Performing Threat Modeling with the PASTA Methodology
Do you have a hard time mitigating threats to your applications? Are you confused how to employ threat modeling? This course will teach you how to effectively employ threat modeling to reduce the attack surface of your application. We will use case studies to effectively.
What you'll learn
If you are familiar with threat modeling as an exercise, you would know that threat modeling involves identification of threats and vulnerabilities in the context of your applications. In this course, Performing Threat Modeling with the PASTA Methodology, you’ll learn to build application threat models using PASTA methodology. First, you’ll explore the fundamentals of threat modeling. Next, you’ll discover how to dissect applications into smaller components followed by threat, vulnerability, and weakness analysis. Finally, you’ll learn how to build attack models. When you’re finished with this course, you’ll have the skills and knowledge of PASTA methodology needed to conduct threat modeling.
Table of contents
Popular threat modeling techniques include: OCTAVE (Practice Focused), STRIDE (Developer Focused), VAST (Enterpise Focused), Trike (Acceptable Risk Focused), and P.A.S.T.A (Attacker Focused).
In this course, risk assessment means to identify the information assests that could be affected by a cyber attack.
Threat modeling assists with identifying, calculating, communicating, and understanding potential threats and how to mitigate them while protecting an application's assets.
P.A.S.T.A threat modeling is a seven-step process that is used to simulate attacks to applications and assess possible defensive solutions.
Threat modeling is a process with the objective of identifying potential vulnerabilities such as the absense of safeguards or structural vulnerabilities.