Threat Modelling and Beyond for Cisco ACI
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore advanced threat modeling techniques and security considerations for Cisco Application Centric Infrastructure (ACI) in this comprehensive conference talk. Delve into the physical layout, essential background knowledge, and architectural components of ACI. Learn about critical security aspects, including the ACI filter mechanism bypass, VTEP spoofing, and switch compromise. Examine challenge-response functionality, device packages, and the OpFlex control protocol. Gain valuable insights into potential vulnerabilities and discover effective strategies to enhance the security posture of your ACI environment. Conclude with a discussion on next steps for implementing robust threat modeling practices in Cisco ACI deployments.
Syllabus
Intro
Agenda
Physical Layout 1/2
Background Knowledge
Certificates
Architecture 12/21
Short recap STRIDE
ACI Filter Mechanism Bypass
VTEP Spoofing
Switch Compromise
Some Challenge Response Functionality
Device Packages
OpFlex Control Protocol
Next Steps
Taught by
WEareTROOPERS
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity