Threat Modeling
ฝัง
- เผยแพร่เมื่อ 8 ก.พ. 2025
- In this lesson, we go over the threat modeling concepts covered in the CISSP Common Body of Knowledge, including
• Definition of threat modeling (00:07:86)
• Definitions of threats and threat actors (00:39:28)
• Elements of an attack surface (1:14:24)
• Definition and examples of trust boundaries (1:45:68)
• The three approaches to threat modeling (2:53:22)
• Explanation of threat modeling methodologies (3:54:06)
• How to use an attack tree (6:42:34)
• How to use a data flow diagram (8:29:30)
Very thorough and concise. Thanks 🎉 enjoyed it throughly.
Great video, thank you for the info. I will definitely subscribe.
Thanks for the sub!
So good - thanks for posting this!
No problem!