Overview
This course aims to help learners understand the concept of threat modeling and its importance in the realm of online security. By the end of the course, students will be able to create data flow diagrams, identify potential security vulnerabilities, assess risks, and implement strategies to mitigate threats effectively. The course covers topics such as security nihilism, data breaches, offensive attacks, and risk assessment. The teaching method involves a combination of theoretical explanations and practical examples to illustrate key concepts. This course is suitable for individuals interested in enhancing their knowledge of online security, particularly those involved in web development, cybersecurity, or data protection.
Syllabus
Intro
Who this talk is for
Why this topic
Security nihilism
Data flow diagram
Purposes
Action
Stripe Protect
Checkmarks
Checkmarks Vulnerability
Factories
Offensive Attacks
Data Breaches
Location Control
Hardware
Introduction to Threat Modeling
Where is data coming from
Red Teams
Choose What You Share
Risk vs Reward