Overview
Syllabus
Introduction
Show me the money
Disclaimer
Expectations
Participatory
Design problem
Requirements
Mindshare
Architecture
Threat Modeling
Secure Software
Security Architecture
One hundred percent certainty
Context
Whats already in place
Data sensitivity
Top secret
No book of answers
Architectures
Architecture Cold Call
Application Server
Browser Protection
Configuration
App
Targets
Employee Net
Message Flow
Organization Purpose
Access
The Architecture
Ecommerce
Extranet
Process
Threat Matrix
Systems Objectives
Risk
Business Intelligence
Input Validation
Identity Services
Taught by
OWASP Foundation