MP4 | Video: AVC, 1280x720 30fps | Audio: AAC, 48 KHz, 2 Ch | Duration: 32m 13s
Genre: eLearning | Language: English + Sub | Size: 97 MB
Threat modeling allows security pros and software developers to proactively address the inevitable-hackers trying to compromise a system-early on in a project's life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more.
Topics include:
Tampering as part of STRIDE
How debuggers can be exploited by attackers
Effects of tampering on storage
Tampering with data flows
Physical tampering
Tampering with cloud services
Prevention and detection goals
[/i]Homepage
[i]Screenshots
https://rapidgator.net/file/11f61c13a6fffbd36d6708cca43f75ec
nitroflare_com:
http://nitroflare.com/view/0FEF0CBBEE4383E/Threat_Modeling__Tampering_in_Depth.rar