
- 14 Re-consider Attack Surface(s)
- 15 Capture 'Who', 'Where', and 'What'
- 16 Illuminate Assets
- 17 Illuminate Trust Boundaries
- 18 Postulate Attacks Against Assets
- 19 Evaluate Impact
- 20 Mitigate
- 21 7+1 Threat Modeling Steps
- 22 Acting on Threat Modeling Results
- 23 Simplifying Threat Modeling