Threat Modeling Explained| How to implement threat modeling| Pros and Cons of Threat Modeling Method
The video covers:
W⦁ The video covers:
⦁ What is threat modeling?
⦁ Importance of Threat Modeling
⦁ How to implement threat modeling? A practical, real-time example of implementing threat modeling.
⦁ Different threat modeling methodologies - STRIDE, DREAD, PASTA, OCTAVE, TRIKE, Attack Trees
⦁ Pros and cons of different threat modeling methodologies
⦁ Best practices of threat modeling
Subscribe here: / @cyberplatter8980
CyberPlatter Discord Channel: / discord
Website: cyberplatter.com
Security Analyst and Engineer Interview Question and Answer Playlist: • CyberSecurity Intervie...
www.researchgate.net/figure/I...
Пікірлер: 17
Thanks a lot. This helped me a lot in understanding what is threat modeling.
This is fantastic, nice job!
@cyberplatter8980
10 ай бұрын
Glad you think so! Thank you!
Nice topic.
Thanks to the wonderful content, helps me understand the threat modelling in a better way!
@cyberplatter8980
6 ай бұрын
Thank you for watching.
You have covered a lot of things in depth.. Thanks... How about the recommended tools for the respective TM methodologies?
I've an interview tomorrow, This video is going to be really helpful for me!
@cyberplatter8980
9 ай бұрын
All the best for your interview!
👏
Where we can find threat modeling system complicated one in the description, can you please route me to that I was not able to find it thank you
Please share the reference URLs if any complex web application threat modelling file
Your website CN of certificate doesn't match. Please fix :)
I'm cissp candidate...... thanks for this
@cyberplatter8980
6 ай бұрын
You are welcome!
People don’t have any idea that if they watch this channel videos they can earn approximately 30Lacs
maam pls also upload this notes