From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Modeling threats
From the course: Ethical Hacking: Vulnerability Analysis
Modeling threats
- [Instructor] Threat modeling identifies possible vulnerabilities, along with ways cyber criminals can use the information across different entry points, such as software, hardware, networks, and the users. Threat modeling is becoming more important, as today, there are multiple security threats. Threats that include ransomware, which is holding data hostage. Supply chain attacks, where cyber criminals penetrate your system through a third party vendor. Formjacking, which is stealing information using banking and e-commerce sites that collect information using a form. And cryptojacking, which is using someone else's system to mine cryptocurrency. When evaluating threats, the security analyst performs several exercises to reduce overall risk. A vulnerability analysis is analyzing potential weaknesses for access vectors. A threat assessment is determining the best approach to securing a system against a particular…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Risks threats and vulnerabilities4m 16s
-
(Locked)
Common causes of vulnerabilities3m 42s
-
(Locked)
Assessing vulnerabilities3m 47s
-
(Locked)
Vulnerability management life cycle4m 44s
-
(Locked)
Modeling threats4m 7s
-
(Locked)
Challenge: Threat modeling exercise1m 9s
-
(Locked)
Solution: Threat modeling exercise2m 17s
-
-
-
-
-