Threat Modeling for Linux Containers LXC, Docker and the Cloud
Offered By: LASCON via YouTube
Course Description
Overview
Explore threat modeling methodologies for complex cloud technologies in this LASCON conference talk. Discover the limitations of traditional data flow diagrams when applied to interconnected systems like OpenStack, Linux Containers, and Docker. Learn from three years of threat modeling experience at Rackspace as the speaker shares valuable insights and demonstrates effective techniques for modeling multi-system OpenStack deployments. Gain practical knowledge on creating useful threat models for developers, operations teams, and security professionals. Delve into topics such as inherited risk, lifecycle documentation, and risk assessment in
Syllabus
Introduction
The Core of this Talk
What is Threat Mama
What is Threat Model
Elite Bubbles
Example
Inherited Risk
The Cloud
Lifecycle Documentation
Website
Risk Assessment
Taught by
LASCON
Related Courses
Enterprise System Management and SecurityUniversity of Colorado System via Coursera Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam PHP: Complete Login and Registration System with PHP & MYSQL
Udemy Learn Ethical Hacking From Scratch 2024
Udemy Serie Windows Server Update Services (WSUS)
Udemy