Video description
This course is designed to help you understand and apply threat modeling, critical for ensuring software security. Through practical exercises on a fictional E-Bike Rental App, you will gain the skills to systematically perform threat modeling. The course introduces an iterative and incremental approach to threat modeling that integrates into agile development practices. It is tailored for application security champions, software architects, and IT security specialists.
Upon completing this course, you will have the capability to create, update, and manage your own threat models. This expertise will enable you to systematically pinpoint potential vulnerabilities in your products. Moreover, the course emphasizes the significance of utilizing threat modeling as a tool to raise awareness among your teams and stakeholders. You will learn how to effectively communicate security and privacy concerns, fostering a shared understanding and commitment to software assurance within your team.
What you’ll learn and how to apply it
By the end of this on-demand course, you’ll understand:
- Where threat modeling fits in a secure development lifecycle
- The benefits of threat modeling
- The different stages of threat modeling
- The STRIDE model (spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege)
- Security design mitigations
- How to prioritize and fix threat modeling findings
And you’ll be able to:
- Create and update your own threat models with an incremental technique
- Identify design flaws in your software
- Use threat modeling as an awareness tool for your team and stakeholders
- Get your team on the same page with a shared vision on security and privacy
This course is for you because you are one or more of the following
- Application security champion
- Software architect
- IT security specialist
- Development team member
- DevOps team member
Prerequisites
- Familiarity with core principles of software engineering and basic security concepts.
Course Materials
Product information
- Title: Threat Modeling Fundamentals: Debug Your Security Design through Whiteboard Hacking
- Author(s):
- Release date: April 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 0790145435989
You might also like
video
Software Security Testing
Does finding security bugs, hacking software, and breaking into applications and databases sound exciting? Do you …
audiobook
ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard
Written and narrated by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 – An …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
video
Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking
More than 3.5 hours of video instruction to help you learn the skills necessary to perform …