Video Description

This lesson covers threat modelling. When threat modelling, consider the following: • What are the security objectives? • The C-I-A Triad Tools that can be used for threat modelling include: • Data flow diagrams • Use/Misuse cases

Course Modules

ISC2 Certified Cloud Security Professional (CCSP)