Attack Tree Vignettes for Containers as a Service Applications - Risk-Centric Threat Modeling

Attack Tree Vignettes for Containers as a Service Applications - Risk-Centric Threat Modeling

OWASP Foundation via YouTube Direct link

Proliferation significance

7 of 23

7 of 23

Proliferation significance

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Attack Tree Vignettes for Containers as a Service Applications - Risk-Centric Threat Modeling

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Attack modeling
  3. 3 Outline
  4. 4 Containerization
  5. 5 Cloud adoption
  6. 6 Containerization landscape
  7. 7 Proliferation significance
  8. 8 Threat agent
  9. 9 Attack actors
  10. 10 Use cases
  11. 11 Opensource security testing
  12. 12 Attack patterns
  13. 13 Attack surface for containers
  14. 14 Animation
  15. 15 Personal Services
  16. 16 Application Decomposition
  17. 17 Threat Prognosis
  18. 18 Threat Rates
  19. 19 Weaknesses
  20. 20 Bash docker
  21. 21 Alternate attack path
  22. 22 Orchestration attack
  23. 23 The human element

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.