Threat Modeling Fundamentals
Threat modeling can help mitigate security risks in an application in a repeatable and efficient way. This course teaches you the fundamentals of threat modeling and what the different approaches and methodologies are.
Security is important. You want to build more secure applications. You don’t want to bolt on security afterwards, but you want to make sure it’s there from the get-go – for each project. Threat Modeling is a growing field of interest for software developers, architects and security professionals. With good reason, as this can be a very effective way to accomplish those goals. In this course, Threat Modeling Fundamentals, you’ll dive deeper into the fundamentals of threat modeling including a short exercise to help you follow along. First, you’ll discover what the pro’s and cons are of each methodology. Next, you’ll explore how to draw data flow diagrams for threat modeling. Then, you’ll learn how to perform the generic threat model process. Finally, you’ll cover what common pitfalls are and how to work around those. By the end of this course, you’ll be familiar with all popular threat modeling approaches and methodologies. This course teaches you the fundamentals of threat modeling . After watching this course, you will know the fundamentals of threat modeling; the various approaches, methodologies, and their differences; and how to perform the generic threat modeling process.
Author Name: Peter Mosmans
Author Description:
Peter started out in the nineties as software engineer working on internet banking applications for various European financial institutions. After developing, he moved to the role of defending and designing systems and networks for high-availability websites. Since 2004 he started specializing in breaking: pentesting complex and feature-rich web applications. Currently he leads a global team of highly skilled penetration testers as lead pentester. He is a contributor to several open-source penet… more
Table of Contents
- Course Overview
1min - Threat Modeling, the What, Why, Who, and When
12mins - Choosing the Right Approach
14mins - Choosing the Right Methodology
22mins - Threat Modeling in Practice
25mins - Improving Threat Modeling
12mins
There are no reviews yet.