From the course: Threat Modeling: Spoofing In Depth

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Next steps

Next steps

From the course: Threat Modeling: Spoofing In Depth

Start my 1-month free trial

Next steps

- Spoofing threats are everywhere. There are no perfect systems, which makes spoofing a constant threat. If you're interested in learning more, the best way to learn is to dive in and spoof. Do this to systems in a lab or where it's otherwise authorized, but go get some tools, give these approaches a try. Make some of it real so you can speak to spoofing as you analyze new systems. This course is a great introduction to understanding spoofing threats, so you can apply it to threat modeling work. For a more comprehensive view, check out my book Threat Modeling: Designing for Security. A systematic, structured, and comprehensive approach to threat modeling will lead your teams to more secure robust outcomes in more predictable time frames. The next time you find yourself looking at something you're working on, be sure to consider what can go wrong and what you're going to do about it.

Contents