Start learning cybersecurity with CBT Nuggets. [ Ссылка ]
In this video, Keith Barker covers threat modeling. He’ll dig into what it is, some of the main processes it involves, and then outline why it’s important. You’ll learn about the three primary approaches to threat modeling, how they’re different, and then decide which is the best for your case.
Threat modeling involves identifying potential (or real) vulnerabilities, then putting countermeasures and controls in place so that those vulnerabilities are not exploited. There are several different approaches we can use when engaging in threat modeling.
First, we can look at it from the attacker’s perspective, seeking to understand their goals and abilities, then reverse engineer protective measures. Second, we could look at things from an architecture perspective, digging into our web servers, email servers, routers, and switches. With this approach, we would identify weaknesses and then create defensive measures.
Finally, we can look at threat modeling from an asset perspective: what do we have, what are we trying to protect, and how is it vulnerable? This prioritizes what we need to defend.
🌐 Download the Free Ultimate Networking Cert Guide: [ Ссылка ]
⬇️ 13-Week Study Plan: CCNA (200-301): [ Ссылка ]
Start learning with CBT Nuggets:
• CompTIA CySA+ (CS0-001) | [ Ссылка ]
• Information Security | [ Ссылка ]
• CompTIA Security+ (SY0-501) | [ Ссылка ]
Ещё видео!