Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Description

This brief lesson introduces the course agenda. This module will cover the following: • What is threat modelling? o Definition o Four questions o Approaches • What are mitigations to apply to STRIDE? • How can my team perform Threat Modelling? o Elevation of privilege card game

Video Transcription

00:04
Hello and welcome to the cyber Eri I t secure coding course.
00:09
This is the threat modeling portion my name Miss anywhere, and I'm going to go over the agenda for our threat modelling module. So what we're going to first talk about is threatened modelling exactly what it is and how we can approach threat modeling.
00:29
Now there are four basic questions
00:32
that we can ask ourselves or ask our team that can help us to better approach the threat modeling exercise.
00:41
Then I'm going to go into stride. I'm gonna explain stride and detail as well as talk about the various mitigation techniques that are available to address the threats that are shown in stride
00:57
and then friendly. We're going to wrap up the module by going through a card game called Elevation of Privilege. And I'm going to show you how you can play this game with your team in order to identify exposure points
01:15
and performed the threat modeling exercise

Up Next

Secure Coding

In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.

Instructed By

Instructor Profile Image
Sunny Wear
Instructor