Linkedin Learning – Threat Modeling Denial of Service and Elevation of Privilege

Linkedin Learning – Threat Modeling Denial of Service and Elevation of Privilege-XQZT
English | Size: 192.28 MB
Category: Tutorial


In this installment of Adam Shostack’s Threat Modeling series covering the STRIDE threat modeling framework, Adam goes over the D and E parts of the framework: denial of service and elevation of privilege.

Linkedin Learning – Microsoft 365 Security Administration MS-500 Cert Prep 3 Implement and Manage Threat Protection

Linkedin Learning – Microsoft 365 Security Administration MS-500 Cert Prep 3 Implement and Manage Threat Protection-XQZT
English | Size: 286.79 MB
Category: Tutorial


Cybersecurity skills are in high demand, and the Microsoft 365 Security Administration exam (MS-500) is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers.

Linkedin Learning – Threat Modeling Information Disclosure in Depth

Linkedin Learning – Threat Modeling Information Disclosure in Depth-ZH
English | Size: 119.59 MB
Category: Tutorial


STRIDE is a popular threat modeling framework that helps security pros and software developers think strategically about risk. This course addresses the I in STRIDE, which stands for information disclosure. You can learn how to preserve the confidentiality of the data, secrets, and other information you store, and the policies you need to put into place to share that information safely. Topics include classic models such as data at rest and data in motion as well as information disclosure in processes and information disclosure in certain technologies such as cloud, Internet of Things and mobile, and AI and machine learning. Expert Adam Shostack also reviews the side effects of computation, the physical effects of CPUs, and the defenses you can put into place at your organization to manage metadata, secrets, and other sensitive information

Infosecinstitute- Threat Modeling

Infosecinstitute- Threat Modeling
English | Size: 4.57 GB
Category: Tutorial


Threat modeling is a process to identify security weaknesses in software design and architecture. In this path, you will explore five courses, starting with a background and top-level view of threat modeling. The second course will describe three core security frameworks that can be used with threat modeling to find threats and mitigations. The third course covers the “moving parts,” or elements of a threat model and their relationship with each other. The fourth course covers the basics of threat modeling, the fifth course introduces secure agile architecture concepts, and the sixth is a lab bringing it all together.

Linkedin Learning – Microsoft 365 Implement Security and Threat Management

Linkedin Learning – Microsoft 365 Implement Security and Threat Management-ZH
English | Size: 398.73 MB
Category: Tutorial


The Microsoft 365 Mobility and Security (MS-101) exam tests a candidates ability to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. The second domain of the exam covers the implementation, management, and monitoring of threat management and security protection services. This course covers these objectives, outlining the recommended tools and techniques to ensure user accounts and access are managed and controlled correctly. Learn how to implement and manage Cloud App Security, Office 365 Advanced Threat Protection (ATP), Windows Defender ATP, Azure AD Identity Protection, and additional security reports and alerts. By the end of the course, youll have the skills to secure your Microsoft 365 deployments and ace the second domain of this critical certification exam