Completed
Threat Modeling
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Transform Developers into Security People
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 The average developer
- 4 Myths about security
- 5 We already have a security department
- 6 The state of developer security
- 7 Developers are the first line of defense
- 8 Developers think like security people
- 9 What defines a security person
- 10 Start with why
- 11 This is a people problem
- 12 Four different answers
- 13 The Unfamiliar
- 14 Foundational Lessons
- 15 Everyone is a Security Person
- 16 Proactive Controls
- 17 Overworked
- 18 Automate
- 19 Objections
- 20 The Apathetic
- 21 The Shock Value
- 22 The Pain
- 23 Thegungho
- 24 Security Community
- 25 Security People
- 26 Security Behaviors
- 27 Security Habits
- 28 Security Learning
- 29 Experience Security
- 30 Community Participation
- 31 Planning Resources
- 32 Threat Modeling
- 33 Security Code Review
- 34 Red Teaming
- 35 Respond to Security Problems
- 36 Putting it All Together
- 37 Takeaways
- 38 Questions
- 39 Behavior not process