Threat Modeling
Last updated 10/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.99 GB | Duration: 5h 27m
Last updated 10/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.99 GB | Duration: 5h 27m
Terminology, Tools, Processes, Supplementary, Techniques, Applied Examples, Threat, and Countermeasure Catalogues
What you'll learn
Asset Types
Threat Modeling Basics
Attack Vector
Attack Surface
Attack Tree
Attack Life Cycle
Threat Modeling Tools
STRIDE Methodology
DREAD Methodology
TRIKE Threat Modeling Tool
Elevation of Privilege Threat Modeling Tool
Delphi Technique
Common Mistakes and Correct Questions
Multilevel Threat Modeling
Microsoft Threat Modeling Installation, Usage, Templates, Modifications
Microsoft SDL Basics, Resources
Microsoft SDL for Agile Projects
Threat and Countermeasure Catalogs, NIST, ISO, ENISA
NIST Threat Modeling Approach
Countermeasures
Requirements
Basic Computer Knowledge
Description
This course aims to teach threat modeling starting from the basics and terminology. This course includes demonstration and usage of multiple tools, techniques, and methodologies that are either entirely dedicated to threat modeling or would be useful during the execution of threat modeling. It provides conceptual information and many guides from reputable organizations. It also includes supplementary information which would help the creation of either automatic or manual threat lists.
Overview
Section 1: Summary and Wrap Up
Lecture 1 Summary and Wrap Up
Section 2: Basics and Terminology
Lecture 2 Introduction to Threat Modeling
Lecture 3 Assets
Lecture 4 Udemy Reviews
Lecture 5 Attack Vector
Lecture 6 Attack Tree
Lecture 7 Attack Tree Exercise Activity
Lecture 8 Attack Surface
Lecture 9 Attack Lifecycle
Lecture 10 How to Do Threat Modeling?
Section 3: Threat Modeling Tools and Techniques
Lecture 11 Threat Modeling Tools
Lecture 12 STRIDE Threat Modeling Approach
Lecture 13 DREAD Threat Modeling Approach
Lecture 14 Common Mistakes
Lecture 15 Correct Questions
Lecture 16 Delphi Technique
Lecture 17 Ad-Hoc Methods
Lecture 18 Multi Level Threat Modeling
Section 4: Microsoft Threat Modeling Tool In-Depth
Lecture 19 Install Microsoft Threat Modeling Tool
Lecture 20 How to Use Microsoft Threat Modeling Tool
Lecture 21 Use Templates with Microsoft Threat Modeling Tool
Lecture 22 Microsoft Threat Modeling Activity- A Secure Web Application
Lecture 23 How to Validate a Model
Lecture 24 Microsoft Threat Modeling Activity- An Application Using Azure Services
Lecture 25 Create a New Template Using Microsoft Threat Modeling Tool
Lecture 26 Update Template for Microsoft Threat Modeling Tool
Section 5: Microsoft SDL
Lecture 27 Microsoft SDL
Lecture 28 Microsoft SDL Resources
Lecture 29 Microsoft SDL for Agile Projects
Section 6: Standards, Dictionaries and Other Useful Information
Lecture 30 Threat Catalogues
Lecture 31 Enisa Threat Catalog
Lecture 32 NIST Threat Catalogue-Attack Lifecycle Associated Threating Actions
Lecture 33 NIST Threat Catalogue-Threat Sources and Their Motivations
Section 7: Countermeasures
Lecture 34 Countermeasures
Lecture 35 How to Choose Correct Countermeasures
Lecture 36 NIST Security Controls/Countermeasures
Lecture 37 Countermeasures Selection Brainstorming Exercises- STRIDE Categories
Lecture 38 Countermeasures Selection Brainstorming Exercises-Well-known Threats
Lecture 39 NIST Data Centric Threat Modeling Approach and Activity
Section 8: Conclusion
Lecture 40 Conclusion
Students,Cyber Security Professionals,System Administrator