From the course: SecOps on Google Distributed Cloud (GDC) for Tier 3 Analysts by Google
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Introduction to modeling techniques - Google Cloud Platform Tutorial
From the course: SecOps on Google Distributed Cloud (GDC) for Tier 3 Analysts by Google
Introduction to modeling techniques
- [Narrator] Threat modeling is an indispensable technique for enhancing the security of your organization. This is particularly true for complex frameworks, such as GDC. So, what techniques can you use to model a threat? A variety of methods have been crafted to assist you in pinpointing, evaluating, and neutralizing potential security threats before they become exploitable adversaries. The most common include STRIDE, PASTA, VAST, Trike, CVSS, Attack Trees, Security Cards, and the Hybrid Threat Modeling Method, htMM Each method is uniquely purposed and specifically tailored to address various facets of security assessment and strategic planning. While it's recommended you look at all these model techniques in more detail, the following videos will introduce the top three in more detail: STIDE, PASTA, and CVSS.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Module overview27s
-
(Locked)
The modern threat landscape1m 58s
-
(Locked)
Introduction to threat modeling3m 29s
-
(Locked)
The threat modeling process1m 26s
-
(Locked)
Threat modeling frameworks2m 27s
-
(Locked)
Threat modeling frameworks at Cymbal Federal1m 42s
-
(Locked)
Threat intelligence feeds4m 14s
-
(Locked)
Introduction to modeling techniques1m
-
(Locked)
Spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE)2m 15s
-
(Locked)
STRIDE at Cymbal Federal.mp43m 33s
-
(Locked)
Process for attack simulation and threat analysis (PASTA)2m 8s
-
(Locked)
PASTA at Cymbal Federal3m 13s
-
(Locked)
Common Vulnerability Scoring System (CVSS)1m 42s
-
(Locked)
CVSS at Cymbal Federal2m 43s
-
(Locked)
Selecting a threat modeling technique1m 15s
-
(Locked)
SecOps-specific tools for threat modeling3m 21s
-
(Locked)
SecOps-specific tools at Cymbal Federal2m
-
(Locked)
Threat mapping3m 6s
-
(Locked)
Best practices for effective threat3m 45s
-
(Locked)
Module summary1m 6s
-
(Locked)
-
-