5 hours 54 minutes

Video Description

This lesson covers threat modeling. When threat modeling, it is important to identify security objectives, taking into account the following things: • Legislative drivers • Contractual requirements • Alignment with business objectives Threat modelling also involves the C-I-A Triad (Confidentiality-Integrity-Availability). Participants also get to learn about threat modeling tool such as data flow diagrams and use/misuse cases.

Up Next

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor