YoVDO

Threat Modeling - How to Actually Do It and Make It Useful

Offered By: YouTube

Tags

GrrCon Courses Software Development Courses Cybersecurity Courses Risk Management Courses Compliance Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn threat modeling techniques and their practical application in cybersecurity through this conference talk from GrrCon 2018. Explore various threat modeling approaches, including software threat modeling, attack trees, and the FAIR method. Discover how to effectively use network diagrams, the CIS Kill Chain, and attack matrices for comprehensive threat analysis. Gain insights into moving threat modeling to the cloud, addressing compliance changes, and implementing threat modeling in real-world scenarios. Examine the differences between qualitative and quantitative approaches, and understand how to leverage threat modeling to enhance overall cybersecurity posture.

Syllabus

Intro
Disclaimers
Overuse term
Why people are nice
Software Threat Modeling
Whats not threat modeling
Threat Intel Pyramid
OAuth
Trivia
Attack Trees
Denial of Service
Fair Method
CBS
Risk Models
Likely Impact
Environment
Modeling Tool
Network Diagrams
IINS
CIS Community Attack Model
CIS Kill Chain Threat Model
Next Slide
Cybersecurity Domains
Meter Attack Matrix
How to hook it in
System Time Discovery
People Control
Ancient Aliens
Attack Matrix
Software based threading
Microsoft threat modeling
Moving to the cloud
Compliance can change
How to get shit done
Where to start
Qualitative vs Quantitative
Sample Factors
Impact
Musashi
Questions
Cyber Insurance


Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Testing
University of Utah via Udacity
The Hardware/Software Interface
University of Washington via Coursera
Software Debugging
Saarland University via Udacity
Introduction to Systematic Program Design - Part 1
The University of British Columbia via Coursera