Overview
Syllabus
Introduction
Who is Tony
What is Threat Modeling
PASTA
Threat vs Attack
Blind Threat Model
PASTA Framework
Risk Formula
Probabilistic Bands
Other Artifacts
Case Study Consumer Electronics
Case Study Cloud Pets
Case Study Teddy Bear
Use Cases
Abuse Cases
Unauthenticated Requests
Generic Attributes
Mapping Use Cases
Scenario Threat Analysis
Stage 4 Threat Modeling
Stage 6 Attack Trees
Residual Risk Analysis
Health Care
Mobile Application
Technology Components
Data Flow Diagram
Threat Analysis
Three main differentiators
Private questions
PASTA examples
Taught by
OWASP Foundation