YoVDO

Improve Your Threat Modeling Skills

Offered By: LinkedIn Learning

Tags

Threat Intelligence Courses Cybersecurity Courses Threat Modeling Courses Spoofing Courses

Course Description

Overview

Threat modeling is a foundational framework for security professionals. In this learning path, learn how to use the STRIDE model to identify key threats—spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege—and deliver secure products and services.
  • Learn why threat modeling is foundational to the SDL.
  • Identify six common threats and discover how they work.
  • Develop your threat modeling skills.

Syllabus

Courses under this program:
Course 1: Learning Threat Modeling for Security Professionals
-Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.

Course 2: Threat Modeling: Spoofing In Depth
-Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.

Course 3: Threat Modeling: Tampering in Depth
-Learn how tampering threats work and how to mitigate them. Explore how attackers can tamper with a variety of systems and tools, from debuggers to cloud services.

Course 4: Threat Modeling: Repudiation in Depth
-Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.

Course 5: Threat Modeling: Information Disclosure in Depth
-Learn about the information disclosure pillar in the STRIDE threat modeling framework. Discover how to preserve the confidentiality of the data, secrets, and other information you store.

Course 6: Threat Modeling: Denial of Service and Elevation of Privilege
-This final installment of the Threat Modeling series covering the STRIDE framework explains denial-of-service and elevation-of-privilege attacks.


Courses

  • 0 reviews

    46 minutes

    View details
    Threat modeling helps security professionals understand what can go wrong—and what to do about it. Learn to use the four-question and STRIDE frameworks for threat modeling.
  • 0 reviews

    29 minutes

    View details
    Learn about the information disclosure pillar in the STRIDE threat modeling framework. Discover how to preserve the confidentiality of the data, secrets, and other information you store.
  • 0 reviews

    26 minutes

    View details
    Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
  • 0 reviews

    55 minutes

    View details
    Learn about one of the key threats to modern systems: spoofing, or authentication attacks. Explore ways that attackers spoof people, machines, file systems, and processes.
  • 0 reviews

    32 minutes

    View details
    Learn how tampering threats work and how to mitigate them. Explore how attackers can tamper with a variety of systems and tools, from debuggers to cloud services.
  • 0 reviews

    46 minutes

    View details
    This final installment of the Threat Modeling series covering the STRIDE framework explains denial-of-service and elevation-of-privilege attacks.

Taught by

Adam Shostack

Related Courses

Activos, amenazas y vulnerabilidades
Google via Coursera
Advanced Cybersecurity Concepts and Capstone Project
Microsoft via Coursera
Securing the IoT Landscape: From Inception to Architecture
LearnQuest via Coursera
Managing IoT Security in Networks
LearnQuest via Coursera
5. アセット、脅威、そして脆弱性
Google via Coursera