Video Description

This lesson covers threat modeling. When threat modeling, it is important to identify security objectives, taking into account the following things: • Legislative drivers • Contractual requirements • Alignment with business objectives Threat modelling also involves the C-I-A Triad (Confidentiality-Integrity-Availability). Participants also get to learn about threat modeling tool such as data flow diagrams and use/misuse cases.

Course Modules

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)