From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Challenge: Threat modeling exercise
From the course: Ethical Hacking: Vulnerability Analysis
Challenge: Threat modeling exercise
(snappy electronic music) - [Instructor] Let's do a challenge. In this challenge, you'll complete a simple, yet insightful threat modeling exercise. Now, threat modeling is important as it helps you to get an idea of where threats could occur so that you can focus your efforts on mitigating the threats and reducing risk. To complete this exercise, you can use the STRIDE method to identify threats. Now, there are other methods, however, the STRIDE method nicely summarizes potential threats. Now, how this works is that if we take a look at each of the first letters of STRIDE, we can then translate that to where possible threats against the system could be, including spoofing, tampering, repudiation, information disclosure, denial of service, or elevation of privilege. To learn more, you can visit this page from Cisco that outlines threat modeling, along with more details on the STRIDE method found on Microsoft's page. So now here's the challenge, here we see a data flow diagram of a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Recognizing common vulnerabilities5m 41s
-
(Locked)
Classifying vulnerabilities5m 3s
-
(Locked)
Assessing vulnerabilities5m 41s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 8s
-
(Locked)
Challenge: Threat modeling exercise2m 40s
-
(Locked)
Solution: Threat modeling exercise2m 22s
-
-
-
-
-