Completed
When to do threat modeling
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Modeling
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What do you do
- 3 How do we know
- 4 There is no free lunch
- 5 Flaws and bugs
- 6 Benefits of threat modeling
- 7 A quote from a participant
- 8 Threat modeling
- 9 When to do threat modeling
- 10 How to do threat modeling
- 11 S scoping
- 12 Models are wrong
- 13 Generic documentation
- 14 granularity
- 15 data flow diagrams
- 16 data movement
- 17 identifying threats
- 18 rating threat boundaries
- 19 focusing on flaws
- 20 finding threats
- 21 spoofing
- 22 tampering
- 23 integrity
- 24 information disclosure
- 25 denial of service
- 26 elevation of privilege
- 27 external entities
- 28 resources
- 29 threat modeling tool
- 30 rating threats
- 31 mitigations
- 32 Summary
- 33 Recommendation