Cover von Threat Modeling: Spoofing In Depth wird in neuem Tab geöffnet
E-Medium

Threat Modeling: Spoofing In Depth

Verfasser: Suche nach diesem Verfasser Shostack, Adam (Verfasser)
Jahr: 2019
Verlag: LinkedIn
Mediengruppe: EMedien
Vorbestellbar: Ja Nein
Voraussichtlich entliehen bis:
Download Zum Download von externem Anbieter wechseln - wird in neuem Tab geöffnet

Exemplare

StandorteStatusVorbestellungenFrist
Standorte: Status: Verfügbar Vorbestellungen: 0 Frist:

Inhalt

Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early in their careers, because it shapes every system they build and defend. Spoofing, pretending to be someone or something you're not, is one of the key threats to systems. This course teaches you many of the ways in which spoofing happens, including spoofing of people, machines, file systems, and processes. As instructor Adam Shostack explains, spoofing entails many factors: what you know, who you are, where you are, who you know, and more. There's spoofing of people and spoofing of roles, spoofing of processes or file spaces on a system, and spoofing of machine, IP, name, and TLS identities. Learning how and where these attacks take place will help you excel in your career and deliver more secure products and services.

Rezensionen

Details

Verfasser: Suche nach diesem Verfasser Shostack, Adam (Verfasser)
Jahr: 2019
Verlag: LinkedIn
E-Medium: content sample opens in new tab
Suche nach dieser Systematik
Suche nach diesem Interessenskreis
Beschreibung: 00:55:24.00
Suche nach dieser Beteiligten Person
Sprache: Englisch
Mediengruppe: EMedien