Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Securing Open Source Through Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 What is Threat Modeling
- 4 Why should we do Threat Modeling
- 5 Threat Modeling 101
- 6 Threat Modeling in the Beginning
- 7 Advanced Threat Modeling
- 8 Known vs unknown vulnerabilities
- 9 Setting clear objectives
- 10 Understanding how the application works
- 11 What can go wrong
- 12 CWE
- 13 OSS Top 10
- 14 Stride
- 15 Verification
- 16 Supply Chain Attacks
- 17 What is Supply Chain Attack
- 18 Outdated Libraries
- 19 You are not the target
- 20 OpenSSL
- 21 Informationally
- 22 Legacy code
- 23 Automatic tools
- 24 Mitigation
- 25 Problems with security products
- 26 Summary