Threat Modeling: Tampering in Depth Preview

Threat Modeling: Tampering in Depth

With Adam Shostack Liked by 140 users
Duration: 32m Skill level: Intermediate Released: 9/6/2019

Start my 1-month free trial

Course details

Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a system—early on in a project's life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more.

Skills you’ll gain

Meet the instructor

Learner reviews

4.8 out of 5

59 ratings
  • 5 star
    Current value: 52 88%
  • 4 star
    Current value: 5 8%
  • 3 star
    Current value: 2 3%
  • 2 star
    Current value: 0 0%
  • 1 star
    Current value: 0 0%

Contents

What’s included

  • Learn on the go Access on tablet and phone

Similar courses

Download courses

Use your iOS or Android LinkedIn Learning app, and watch courses on your mobile device without an internet connection.