YoVDO

Practical Threat Modeling for Real-World and Cloud Situations in Hybrid Work Environments

Offered By: OWASP Foundation via YouTube

Tags

Threat Modeling Courses Cybersecurity Courses Risk Assessment Courses Cloud Architecture Courses Cloud Security Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore practical threat modeling techniques for real-world and cloud situations in hybrid and work-from-home environments. Learn a four-stage approach to threat modeling: creating the model, identifying threats, addressing threats, and validating the model. Discover how to set scope, use tools and methodologies, understand current systems, and reflect on measurements. Gain insights into cloud security configurations, shifting to the cloud, and cloud-native scenarios. Apply these concepts to realistic examples and practice threat modeling to improve cyber posture, decrease risk, and integrate security earlier in the software development lifecycle. Examine vulnerabilities from the OWASP Top Ten using DVWA and virtual private cloud setups.

Syllabus

Introduction
Who am I
About Uma
What is Threat Modeling
Why Threat Modeling
How and Engaging
Threat Models
Diamond Threat Model
Big Picture
Identifying Threats
Documentation
Communication
Validation
Mitigations
Acceptance Criteria
Application Architecture
Document
Validate


Taught by

OWASP Foundation

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network