Threat Modeling Courses
OWASP Foundation via YouTube OWASP Top 10 Mobile Risks: 2014 Reboot
OWASP Foundation via YouTube Next Generation Red Teaming - Integrating Application-Centric Attacks
OWASP Foundation via YouTube Leveraging OWASP in Open Source Projects
OWASP Foundation via YouTube Canals and Bridges: Using Amsterdam's Transit System to Secure Kubernetes Networks
CNCF [Cloud Native Computing Foundation] via YouTube Protecting Your Crown Jewels with External Secrets Operator
CNCF [Cloud Native Computing Foundation] via YouTube Cluster Grey Zone - Risks in Managed Cluster Middleware
CNCF [Cloud Native Computing Foundation] via YouTube Top 10 Istio Security Risks and Mitigation Strategies
CNCF [Cloud Native Computing Foundation] via YouTube Hacking and Defending Kubernetes Clusters - Live Demonstration
CNCF [Cloud Native Computing Foundation] via YouTube What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust
CNCF [Cloud Native Computing Foundation] via YouTube