Cloud Threat Modeling - From Architecture Design to Application Development

Cloud Threat Modeling - From Architecture Design to Application Development

RSA Conference via YouTube Direct link

Home Alone Attack Tree (Example) - Continued

9 of 21

9 of 21

Home Alone Attack Tree (Example) - Continued

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cloud Threat Modeling - From Architecture Design to Application Development

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why Threat Modeling?
  3. 3 Threat Modeling (System/Software Centric)
  4. 4 Attack Modeling (Attack Centric)
  5. 5 What To Consider When Threat Modeling
  6. 6 There are Five Major Threat Modeling Steps
  7. 7 Threat Modeling (with Common Attacks)
  8. 8 Threat Modeling (Attack Tree Example)
  9. 9 Home Alone Attack Tree (Example) - Continued
  10. 10 Simple Threat Model (Trojan Threat Model Example)
  11. 11 STRIDE Threat Categories
  12. 12 Cloud Security Alliance's Top Threats Working Group
  13. 13 Cloud Controls Matrix (CCM) 4.0 CCM
  14. 14 CSA Top Threats Cloud Threat Modeling
  15. 15 Cloud Threat Modeling Cards
  16. 16 TT:DD Case Study Scenario - Dow Jones 2019
  17. 17 Cloud Threat Modeling Asset Provenance & Pedigree
  18. 18 Same Elasticsearch "Product"; Different Vulnerabilities
  19. 19 Threat Modeling Consistency
  20. 20 Naming Threats
  21. 21 How To Apply What We Have Covered

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.