Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\01.Course Overview\0101.Course Overview.mp4
[5cd168eaa3d23d53]
|
3,682,941 |
67A02787 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\02.Introduction\0201.Introduction.mp4
[b2546cb8ea06124a]
|
8,465,931 |
1BB8BD05 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0301.Introduction.mp4
[cdaa4b6bfba2bf67]
|
1,690,764 |
94A03AE3 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0302.Performing a Postmortem on Globomantics' Breach.mp4
[a1da911075bc1282]
|
8,118,003 |
6A32FD4B |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0303.Introducing Threat Modeling to Your Organization.mp4
[7ecee668b33cbb35]
|
8,093,291 |
DBA2E0CE |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0304.Conducting Threat Modeling Meetings.mp4
[76b75fd102680f0b]
|
5,030,125 |
86F6C70E |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0305.Overcoming Objections to Threat Modeling.mp4
[f648261dc257cf30]
|
9,957,587 |
89D8E694 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization\0306.Summary.mp4
[d8e064931a1888b3]
|
2,016,077 |
24A809E0 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0401.Introduction.mp4
[e9067264214a335c]
|
2,065,166 |
B154FEEC |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0402.Diagramming 101.mp4
[cb9cc3cefbb57884]
|
5,699,171 |
C3E8C2B2 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0403.Knowing Your Use Cases.mp4
[ab1f11a20024d5ec]
|
1,751,614 |
C2C09547 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0404.Building a Data Flow Diagram.mp4
[d4fd1d8229e602a]
|
17,522,306 |
DAC67D69 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0405.Finding Trust Boundaries.mp4
[e2b91a968b082f19]
|
17,206,830 |
B23E2640 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0406.Creating a Security Profile.mp4
[ff2e8dcbf4495afc]
|
2,974,227 |
BBD3E4D1 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application\0407.Summary.mp4
[ea25f8d38670a387]
|
2,209,567 |
3BCD7E94 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0501.Introduction.mp4
[ae8581a0e8136f66]
|
1,154,552 |
AA9978B9 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0502.Defining STRIDE.mp4
[2fa1ba35a16debca]
|
4,762,993 |
76232255 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0503.Threat Modeling Using STRIDE.mp4
[5fab8c8018ac3736]
|
24,214,701 |
E77AB6BF |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0504.Defining STRIDE-per-element.mp4
[673fe3dc96ad00e2]
|
3,693,787 |
84EC5846 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0505.Threat Modeling Using STRIDE-per-element.mp4
[3908a391ad4a1f05]
|
15,485,897 |
5D60914F |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0506.Defining STRIDE-per-interaction.mp4
[e4638405dda1ad38]
|
1,351,344 |
BB0CC5D6 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0507.Threat Modeling Using STRIDE-per-interaction.mp4
[d50902a77ec9451d]
|
6,712,456 |
0FEB3364 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE\0508.Summary.mp4
[f14dc7c277b35b31]
|
1,740,900 |
0894AF89 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0601.Introduction.mp4
[beef83b45afca836]
|
711,090 |
3F67FAC4 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0602. Considering Alternatives to STRIDE.mp4
[4c3884742ef13c47]
|
1,881,844 |
E6032821 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0603.Defining Attack Trees.mp4
[7df1106fd9eb95c6]
|
4,960,588 |
B873BA47 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0604.Defining Attack Libraries.mp4
[3ab0f5d801e38fd5]
|
6,008,821 |
7B0FF1A9 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods\0605.Summary.mp4
[a5dfa9a6670d2fd1]
|
1,594,072 |
2AE2494F |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0701.Introduction.mp4
[b21ed57c55436492]
|
1,060,116 |
CE9ABA91 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0702.Defining Documentation.mp4
[638ba2526ec21d0]
|
3,010,347 |
F8A0D595 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0703.Documenting Threats.mp4
[2145b86884d92c3b]
|
6,058,601 |
06C0F394 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0704.Prioritizing Threats Using Risk Ratings.mp4
[63c4296db9268ef8]
|
5,913,991 |
6FD417B0 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats\0705.Summary.mp4
[af07820c862707ba]
|
1,835,470 |
25769175 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0801.Introduction.mp4
[28af3c5af154c9ee]
|
790,866 |
FFC8EB7D |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0802.How to Deal with Threats.mp4
[91fcb7f9b601df9]
|
5,121,649 |
4F112167 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0803.Mitigating Specific Threats.mp4
[ab004634e5b5e7c9]
|
6,087,589 |
E1E4A6F3 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0804.Creating Security Controls.mp4
[803465cfad3359e0]
|
33,838,781 |
9CE49461 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats\0805.Summary.mp4
[72217ff857c05479]
|
2,073,190 |
7376C1D9 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0901.Introduction.mp4
[91aa2be2adf755d3]
|
756,655 |
06211B97 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0902.Threat Modeling from Start to Finish.mp4
[1d6b15366eef110f]
|
3,691,003 |
A39B105E |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0903.Practicing Threat Modeling.mp4
[389be6b459dc4e2c]
|
6,294,514 |
32B10875 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up\0904.Summary.mp4
[679b4ad5ecdf87d6]
|
1,416,908 |
1940118D |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\Exercise Files\microsoft-threat-modeling-methodology-performing.zip |
1,818,734 |
1F3FE65E |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\01.Course Overview |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\02.Introduction |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\03.Bringing Threat Modeling to Your Organization |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\04.Building the Foundation - Diagramming the Application |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\05.Finding Threats Using STRIDE |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\06.Finding Threats with Alternative Methods |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\07.Documenting Threats |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\08.Dealing with Threats |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\09.Wrapping Up |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology\Exercise Files |
0 |
00000000 |
Pluralsight Performing Threat Modeling with the Microsoft Threat Modeling Methodology |
0 |
00000000 |
|
Total size: |
250,525,059 |
|