Threat Modeling

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.พ. 2025
  • In this lesson, we go over the threat modeling concepts covered in the CISSP Common Body of Knowledge, including
    • Definition of threat modeling (00:07:86)
    • Definitions of threats and threat actors (00:39:28)
    • Elements of an attack surface (1:14:24)
    • Definition and examples of trust boundaries (1:45:68)
    • The three approaches to threat modeling (2:53:22)
    • Explanation of threat modeling methodologies (3:54:06)
    • How to use an attack tree (6:42:34)
    • How to use a data flow diagram (8:29:30)

ความคิดเห็น • 5