Completed
Cybersecurity Domains
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Modeling - How to Actually Do It and Make It Useful
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Disclaimers
- 3 Overuse term
- 4 Why people are nice
- 5 Software Threat Modeling
- 6 Whats not threat modeling
- 7 Threat Intel Pyramid
- 8 OAuth
- 9 Trivia
- 10 Attack Trees
- 11 Denial of Service
- 12 Fair Method
- 13 CBS
- 14 Risk Models
- 15 Likely Impact
- 16 Environment
- 17 Modeling Tool
- 18 Network Diagrams
- 19 IINS
- 20 CIS Community Attack Model
- 21 CIS Kill Chain Threat Model
- 22 Next Slide
- 23 Cybersecurity Domains
- 24 Meter Attack Matrix
- 25 How to hook it in
- 26 System Time Discovery
- 27 People Control
- 28 Ancient Aliens
- 29 Attack Matrix
- 30 Software based threading
- 31 Microsoft threat modeling
- 32 Moving to the cloud
- 33 Compliance can change
- 34 How to get shit done
- 35 Where to start
- 36 Qualitative vs Quantitative
- 37 Sample Factors
- 38 Impact
- 39 Musashi
- 40 Questions
- 41 Cyber Insurance