Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What do you do
- 3 How do we know
- 4 There is no free lunch
- 5 Flaws and bugs
- 6 Benefits of threat modeling
- 7 A quote from a participant
- 8 Threat modeling
- 9 When to do threat modeling
- 10 How to do threat modeling
- 11 S scoping
- 12 Models are wrong
- 13 Generic documentation
- 14 granularity
- 15 data flow diagrams
- 16 data movement
- 17 identifying threats
- 18 rating threat boundaries
- 19 focusing on flaws
- 20 finding threats
- 21 spoofing
- 22 tampering
- 23 integrity
- 24 information disclosure
- 25 denial of service
- 26 elevation of privilege
- 27 external entities
- 28 resources
- 29 threat modeling tool
- 30 rating threats
- 31 mitigations
- 32 Summary
- 33 Recommendation