Threat Modeling: Spoofing In Depth
With Adam Shostack
Liked by 415 users
Duration: 56m
Skill level: Intermediate
Released: 2/27/2019
Course details
Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early in their careers, because it shapes every system they build and defend. Spoofing, pretending to be someone or something you're not, is one of the key threats to systems. This course teaches you many of the ways in which spoofing happens, including spoofing of people, machines, file systems, and processes. As instructor Adam Shostack explains, spoofing entails many factors: what you know, who you are, where you are, who you know, and more. There's spoofing of people and spoofing of roles, spoofing of processes or file spaces on a system, and spoofing of machine, IP, name, and TLS identities. Learning how and where these attacks take place will help you excel in your career and deliver more secure products and services.
Skills you’ll gain
Earn a sharable certificate
Share what you’ve learned, and be a standout professional in your desired industry with a certificate showcasing your knowledge gained from the course.
LinkedIn Learning
Certificate of Completion
-
Showcase on your LinkedIn profile under “Licenses and Certificate” section
-
Download or print out as PDF to share with others
-
Share as image online to demonstrate your skill
Meet the instructor
Learner reviews
-
Sergio Correa
Sergio Correa
Application Security Engineer
-
Edgar Cruz
Edgar Cruz
Physical Education Teacher at Montgomery County Public Schools
-
Ronald Alexis Restrepo
Ronald Alexis Restrepo
Data Engineer | AWS Cloud | Python Developer Backend
Contents
What’s included
- Learn on the go Access on tablet and phone