Completed
Application Decomposition
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attack Tree Vignettes for Containers as a Service Applications - Risk-Centric Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Attack modeling
- 3 Outline
- 4 Containerization
- 5 Cloud adoption
- 6 Containerization landscape
- 7 Proliferation significance
- 8 Threat agent
- 9 Attack actors
- 10 Use cases
- 11 Opensource security testing
- 12 Attack patterns
- 13 Attack surface for containers
- 14 Animation
- 15 Personal Services
- 16 Application Decomposition
- 17 Threat Prognosis
- 18 Threat Rates
- 19 Weaknesses
- 20 Bash docker
- 21 Alternate attack path
- 22 Orchestration attack
- 23 The human element