Threat Modeling
Terminology, Tools, Processes, Supplementary, Techniques, Applied Examples, Threat, and Countermeasure Catalogues
Description
This course aims to teach threat modeling starting from the basics and terminology. This course includes demonstration and usage of multiple tools, techniques, and methodologies that are either entirely dedicated to threat modeling or would be useful during the execution of threat modeling. It provides conceptual information and many guides from reputable organizations. It also includes supplementary information which would help the creation of either automatic or manual threat lists.
What You Will Learn!
- Asset Types
- Threat Modeling Basics
- Attack Vector
- Attack Surface
- Attack Tree
- Attack Life Cycle
- Threat Modeling Tools
- STRIDE Methodology
- DREAD Methodology
- TRIKE Threat Modeling Tool
- Elevation of Privilege Threat Modeling Tool
- Delphi Technique
- Common Mistakes and Correct Questions
- Multilevel Threat Modeling
- Microsoft Threat Modeling Installation, Usage, Templates, Modifications
- Microsoft SDL Basics, Resources
- Microsoft SDL for Agile Projects
- Threat and Countermeasure Catalogs, NIST, ISO, ENISA
- NIST Threat Modeling Approach
- Countermeasures
Who Should Attend!
- Students
- Cyber Security Professionals
- System Administrator