Companies Home Search Profile

Security Architecture & Review with Threat Modeling-Hands On

Focused View

Raghu The Security Expert !!

1:58:10

119 View
  • 1. Introduction And Agenda.mp4
    05:44
  • 2. About the course.mp4
    01:04
  • 1. What is Security Architecture And Design Review (SAR).mp4
    06:30
  • 2. 4 Step Process to perform Security Architecture And Design Review in Real Life.mp4
    05:39
  • 3. What is Threat Modeling, its tools and techniques.mp4
    09:08
  • 4. Learn Most Popular Threat Model - STRIDE.mp4
    06:46
  • 5. Learn Most Popular Threat Model - DREAD.mp4
    06:10
  • 1. Hands On Install Microsoft Threat Modeling Tool as a Prerequisite.mp4
    02:39
  • 2. Hands On Step 1 - Gather requirements for the Case Study to perform SAR.mp4
    09:16
  • 3.1 App Security Arch Review Checklist.xlsx
  • 3. Hands On Step 2a - Create Checklist as per inputs received for SAR.mp4
    09:10
  • 4. Create and Fill Security Architecture And Review Checklist.html
  • 5.1 dummy sar threat modeling 1.0.zip
  • 5.2 dummy threatmodeling report 1.0.zip
  • 5.3 dummy threatmodeling report 2.0.zip
  • 5. Hands On Step 2b - Create Threat Model as per inputs received from stakeholders.mp4
    15:26
  • 6.1 Dummy SAR Summary Report.pptx
  • 6. Hands On Step 3 - Create and review the SAR Summary report.mp4
    12:38
  • 7.1 Dummy SAR Summary Report Final 1.0.pptx
  • 7. Hands On Step 4 - Generate the final version of the SAR summary report.mp4
    05:33
  • 1. Hands On Create an account with IriusRisk.mp4
    04:57
  • 2. Hands On Create a Data Flow Diagram with Irius Risk.mp4
    07:37
  • 3. Hands On Perform Threat Modeling and Generate Reports using IriusRisk.mp4
    09:53
  • 1. Bonus Lecture.html
  • Description


    SAR & Threat Modeling for Absolute Beginners | Learn STRIDE, DREAD Threat Models | Learn IriusRisk, MTM tools

    What You'll Learn?


    • Learn to perform Security Architecture and Design Review
    • Learn to perform Threat Modeling
    • Learn to use STRIDE Threat model
    • Learn about DREAD Threat model
    • Learn to use Microsoft Threat Modeling tool
    • Learn to perform Threat Modeling using IriusRisk and MTM tools

    Who is this for?


  • Security Architects
  • Security Engineers
  • Threat Modeling Engineer
  • Security Analysts
  • What You Need to Know?


  • No Programming language required
  • More details


    Description

    --------------------------------------------------------------------------------------------------------------------------------

    Welcome to our comprehensive course on Security Architecture and Design Review with Threat Modeling!

    In this course, we will cover everything you need to know about designing and implementing secure systems. You will learn about various security threats and how to mitigate them through a comprehensive security architecture and design review process.

    The course will begin with an introduction to the concepts of security architecture and design, followed by an in-depth discussion of threat modeling. You will learn how to identify potential security threats, assess their risk levels, and develop mitigation strategies. You will learn how to apply these techniques in practice, and gain practical experience through hands-on exercises and real-world case studies.


    By the end of the course, you will be able to:

    • Understand the principles of security architecture and design

    • Identify potential security threats and assess their risk levels

    • Develop effective mitigation strategies

    • Apply various security architecture and design review techniques in practice

    • Implement best practices and security frameworks to ensure the security of your systems

    This course is ideal for software developers, security professionals, architects, and anyone else interested in designing and implementing secure systems. With our expert instructors, hands-on exercises, and real-world case studies, you will gain the skills and knowledge you need to build secure and reliable systems. So why wait? Enroll now and start your journey towards becoming a security expert!


    Disclaimer: English subtitles are auto-generated so please ignore any grammar mistakes

    Who this course is for:

    • Security Architects
    • Security Engineers
    • Threat Modeling Engineer
    • Security Analysts

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Raghu The Security Expert !!
    Raghu The Security Expert !!
    Instructor's Courses
    Raghu has completed many cloud certifications in Microsoft, Google and AWS cloud platforms.  He has more than 20 years of experience in the field of security, automation, development and teaching. He loves to learn and teach new technologies. He has also completed very prestigious security certifications. He connects with students and professionals and help them to upskill in an interactive and effective manner.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 16
    • duration 1:58:10
    • Release Date 2023/06/12