Completed
Data sensitivity
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Unlocking Threat Modeling - Participatory Session on Security Architecture Assessment
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Show me the money
- 3 Disclaimer
- 4 Expectations
- 5 Participatory
- 6 Design problem
- 7 Requirements
- 8 Mindshare
- 9 Architecture
- 10 Threat Modeling
- 11 Secure Software
- 12 Security Architecture
- 13 One hundred percent certainty
- 14 Context
- 15 Whats already in place
- 16 Data sensitivity
- 17 Top secret
- 18 No book of answers
- 19 Architectures
- 20 Architecture Cold Call
- 21 Application Server
- 22 Browser Protection
- 23 Configuration
- 24 App
- 25 Targets
- 26 Employee Net
- 27 Message Flow
- 28 Organization Purpose
- 29 Access
- 30 The Architecture
- 31 Ecommerce
- 32 Extranet
- 33 Process
- 34 Threat Matrix
- 35 Systems Objectives
- 36 Risk
- 37 Business Intelligence
- 38 Input Validation
- 39 Identity Services