YoVDO

Improve Your Threat Modeling Skills

Offered By: LinkedIn Learning

Tags

Threat Intelligence Courses Cybersecurity Courses Threat Modeling Courses Spoofing Courses

Course Description

Overview

Threat modeling is a foundational framework for security professionals. In this learning path, learn how to use the STRIDE model to identify key threats—spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege—and deliver secure products and services.
  • Learn why threat modeling is foundational to the SDL.
  • Identify six common threats and discover how they work.
  • Develop your threat modeling skills.

Syllabus

  • Course 1: Learning Threat Modeling for Security Professionals
    • Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
  • Course 2: Threat Modeling: Spoofing In Depth
    • Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
  • Course 3: Threat Modeling: Tampering in Depth
    • Learn how tampering threats work and how to mitigate them. Explore how attackers can tamper with a variety of systems and tools, from debuggers to cloud services.
  • Course 4: Threat Modeling: Repudiation in Depth
    • Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
  • Course 5: Threat Modeling: Information Disclosure in Depth
    • Learn about the information disclosure pillar in the STRIDE threat modeling framework. Discover how to preserve the confidentiality of the data, secrets, and other information you store.
  • Course 6: Threat Modeling: Denial of Service and Elevation of Privilege
    • This final installment of the Threat Modeling series covering the STRIDE framework explains denial-of-service and elevation-of-privilege attacks.

Taught by

Adam Shostack, Adam Shostack, Adam Shostack, Adam Shostack, Adam Shostack and Adam Shostack

Related Courses

Cyber Security Incident Response for Managers
PA Consulting via FutureLearn
Manage the cyber threat for finance professionals
ACCA via edX
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Get Started with Threat Intelligence
Salesforce via Trailhead