Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling

CSSLP 2019    |    Intermediate
  • 7 videos | 22m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 529 users Rating 4.5 of 529 users (529)
This 7-video course explores the concept of threat modeling and how to develop and use a threat model. You will examine common threats, such as advanced persistent threats (APTs), insider threats, common malware, and third party/supplier threats. You will learn how a development team creates the threat model by using five well-defined stages. Next, learn to develop a security objective which sets the foundation for the threat model development. You will examine six categories of common threats defined in STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege). Then learn to model STRIDE attacks across trust boundaries, processes, external entities, and the like. This course covers attack surface software, an attack anywhere in the system code access by unauthorized party, and how to minimize it. You will learn about Microsoft's published list of attack surface elements associated with Windows. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the process of threat modeling
    Recognize how to model common threats
    Recognize how to perform attack surface evaluation
  • Measure an attack surface
    Recognize how to minimize the attack surface
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 22s
  • 6m 37s
    After completing this video, you will be able to describe the process of threat modeling. FREE ACCESS
  • Locked
    3.  Common Threats
    3m 24s
    After completing this video, you will be able to recognize how to model common threats. FREE ACCESS
  • Locked
    4.  Attack Surface Evaluation
    3m
    Upon completion of this video, you will be able to recognize how to perform an attack surface evaluation. FREE ACCESS
  • Locked
    5.  Attack Surface Measurement
    3m 29s
    To find out how to measure an attack surface, consult a professional or do some research. FREE ACCESS
  • Locked
    6.  Attack Surface Minimization
    3m 34s
    After completing this video, you will be able to recognize how to reduce the attack surface. FREE ACCESS
  • Locked
    7.  Course Summary
    51s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 3.6 of 59 users Rating 3.6 of 59 users (59)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)
Rating 4.2 of 180 users Rating 4.2 of 180 users (180)