HOME > IT & Software > Threat Modeling

Threat Modeling

SynopsisThreat Modeling, available at $59.99, has an average rating o...
Threat Modeling  No.1

Threat Modeling, available at $59.99, has an average rating of 4.2, with 40 lectures, 5 quizzes, based on 55 reviews, and has 179 subscribers.

You will learn about Asset Types Threat Modeling Basics Attack Vector Attack Surface Attack Tree Attack Life Cycle Threat Modeling Tools STRIDE Methodology DREAD Methodology TRIKE Threat Modeling Tool Elevation of Privilege Threat Modeling Tool Delphi Technique Common Mistakes and Correct Questions Multilevel Threat Modeling Microsoft Threat Modeling Installation, Usage, Templates, Modifications Microsoft SDL Basics, Resources Microsoft SDL for Agile Projects Threat and Countermeasure Catalogs, NIST, ISO, ENISA NIST Threat Modeling Approach Countermeasures This course is ideal for individuals who are Students or Cyber Security Professionals or System Administrator It is particularly useful for Students or Cyber Security Professionals or System Administrator.

Enroll now: Threat Modeling

Summary

Title: Threat Modeling

Price: $59.99

Average Rating: 4.2

Number of Lectures: 40

Number of Quizzes: 5

Number of Published Lectures: 40

Number of Published Quizzes: 5

Number of Curriculum Items: 45

Number of Published Curriculum Objects: 45

Original Price: $59.99

Quality Status: approved

Status: Live

What You Will Learn

  • Asset Types
  • Threat Modeling Basics
  • Attack Vector
  • Attack Surface
  • Attack Tree
  • Attack Life Cycle
  • Threat Modeling Tools
  • STRIDE Methodology
  • DREAD Methodology
  • TRIKE Threat Modeling Tool
  • Elevation of Privilege Threat Modeling Tool
  • Delphi Technique
  • Common Mistakes and Correct Questions
  • Multilevel Threat Modeling
  • Microsoft Threat Modeling Installation, Usage, Templates, Modifications
  • Microsoft SDL Basics, Resources
  • Microsoft SDL for Agile Projects
  • Threat and Countermeasure Catalogs, NIST, ISO, ENISA
  • NIST Threat Modeling Approach
  • Countermeasures
  • Who Should Attend

  • Students
  • Cyber Security Professionals
  • System Administrator
  • Target Audiences

  • Students
  • Cyber Security Professionals
  • System Administrator
  • This course aims to teach threat modeling starting from the basics and terminology. This course includes demonstration and usage of multiple tools, techniques, and methodologies that are either entirely dedicated to threat modeling or would be useful during the execution of threat modeling. It provides conceptual information and many guides from reputable organizations. It also includes supplementary information which would help the creation of either automatic or manual threat lists.

    Course Curriculum

    Chapter 1: Summary and Wrap Up

    Lecture 1: Summary and Wrap Up

    Chapter 2: Basics and Terminology

    Lecture 1: Introduction to Threat Modeling

    Lecture 2: Assets

    Lecture 3: Udemy Reviews

    Lecture 4: Attack Vector

    Lecture 5: Attack Tree

    Lecture 6: Attack Tree Exercise Activity

    Lecture 7: Attack Surface

    Lecture 8: Attack Lifecycle

    Lecture 9: How to Do Threat Modeling?

    Chapter 3: Threat Modeling Tools and Techniques

    Lecture 1: Threat Modeling Tools

    Lecture 2: STRIDE Threat Modeling Approach

    Lecture 3: DREAD Threat Modeling Approach

    Lecture 4: Common Mistakes

    Lecture 5: Correct Questions

    Lecture 6: Delphi Technique

    Lecture 7: Ad-Hoc Methods

    Lecture 8: Multi Level Threat Modeling

    Chapter 4: Microsoft Threat Modeling Tool In-Depth

    Lecture 1: Install Microsoft Threat Modeling Tool

    Lecture 2: How to Use Microsoft Threat Modeling Tool

    Lecture 3: Use Templates with Microsoft Threat Modeling Tool

    Lecture 4: Microsoft Threat Modeling Activity- A Secure Web Application

    Lecture 5: How to Validate a Model

    Lecture 6: Microsoft Threat Modeling Activity- An Application Using Azure Services

    Lecture 7: Create a New Template Using Microsoft Threat Modeling Tool

    Lecture 8: Update Template for Microsoft Threat Modeling Tool

    Chapter 5: Microsoft SDL

    Lecture 1: Microsoft SDL

    Lecture 2: Microsoft SDL Resources

    Lecture 3: Microsoft SDL for Agile Projects

    Chapter 6: Standards, Dictionaries and Other Useful Information

    Lecture 1: Threat Catalogues

    Lecture 2: Enisa Threat Catalog

    Lecture 3: NIST Threat Catalogue-Attack Lifecycle Associated Threating Actions

    Lecture 4: NIST Threat Catalogue-Threat Sources and Their Motivations

    Chapter 7: Countermeasures

    Lecture 1: Countermeasures

    Lecture 2: How to Choose Correct Countermeasures

    Lecture 3: NIST Security Controls/Countermeasures

    Lecture 4: Countermeasures Selection Brainstorming Exercises- STRIDE Categories

    Lecture 5: Countermeasures Selection Brainstorming Exercises-Well-known Threats

    Lecture 6: NIST Data Centric Threat Modeling Approach and Activity

    Chapter 8: Conclusion

    Lecture 1: Conclusion

    Instructors

  • Threat Modeling  No.2
    Ferda ?zdemir S?nmez
    Dr.
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 2 votes
  • 3 stars: 9 votes
  • 4 stars: 11 votes
  • 5 stars: 30 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!