Главная
Study mode:
on
1
Introduction
2
Who am I
3
About Uma
4
What is Threat Modeling
5
Why Threat Modeling
6
How and Engaging
7
Threat Models
8
Diamond Threat Model
9
Big Picture
10
Identifying Threats
11
Documentation
12
Communication
13
Validation
14
Mitigations
15
Acceptance Criteria
16
Application Architecture
17
Document
18
Validate
Description:
Explore practical threat modeling techniques for real-world and cloud situations in hybrid and work-from-home environments. Learn a four-stage approach to threat modeling: creating the model, identifying threats, addressing threats, and validating the model. Discover how to set scope, use tools and methodologies, understand current systems, and reflect on measurements. Gain insights into cloud security configurations, shifting to the cloud, and cloud-native scenarios. Apply these concepts to realistic examples and practice threat modeling to improve cyber posture, decrease risk, and integrate security earlier in the software development lifecycle. Examine vulnerabilities from the OWASP Top Ten using DVWA and virtual private cloud setups.

Practical Threat Modeling for Real-World and Cloud Situations in Hybrid Work Environments

OWASP Foundation
Add to list
0:00 / 0:00