Completed
Threat Modeling (for Devices and Users)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
My Threat Model is Your Threat Model
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Fast facts about me...
- 3 Ask the Experts: What is threat modeling?
- 4 Threat Modeling for (Secure) Development
- 5 Threat Modeling for Individuals
- 6 Threat Modeling (for Devices and Users)
- 7 Below the OS: Pre-boot and Runtime
- 8 [Shark] Attack: "Advanced" Device-targeted TH
- 9 Persistent Threats in Firmware
- 10 Physical Access to User Devices
- 11 Supply Chain and Insider Threats
- 12 Sidebar: Supply Chain Complexity... Simplified
- 13 Building a Long-term Strategic Threat Model
- 14 Overview: "Below the OS" Mitigations Today
- 15 Potential Mitigations
- 16 Example Implementation: Dell SafeBIOS Frame RESPOND