Home
:
Book details
:
Book description
Description of
Navigating Threats - Advanced Strategies in Threat Modeling
Published 12/2023 Created by Derek Fisher MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 25 Lectures ( 2h 56m ) | Size: 944 MB Securing systems from design to deployment using modern threat modeling techniques What you'll learn: Foundational Concepts: Understanding the core elements of threat modeling, including assets, threats, vulnerabilities, and risks. Methodologies: Exploring various threat modeling methodologies like STRIDE, DREAD, Attack Trees, MITRE ATT&CK and how to apply them in different scenarios. Practical Application: Applying threat modeling techniques to real-world scenarios, software systems, or network architectures. Tool Usage: Familiarity with tools and software used in threat modeling to streamline the process and enhance efficiency. Risk Assessment: Learning to evaluate and prioritize risks based on their likelihood and impact, enabling effective risk mitigation strategies. Integration with SDLC: Understanding how to integrate threat modeling into the software development lifecycle (SDLC) for proactive security. Industry Best Practices: Studying industry best practices, standards, and compliance requirements related to threat modeling in various sectors. Emerging Trends: Staying updated with evolving threats, new attack vectors, and the latest approaches to threat modeling Requirements: Basic Cybersecurity Knowledge: Understanding foundational concepts in cybersecurity, such as network security, encryption, access controls, and common attack vectors. Software Development Understanding: Familiarity with software development processes, architectures, and common programming languages to comprehend the software security aspects. System Architecture Awareness: Knowledge of system architectures, including cloud computing, distributed systems, or microservices, to assess vulnerabilities across diverse environments. Networking Fundamentals: Basic understanding of network protocols, architectures, and components to comprehend security implications within networked environments. Description: Who this course is for: IT Professionals: Network administrators, system administrators, and IT managers aiming to understand threats and mitigate risks in their systems. Compliance and Risk Management Personnel: Professionals responsible for compliance, risk assessment, and governance, seeking to understand how threat modeling aligns with regulatory requirements and risk mitigation strategies.