YoVDO

Threat Modeling for Linux Containers LXC, Docker and the Cloud

Offered By: LASCON via YouTube

Tags

LASCON Courses Docker Courses OpenStack Courses System Security Courses Threat Modeling Courses Linux Containers Courses

Course Description

Overview

Explore threat modeling methodologies for complex cloud technologies in this LASCON conference talk. Discover the limitations of traditional data flow diagrams when applied to interconnected systems like OpenStack, Linux Containers, and Docker. Learn from three years of threat modeling experience at Rackspace as the speaker shares valuable insights and demonstrates effective techniques for modeling multi-system OpenStack deployments. Gain practical knowledge on creating useful threat models for developers, operations teams, and security professionals. Delve into topics such as inherited risk, lifecycle documentation, and risk assessment in

Syllabus

Introduction
The Core of this Talk
What is Threat Mama
What is Threat Model
Elite Bubbles
Example
Inherited Risk
The Cloud
Lifecycle Documentation
Website
Risk Assessment


Taught by

LASCON

Related Courses

Enterprise System Management and Security
University of Colorado System via Coursera
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
PHP: Complete Login and Registration System with PHP & MYSQL
Udemy
Learn Ethical Hacking From Scratch 2024
Udemy
Serie Windows Server Update Services (WSUS)
Udemy