Completed
Data Breaches
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How Online Dating Made Me Better at Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who this talk is for
- 3 Why this topic
- 4 Security nihilism
- 5 Data flow diagram
- 6 Purposes
- 7 Action
- 8 Stripe Protect
- 9 Checkmarks
- 10 Checkmarks Vulnerability
- 11 Factories
- 12 Offensive Attacks
- 13 Data Breaches
- 14 Location Control
- 15 Hardware
- 16 Introduction to Threat Modeling
- 17 Where is data coming from
- 18 Red Teams
- 19 Choose What You Share
- 20 Risk vs Reward