Overview
This course covers the fundamentals of threat modeling, including defining threat modeling, gathering documentation, creating data flow diagrams, identifying threats using STRIDE and Elevation of Privilege, addressing and validating threats, and understanding the differences between threat modeling and risk assessment. The course is designed for individuals interested in learning about threat modeling and enhancing their cybersecurity skills.
Syllabus
Introduction
What is threat modeling
Definitions
Gather Documentation
Data Flow Diagram
Identifying Threats
Stride
Elevation of Privilege
Addressing the Threats
Validating
Challenge
Threat Modeling vs Risk Assessment
Threat vs Vulnerability