Threat Modeling
Tampering in Depth
Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a system—early on in a project's life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more.
Contents:
- Introduction
- 1. Tampering with a Process
- 2. Tampering with Storage
- 3. Tampering with Things
- 4. Tampering with Time Itself
- 5. Tampering with Cloud
- 6. Tampering with Data Flows
- 7. Integrity Defenses
- Conclusion
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 32m |
Starts | On Demand (Start anytime) |
Cost | $29/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Adam Shostack |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | Network Security Threat Modeling |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Researcher - CO2 modeling $55k
Generation Modeling Analyst $67k
Threat Analyst with CIRAT $74k
Threat Management Engineer $75k
Threat Analyst $77k
Threat Research Engineer $77k
Portfolio Modeling Analyst $79k
Insider Threat Analyst $79k
Scientist - Modeling and Theory $90k
Modeler, Exposure Modeling $102k
Data Modeling Engineer $112k
Threat & Vulnerability Analyst $118k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 32m |
Starts | On Demand (Start anytime) |
Cost | $29/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Adam Shostack |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | Network Security Threat Modeling |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course