Threat Modeling

Posted By: ELK1nG

Threat Modeling
Last updated 10/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.99 GB | Duration: 5h 27m

Terminology, Tools, Processes, Supplementary, Techniques, Applied Examples, Threat, and Countermeasure Catalogues

What you'll learn

Asset Types

Threat Modeling Basics

Attack Vector

Attack Surface

Attack Tree

Attack Life Cycle

Threat Modeling Tools

STRIDE Methodology

DREAD Methodology

TRIKE Threat Modeling Tool

Elevation of Privilege Threat Modeling Tool

Delphi Technique

Common Mistakes and Correct Questions

Multilevel Threat Modeling

Microsoft Threat Modeling Installation, Usage, Templates, Modifications

Microsoft SDL Basics, Resources

Microsoft SDL for Agile Projects

Threat and Countermeasure Catalogs, NIST, ISO, ENISA

NIST Threat Modeling Approach

Countermeasures

Requirements

Basic Computer Knowledge

Description

This course aims to teach threat modeling starting from the basics and terminology. This course includes demonstration and usage of multiple tools, techniques, and methodologies that are either entirely dedicated to threat modeling or would be useful during the execution of threat modeling. It provides conceptual information and many guides from reputable organizations. It also includes supplementary information which would help the creation of either automatic or manual threat lists.

Overview

Section 1: Summary and Wrap Up

Lecture 1 Summary and Wrap Up

Section 2: Basics and Terminology

Lecture 2 Introduction to Threat Modeling

Lecture 3 Assets

Lecture 4 Udemy Reviews

Lecture 5 Attack Vector

Lecture 6 Attack Tree

Lecture 7 Attack Tree Exercise Activity

Lecture 8 Attack Surface

Lecture 9 Attack Lifecycle

Lecture 10 How to Do Threat Modeling?

Section 3: Threat Modeling Tools and Techniques

Lecture 11 Threat Modeling Tools

Lecture 12 STRIDE Threat Modeling Approach

Lecture 13 DREAD Threat Modeling Approach

Lecture 14 Common Mistakes

Lecture 15 Correct Questions

Lecture 16 Delphi Technique

Lecture 17 Ad-Hoc Methods

Lecture 18 Multi Level Threat Modeling

Section 4: Microsoft Threat Modeling Tool In-Depth

Lecture 19 Install Microsoft Threat Modeling Tool

Lecture 20 How to Use Microsoft Threat Modeling Tool

Lecture 21 Use Templates with Microsoft Threat Modeling Tool

Lecture 22 Microsoft Threat Modeling Activity- A Secure Web Application

Lecture 23 How to Validate a Model

Lecture 24 Microsoft Threat Modeling Activity- An Application Using Azure Services

Lecture 25 Create a New Template Using Microsoft Threat Modeling Tool

Lecture 26 Update Template for Microsoft Threat Modeling Tool

Section 5: Microsoft SDL

Lecture 27 Microsoft SDL

Lecture 28 Microsoft SDL Resources

Lecture 29 Microsoft SDL for Agile Projects

Section 6: Standards, Dictionaries and Other Useful Information

Lecture 30 Threat Catalogues

Lecture 31 Enisa Threat Catalog

Lecture 32 NIST Threat Catalogue-Attack Lifecycle Associated Threating Actions

Lecture 33 NIST Threat Catalogue-Threat Sources and Their Motivations

Section 7: Countermeasures

Lecture 34 Countermeasures

Lecture 35 How to Choose Correct Countermeasures

Lecture 36 NIST Security Controls/Countermeasures

Lecture 37 Countermeasures Selection Brainstorming Exercises- STRIDE Categories

Lecture 38 Countermeasures Selection Brainstorming Exercises-Well-known Threats

Lecture 39 NIST Data Centric Threat Modeling Approach and Activity

Section 8: Conclusion

Lecture 40 Conclusion

Students,Cyber Security Professionals,System Administrator