Threat Modeling the Right Way for Builders Workshop

Threat Modeling the Right Way for Builders Workshop

AWS LIS-AWSII-6912

Kostenlos
This workshop introduces you to some of the background of threat modeling and why to do it, as well as some of the tools and techniques for modeling systems, identifying threats, and selecting mitigations. The workshop guides you through the process of creating a system model and corresponding threat model. Then you assess the usefulness of these models. Each exercise has step-by-step instructions and you can use the associated participant workbook as you progress through the workshop.Course level: FundamentalDuration: 3 hoursActivitiesThis course includes information presentations, interactive elements, and hands-on exercises.Course objectivesIn this course, you will learn:What threat modeling is and why it is usefulHow to model a system using a data flow diagramHow to use a data flow diagram to find useful threats to a systemHow to identify mitigations for threats and how to choose between themHow to evaluate the effectiveness of your modelsIntended audienceThis course is intended for:Software DevelopersProduct ManagersSystems EngineersArchitectsPrerequisitesNone Course outlineModule 1: IntroductionWorkshop introductionWorkshop overviewIntroduction to threat modelingModule 2: What are we working on?What are we working on?Exercise 1Module 3: What can go wrong?What can go wrong?Exercise 2Module 4: What are we going to do about it?What are we going to do about it?Exercise 3Module 5: Did we do a good enough job?Did we do a good enough job?Exercise 4Module 6: ConclusionResourcesFeedback
Schreiben Sie Ihre eigene Bewertung

Nur registrierte Nutzer können Bewertungen abgeben. Bitte melden Sie sich an oder Erstellen Sie ein Benutzerkonto