Search result for Threat modeling Online Courses & Certifications
Get Course Alerts by Email
Introduction to Risk Management
by Qasim Ijaz- 4.7
Approx. 10 hours to complete
You will leave the course with skills relating to threat modeling and business continuity planning that have direct applications at your current job or in your future career. Threat Modeling Introduction to Threat Modeling How to Threat Model Diagramming Your Threat Model Threat Modeling Assessment...
Identifying Security Vulnerabilities
by Sandra Escandor-O'Keefe- 4.6
Approx. 13 hours to complete
We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. Cryptography Basics: Application to Threat Models Lab: Threat Model Activity...
Penetration Testing - Discovering Vulnerabilities
by Aspen Olmsted- 0.0
5 Weeks
The class concludes with threat modeling and vulnerability identification. During the threat modeling and vulnerability identification phase, the tester identifies targets and maps the attack vectors....
$166
Information Security - Introduction to Information Security
by Aspen Olmsted , Justin Cappos- 0.0
5 Weeks
Learn the fundamentals of information security, including Security Design Principles, Threat Modeling and Security Policy. Among the topics covered are Security Design Principles, Threat Modeling, and Security Policy. Describe Threat Modeling...
$166
The Complete Cyber Security Course : Hackers Exposed!
by Nathan House- 4.5
12 hours on-demand video
required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments....
$15.99
Cyber Security: Learn How to Protect Your System & Web App
by Thinkahead Academy, LLC.- 0.0
4.5 hours on-demand video
Learn how to analyze a web application using application threat modeling...
$12.99
Secure Software Development: Verification and More Specialized Topics
by David A. Wheeler- 0.0
7 Weeks
Learn how to verify software for security, and take a deeper dive into the basics of applying threat models and cryptography. Threat modeling/Attack modeling: How to consider your system from an attacker’s point of view and how to apply a simple design analysis approach called STRIDE....
$199
Related searches
Penetration Testing with KALI and More: All You Need to Know
by Mohamad Mahjoub- 4.6
6.5 hours on-demand video
1) Assess security risks by adopting a standard Threat Modeling technique...
$14.99
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Major Threat Actors...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Persona Modeling Threat Intelligence Threat Modeling Threat and Risk Libraries Threat Modeling and Analysis Tools...