In this course, you'll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.
Whether you're a developer, executive, ethical hacker, or just have an avid interest in protecting yourself: You cannot protect something unless you understand what you're protecting it from. In this course, Threat Modeling: The Big Picture, you'll be provided with a high-level overview of the ins and outs of threat modeling. First, you'll cover what threat modeling is and how it can be used to identify the types of attacks you might vulnerable to. Next, you'll explore how to use that information to ensure you are protecting yourself. Finally, you'll learn of potential challenges that you may face when attempting to use threat modeling for your day to day activities, projects or environments. When you're finished with this course, you'll have a foundational understanding of threat modeling that will help you strategically identify opportunities for attack, and then use that information to ensure that your applications and environments are protected.
Course Overview Hello. My name is Lee Allen, and welcome to my course, Threat Modeling: The Big Picture. I am an author of several security books and a pen tester at the Columbus Collaboratory. Threat modeling enables you to find threats before you build your systems, and can be accomplished by anyone. This course provides a high-level overview of how organizations can take advantage of threat modeling, to build secure systems and applications. Some of the major topics that we're going to cover include an introduction to threat modeling, a practical example of how threat modeling can help secure an application, and a primer on how ethical hackers can take advantage of threat modeling as well. By the end of this course, you'll know the basics of threat modeling. I hope that you'll join me on this journey to learn threat modeling, with the Threat Modeling: The Big Picture course, at Pluralsight.