From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Modeling threats
From the course: Ethical Hacking: Vulnerability Analysis
Modeling threats
- [Instructor] One way to prevent an attack is to be able to see where the attack might occur. In this segment, we'll outline how threat modeling helps visualize vulnerabilities within entry points, such as software, networks, and users, so they can be mitigated before resulting in an attack. Today, there are multiple security threats that include malware, supply chain attacks, ransomware, and cryptojacking. When evaluating threats, the security analyst performs several exercises. Let's talk about a few methods. A vulnerability analysis is analyzing potential weaknesses across multiple attack vectors. A threat assessment will determine the best approach to secure a system against a particular threat. And threat modeling looks at external attack vectors to understand how the attacks could be executed. Threat modeling methods are used to create a visualization of the entire system, along with potential entry points and the list of possible attacks. The idea is to gain a well-rounded…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Recognizing common vulnerabilities5m 41s
-
(Locked)
Classifying vulnerabilities5m 3s
-
(Locked)
Assessing vulnerabilities5m 41s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 8s
-
(Locked)
Challenge: Threat modeling exercise2m 40s
-
(Locked)
Solution: Threat modeling exercise2m 22s
-
-
-
-
-