Главная
Study mode:
on
1
Introduction
2
Threat hunting
3
Intrusion kill chain
4
Project Aurora
5
Reconning Systems
6
Phishing
7
Selecting the Attack Vector
8
The Golden Nugget
9
Threat Modeling
10
Threat Classification
11
Trust Boundaries
12
Example
13
No Safe Spaces
14
Stride Model
15
Cloud Repo
16
Information Disclosure
17
Denial of Service
18
Video Sensor
19
Blind
20
Privilege Escalation
21
Capture Process
22
Audit Trail
23
Surface
24
Evil Bit Set
25
Response to pushback
26
Troy Hunt
Description:
Explore secure coding best practices and threat hunting techniques in this comprehensive conference talk from C++Now 2019. Dive into the world of cybersecurity with Matthew Butler as he guides you through the process of threat modeling and its importance in Modern C++ development. Learn about Intrusion Kill Chains and their role in understanding attacker methodologies. Participate in a hands-on threat modeling exercise using the STRIDE approach, covering Spoofing, Tampering, Repudiation, Information leakage, Denial of service, and Escalation attacks. Discover how to identify attack surfaces, uncover architectural flaws, and develop effective mitigation strategies. Gain insights into the Zero Trust world and its impact on systems design. Understand why mastering Modern C++ is crucial for building secure systems in an increasingly complex technological landscape.

Secure Coding Best Practices - Threat Hunting

CppNow
Add to list