YoVDO

Threat Modeling of Containerized Applications - Three Levels of Complexity

Offered By: OWASP Foundation via YouTube

Tags

Threat Modeling Courses Cybersecurity Courses Docker Courses Kubernetes Courses DevSecOps Courses Risk Assessment Courses Application Security Courses Containerization Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of threat modeling for containerized applications in this 26-minute conference talk from OWASP Global AppSec Tel Aviv. Delve into optimizing threat modeling processes, addressing the challenges organizations face in implementation, and learn how to adapt the model for container-specific security concerns. Discover real-world examples of how effective threat modeling can mitigate the impact of Docker and Kubernetes vulnerabilities. Gain insights from Elena Kravchenko, an experienced Application Security Expert and CISSP, as she shares strategies for measuring success, implementing incremental improvements, and integrating threat modeling throughout the development lifecycle.

Syllabus

Three levels of complexity: Threat Modeling of Containerized Application ELENA KRAVCHENKO


Taught by

OWASP Foundation

Related Courses

Designing and Executing Information Security Strategies
University of Washington via Coursera
Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera
Diagnosing the Financial Health of a Business
Macquarie Graduate School of Management via Open2Study
Enfermedades transfronterizas de los animales
Miríadax
Unethical Decision Making in Organizations
University of Lausanne via Coursera