YoVDO

Threat Modeling for Linux Containers LXC, Docker and the Cloud

Offered By: LASCON via YouTube

Tags

LASCON Courses Docker Courses OpenStack Courses System Security Courses Threat Modeling Courses Linux Containers Courses

Course Description

Overview

Explore threat modeling methodologies for complex cloud technologies in this LASCON conference talk. Discover the limitations of traditional data flow diagrams when applied to interconnected systems like OpenStack, Linux Containers, and Docker. Learn from three years of threat modeling experience at Rackspace as the speaker shares valuable insights and demonstrates effective techniques for modeling multi-system OpenStack deployments. Gain practical knowledge on creating useful threat models for developers, operations teams, and security professionals. Delve into topics such as inherited risk, lifecycle documentation, and risk assessment in

Syllabus

Introduction
The Core of this Talk
What is Threat Mama
What is Threat Model
Elite Bubbles
Example
Inherited Risk
The Cloud
Lifecycle Documentation
Website
Risk Assessment


Taught by

LASCON

Related Courses

Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms
The Docker for DevOps course: From development to production
Udemy
Windows Server 2016: Virtualization
Microsoft via edX