Completed
Threat Modeling Consistency
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cloud Threat Modeling - From Architecture Design to Application Development
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why Threat Modeling?
- 3 Threat Modeling (System/Software Centric)
- 4 Attack Modeling (Attack Centric)
- 5 What To Consider When Threat Modeling
- 6 There are Five Major Threat Modeling Steps
- 7 Threat Modeling (with Common Attacks)
- 8 Threat Modeling (Attack Tree Example)
- 9 Home Alone Attack Tree (Example) - Continued
- 10 Simple Threat Model (Trojan Threat Model Example)
- 11 STRIDE Threat Categories
- 12 Cloud Security Alliance's Top Threats Working Group
- 13 Cloud Controls Matrix (CCM) 4.0 CCM
- 14 CSA Top Threats Cloud Threat Modeling
- 15 Cloud Threat Modeling Cards
- 16 TT:DD Case Study Scenario - Dow Jones 2019
- 17 Cloud Threat Modeling Asset Provenance & Pedigree
- 18 Same Elasticsearch "Product"; Different Vulnerabilities
- 19 Threat Modeling Consistency
- 20 Naming Threats
- 21 How To Apply What We Have Covered