Completed
Assignment by Function
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Topics of Interest - Agile Threat Modeling with Open-Source Tools
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Threat Models as Code?
- 3 Benefits of Code
- 4 Drawbacks of Code
- 5 Threagile - Agile Threat Modeling Toolkit
- 6 First Steps with Threagile Create either a minimal stub model or a filed example model
- 7 Example Model: Data Assets
- 8 Example Model: Communication Links
- 9 Example Model: Trust Boundaries
- 10 Execute a Threagile Run Processes the YAML model file
- 11 Model Graph Generation (Data Flows)
- 12 PDF & Excel Report Generation
- 13 STRIDE Classification of Risks
- 14 Assignment by Function
- 15 Relative Attacker Attractiveness (RAA)
- 16 Data Breach Probabilities (DBP)
- 17 Risk Mitigation Recommendations
- 18 Risk Instances by vulnerability & by tech as
- 19 Detail Results as JSON
- 20 Risk Rules -40 and constantly growing
- 21 Custom Risk Rules (plugin interface)
- 22 Editing Support in IDES Schema for YAML input available Enables syntax validation error flagging & auto-completion
- 23 Risk Tracking inside YAML file by Risk-1
- 24 What About Bigger Models?
- 25 Model Macros: Interactive Wizards Interactive wizards reading existing models and modify/enhance them
- 26 GitHub Integration (as workflow action)
- 27 Possible Effects
- 28 Upcoming Features currently in developme