Threat Modeling: The Big Picture

Pluralsight
Course Summary
In this course, you'll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.
-
+
Course Description
Whether you're a developer, executive, ethical hacker, or just have an avid interest in protecting yourself: You cannot protect something unless you understand what you're protecting it from. In this course, Threat Modeling: The Big Picture, you'll be provided with a high-level overview of the ins and outs of threat modeling. First, you'll cover what threat modeling is and how it can be used to identify the types of attacks you might vulnerable to. Next, you'll explore how to use that information to ensure you are protecting yourself. Finally, you'll learn of potential challenges that you may face when attempting to use threat modeling for your day to day activities, projects or environments. When you're finished with this course, you'll have a foundational understanding of threat modeling that will help you strategically identify opportunities for attack, and then use that information to ensure that your applications and environments are protected.
-
+
Course Syllabus
Course Overview- 1m 6s
—Course Overview 1m 6sThe Power of Threat Modeling- 13m 37s
—Introduction 1m 23s
—The Dynamic Nature of Security 2m 32s
—Threat Modeling Overview 3m 38s
—Practical Example 2m 21s
—Who Uses Threat Modeling? 2m 22s
—Conclusion 1m 20sTools of the Trade- 10m 51sImproving Application Security with Threat Modeling- 20m 4sThreat Modeling for Hackers- 8m 40sExpected Challenges- 10m 52s