From the course: Threat Modeling: Tampering in Depth

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

From the course: Threat Modeling: Tampering in Depth

Start my 1-month free trial

Next steps

- [Adam] I hope you're interested in learning more, and the best way to learn is to dive in and tamper. Do this to systems in a lab, or where you have authorization, but go get some tools. Give these approaches a try. Make it real, so you can speak to tampering as you analyze new systems. This course is a great introduction to understanding tampering threats, so you can apply them to threat modeling and other security work. For a more comprehensive view, check out my book, "Threat Modeling: Designing for Security." A systematic, structured and comprehensive approach to threat modeling will lead your teams to more secure and robust outcomes in more predictable timeframes. The next time you find yourself looking at something you're working on, be sure to consider what can go wrong and what you're going to do about it.

Contents