Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Threat Modeling

    Posted By: ELK1nG
    Threat Modeling

    Threat Modeling
    Last updated 10/2020
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.99 GB | Duration: 5h 27m

    Terminology, Tools, Processes, Supplementary, Techniques, Applied Examples, Threat, and Countermeasure Catalogues

    What you'll learn

    Asset Types

    Threat Modeling Basics

    Attack Vector

    Attack Surface

    Attack Tree

    Attack Life Cycle

    Threat Modeling Tools

    STRIDE Methodology

    DREAD Methodology

    TRIKE Threat Modeling Tool

    Elevation of Privilege Threat Modeling Tool

    Delphi Technique

    Common Mistakes and Correct Questions

    Multilevel Threat Modeling

    Microsoft Threat Modeling Installation, Usage, Templates, Modifications

    Microsoft SDL Basics, Resources

    Microsoft SDL for Agile Projects

    Threat and Countermeasure Catalogs, NIST, ISO, ENISA

    NIST Threat Modeling Approach

    Countermeasures

    Requirements

    Basic Computer Knowledge

    Description

    This course aims to teach threat modeling starting from the basics and terminology. This course includes demonstration and usage of multiple tools, techniques, and methodologies that are either entirely dedicated to threat modeling or would be useful during the execution of threat modeling. It provides conceptual information and many guides from reputable organizations. It also includes supplementary information which would help the creation of either automatic or manual threat lists.

    Overview

    Section 1: Summary and Wrap Up

    Lecture 1 Summary and Wrap Up

    Section 2: Basics and Terminology

    Lecture 2 Introduction to Threat Modeling

    Lecture 3 Assets

    Lecture 4 Udemy Reviews

    Lecture 5 Attack Vector

    Lecture 6 Attack Tree

    Lecture 7 Attack Tree Exercise Activity

    Lecture 8 Attack Surface

    Lecture 9 Attack Lifecycle

    Lecture 10 How to Do Threat Modeling?

    Section 3: Threat Modeling Tools and Techniques

    Lecture 11 Threat Modeling Tools

    Lecture 12 STRIDE Threat Modeling Approach

    Lecture 13 DREAD Threat Modeling Approach

    Lecture 14 Common Mistakes

    Lecture 15 Correct Questions

    Lecture 16 Delphi Technique

    Lecture 17 Ad-Hoc Methods

    Lecture 18 Multi Level Threat Modeling

    Section 4: Microsoft Threat Modeling Tool In-Depth

    Lecture 19 Install Microsoft Threat Modeling Tool

    Lecture 20 How to Use Microsoft Threat Modeling Tool

    Lecture 21 Use Templates with Microsoft Threat Modeling Tool

    Lecture 22 Microsoft Threat Modeling Activity- A Secure Web Application

    Lecture 23 How to Validate a Model

    Lecture 24 Microsoft Threat Modeling Activity- An Application Using Azure Services

    Lecture 25 Create a New Template Using Microsoft Threat Modeling Tool

    Lecture 26 Update Template for Microsoft Threat Modeling Tool

    Section 5: Microsoft SDL

    Lecture 27 Microsoft SDL

    Lecture 28 Microsoft SDL Resources

    Lecture 29 Microsoft SDL for Agile Projects

    Section 6: Standards, Dictionaries and Other Useful Information

    Lecture 30 Threat Catalogues

    Lecture 31 Enisa Threat Catalog

    Lecture 32 NIST Threat Catalogue-Attack Lifecycle Associated Threating Actions

    Lecture 33 NIST Threat Catalogue-Threat Sources and Their Motivations

    Section 7: Countermeasures

    Lecture 34 Countermeasures

    Lecture 35 How to Choose Correct Countermeasures

    Lecture 36 NIST Security Controls/Countermeasures

    Lecture 37 Countermeasures Selection Brainstorming Exercises- STRIDE Categories

    Lecture 38 Countermeasures Selection Brainstorming Exercises-Well-known Threats

    Lecture 39 NIST Data Centric Threat Modeling Approach and Activity

    Section 8: Conclusion

    Lecture 40 Conclusion

    Students,Cyber Security Professionals,System Administrator