Description
Price: 10.00 USD | Size: 4.57 GB | Duration : 4.59 Hours | 39 Video Lessons
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD |




4.9
Threat Modeling Learning Path
About Threat Modeling
Threat modeling is a process to identify security weaknesses in software design and architecture. In this path, you will explore five courses, starting with a background and top-level view of threat modeling. The second course will describe three core security frameworks that can be used with threat modeling to find threats and mitigations. The third course covers the “moving parts,” or elements of a threat model and their relationship with each other. The fourth course covers the basics of threat modeling, the fifth course introduces secure agile architecture concepts, and the sixth is a lab bringing it all together.
Why Do Threat Modeling?
Course – 00:52:00
Conceptual Frameworks
Course – 00:47:00
In this course, you’ll look at four public-domain conceptual security threat and weakness frameworks that can greatly assist the threat model activity. Each model has its own strengths and weaknesses for use. All frameworks provide proposed mitigations that a threat modeler can use as part of the threat model analysis.
Threat Model Decomposition
Course – 00:57:00
This course goes into detail on how to identify and enumerate stakeholders, assets and their threats and threat agents. Additional videos provide a tool to enumerate threat agents and outline how to find mitigations for discovered threats.
Why Do Threat Modeling?
Course – 00:52:00
This course goes over the basic steps in creating a threat model by breaking the process down. You’ll cover basic threat analysis guides, when to implement mitigation tactics and how to validate the output of the threat model.
RTMP – Rapid Threat Model Prototyping
Course – 01:23:00
In this course, you’ll cover secure agile architecture concepts in detail, linking business concepts to secure architecture concepts. The course ties this intentional secure architecture view with organic agile secure design practices and Rapid Threat Model Prototyping (RTMP).
Threat Model Lab
Course – 00:18:00
This lab provides hands-on experience for the student to use the previous courses in the creation of a threat model with RTMP.
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.