From the course: Threat Modeling: Repudiation in Depth
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Next steps
- This course is a great introduction to understanding repudiation threats. So you can apply them to threat modeling and other security work. I want to encourage you to watch my other courses here on LinkedIn Learning. You can also read my book, "Threat Modeling: Designing for Security." A systematic, structured and comprehensive approach to threat modeling will bring your teams to more secure and robust outcomes faster. The next time you find yourself working on a new feature, product or service, be sure to consider what can go wrong and what you're going to do about that.