This lesson covers threat modeling. When threat modeling, it is important to identify security objectives, taking into account the following things: • Legislative drivers • Contractual requirements • Alignment with business objectives Threat modelling also involves the C-I-A Triad (Confidentiality-Integrity-Availability). Participants also get to learn about threat modeling tool such as data flow diagrams and use/misuse cases.
ISC2 Certified Secure Software Life-cycle Professional (CSSLP)
This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.