Skip to content

Latest commit

 

History

History
29 lines (22 loc) · 850 Bytes

threat_modeling.md

File metadata and controls

29 lines (22 loc) · 850 Bytes
layout title
default
Threat Modeling

In this session we'll talk about threat modeling, a process to determine which threats are important to an application and find points where defenses might be lacking.

What you'll learn

  • "Heavy-weight" threat modeling
    • How to do it
    • Why it isn't a good fit for bug bounty hunters
  • Light-weight threat modeling
    • How to do it
    • Why it's simple and effective

Video

<iframe id="ytplayer" type="text/html" width="640" height="360" src="https://www.youtube-nocookie.com/embed/6DI7RIXUTg8?rel=0&autoplay=0&origin={{ site.url }}" frameborder="0"></iframe>

Resources