~Get Your Files Here !/5 - Module 5 Practical STRIDE Threat Modeling With Microsoft Threat Modeling Tool/1 -Practical STRIDE Threat Modeling With Microsoft Threat Modeling Tool.mp4
54.51 MB
~Get Your Files Here !/1 - Module 1 Introduction to STRIDE Threat Modeling/2 -STRIDE Threat Modeling Overview.mp4
31.82 MB
~Get Your Files Here !/4 - Module 4 Case Study Approach/3 -Case Study 03 -Repudiation Attack Disputed Financial Transaction.mp4
27.89 MB
~Get Your Files Here !/4 - Module 4 Case Study Approach/4 -Case Study 04 - Hospital Patient Records Disclosure.mp4
26.04 MB
~Get Your Files Here !/3 - Module 3 Implementing STRIDE in Your Workflow/1 -03 Key Steps in Threat Modeling.mp4
24.22 MB
~Get Your Files Here !/4 - Module 4 Case Study Approach/1 -Case Study 01 - Spoofing Attack Via Fake Login.mp4
23.31 MB
~Get Your Files Here !/4 - Module 4 Case Study Approach/2 -Case Study 02 - Tampering Attack Ecommerce Price Manipulation.mp4
20.44 MB
~Get Your Files Here !/4 - Module 4 Case Study Approach/5 -Case Study 05 - Privilege Escalation Attack.mp4
19.82 MB
~Get Your Files Here !/2 - Module 2 STRIDE Framework/1 -STRIDE Framework Explained.mp4
19.78 MB
~Get Your Files Here !/2 - Module 2 STRIDE Framework/3 -Benefits Threat Modeling In SDLC.mp4
13.76 MB
~Get Your Files Here !/2 - Module 2 STRIDE Framework/2 -Solar Winds attack Anatomy.mp4
10.81 MB
~Get Your Files Here !/1 - Module 1 Introduction to STRIDE Threat Modeling/1 -Introduction.mp4
9.31 MB
~Get Your Files Here !/2 - Module 2 STRIDE Framework/4 -How To Integrate Threat Model In SDLC.mp4