Securing Open Source Through Threat Modeling

Securing Open Source Through Threat Modeling

Linux Foundation via YouTube Direct link

Verification

15 of 26

15 of 26

Verification

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing Open Source Through Threat Modeling

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 What is Threat Modeling
  4. 4 Why should we do Threat Modeling
  5. 5 Threat Modeling 101
  6. 6 Threat Modeling in the Beginning
  7. 7 Advanced Threat Modeling
  8. 8 Known vs unknown vulnerabilities
  9. 9 Setting clear objectives
  10. 10 Understanding how the application works
  11. 11 What can go wrong
  12. 12 CWE
  13. 13 OSS Top 10
  14. 14 Stride
  15. 15 Verification
  16. 16 Supply Chain Attacks
  17. 17 What is Supply Chain Attack
  18. 18 Outdated Libraries
  19. 19 You are not the target
  20. 20 OpenSSL
  21. 21 Informationally
  22. 22 Legacy code
  23. 23 Automatic tools
  24. 24 Mitigation
  25. 25 Problems with security products
  26. 26 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.