Threat Modeling

Threat Modeling

NDC Conferences via YouTube Direct link

Introduction

1 of 33

1 of 33

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Modeling

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What do you do
  3. 3 How do we know
  4. 4 There is no free lunch
  5. 5 Flaws and bugs
  6. 6 Benefits of threat modeling
  7. 7 A quote from a participant
  8. 8 Threat modeling
  9. 9 When to do threat modeling
  10. 10 How to do threat modeling
  11. 11 S scoping
  12. 12 Models are wrong
  13. 13 Generic documentation
  14. 14 granularity
  15. 15 data flow diagrams
  16. 16 data movement
  17. 17 identifying threats
  18. 18 rating threat boundaries
  19. 19 focusing on flaws
  20. 20 finding threats
  21. 21 spoofing
  22. 22 tampering
  23. 23 integrity
  24. 24 information disclosure
  25. 25 denial of service
  26. 26 elevation of privilege
  27. 27 external entities
  28. 28 resources
  29. 29 threat modeling tool
  30. 30 rating threats
  31. 31 mitigations
  32. 32 Summary
  33. 33 Recommendation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.