×

Performing Threat Modeling with the OCTAVE Methodology

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

1h 15m

level

Intermediate

Course Creator

Dr. Shaila Rana

Last Updated

26-Aug-20

This course focuses on utilizing the OCTAVE Methodology to identify critical assets, infrastructure vulnerabilities, and an overall protection plan.

Add your review

Creating a protection plan to protect your organizations critical assets can be a daunting task. In this course, Performing Threat Modeling with the OCTAVE Methodology, you will utilize the OCTAVE methodology. First, you will learn how to create security requirements. Next, you will learn how to identify infrastructure vulnerabilities. Finally, you will use the information gathered in the methodology to create an overarching security plan that reduces risk, and can be used on a continual basis. When you are finished with the course, you will have the skills and knowledge of performing the OCTAVE Methodology to reduce risk, identify critical assets, and infrastructure vulnerabilities needed to create a security program that is customized to your organization.
Author Name: Dr. Shaila Rana
Author Description:
Dr. Shaila Rana is the Founder of CyberSecure and the Co-Founder of ACT Research Institute. Dr. Rana also serves as a Graduate Professor of Information Technology and Cybersecurity. She holds a PhD specializing in Information Systems Security and holds an MS in Cybersecurity. She has a background consisting of both education and industry experience. Her passion is to help people protect themselves, their families, and their communities against cyber threats and attacks.

Table of Contents

  • Course Overview
    1min
  • Defining OCTAVE Method Structure
    2mins
  • Building Security Requirements
    31mins
  • Identifying Infrastructure Vulnerabilities
    16mins
  • Determining Security Risk Management Strategy
    22mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Performing Threat Modeling with the OCTAVE Methodology”

Your email address will not be published. Required fields are marked *

Performing Threat Modeling with the OCTAVE Methodology
Performing Threat Modeling with the OCTAVE Methodology
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/