Threat Modeling: Spoofing In Depth Preview

Threat Modeling: Spoofing In Depth

With Adam Shostack Liked by 399 users
Duration: 55m Skill level: Intermediate Released: 2/27/2019

Start my 1-month free trial

Course details

Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early in their careers, because it shapes every system they build and defend. Spoofing, pretending to be someone or something you're not, is one of the key threats to systems. This course teaches you many of the ways in which spoofing happens, including spoofing of people, machines, file systems, and processes. As instructor Adam Shostack explains, spoofing entails many factors: what you know, who you are, where you are, who you know, and more. There's spoofing of people and spoofing of roles, spoofing of processes or file spaces on a system, and spoofing of machine, IP, name, and TLS identities. Learning how and where these attacks take place will help you excel in your career and deliver more secure products and services.

Skills you’ll gain

Earn a sharable certificate

Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.

Sample certificate

Certificate of Completion

  • Showcase on your LinkedIn profile under “Licenses and Certificate” section

  • Download or print out as PDF to share with others

  • Share as image online to demonstrate your skill

Meet the instructor

Learner reviews

4.7 out of 5

413 ratings
  • 5 star
    Current value: 336 81%
  • 4 star
    Current value: 56 13%
  • 3 star
    Current value: 11 2%
  • 2 star
    Current value: 3 <1%
  • 1 star
    Current value: 7 1%

Contents

What’s included

  • Learn on the go Access on tablet and phone

Similar courses

Download courses

Use your iOS or Android LinkedIn Learning app, and watch courses on your mobile device without an internet connection.