All current Threat Intelligence Courses courses in 2024
104 Courses

Threat Modeling for Builders Workshop
Gain invaluable insights into the process of threat modeling with our intermediate-level, six-hour Threat Modeling for Builders Workshop. Perfect for software developers, product managers, systems engineers, and architects, this workshop will introduce you to the essential background of threat modeling, including its importance and utility. Learn t.

Performing Threat Modeling with the Microsoft Threat Modeling Methodology
Title: Performing Threat Modeling with the Microsoft Threat Modeling Methodology
Description: Are you tired of discovering security vulnerabilities post-development? Identifying issues late in the process can be both risky and costly. This comprehensive course, provided by Pluralsight and titled "Performing Threat Modeling with the Microsoft Threat.

Threat Modeling with the Microsoft Threat Modeling Tool
Title: Threat Modeling with the Microsoft Threat Tool
Description: Dive into the essentials of threat modeling using the Microsoft Threat Modeling Tool in our comprehensive course offered by Pluralsight. This course is designed not only for those looking to enhance the security of their systems but for anyone interested in learning about applicatio.

Threat Modeling the Death Star
Title: Threat Modeling the Death Star
Description: Join Mario Areias in an illuminating session titled "Threat Modeling the Death Star". Discover the innovative use of attack trees within the realm of DevOps and explore a dynamic approach to threat modeling that challenges traditional assumptions. This talk aims to shift the narrative from the cumb.

Threat Hunting: Network Hunting
Title: Threat Hunting: Network Hunting
Description: Embark on the challenging journey of detecting anomalies and malicious behaviors in network environments with our comprehensive course, Threat Hunting: Network Hunting. This course is designed for individuals tasked with navigating through network traffic to pinpoint harmful activities, even witho.

Implementing Hybrid Threat Solutions with Azure Advanced Threat Protection
Master the essentials of safeguarding your hybrid environment with Microsoft Azure Advanced Threat Protection (ATP) through our comprehensive course. Dive into the expanding world of cybersecurity where threats are continuously evolving, making the adoption of robust and dynamic defensive tools indispensable. Our meticulously designed course on Imp.

Performing Threat Modeling with the OCTAVE Methodology
Discover the essential strategies for safeguarding your organization's critical assets with the "Performing Threat Modeling with the OCTAVE Methodology" course, available now on Pluralsight. This comprehensive course equips you with the tools to identify key assets, assess infrastructure vulnerabilities, and develop a robust protection plan using t.

Threat Modeling: Information Disclosure in Depth
Explore the critical aspect of Information Disclosure within the STRIDE Threat Modeling Framework with our comprehensive course, offered exclusively on LinkedIn Learning. This specialized training is designed to deepen your understanding of how to safeguard the confidentiality of your data, secrets, and other vital information. Whether you're inter.

Threat Modeling: Spoofing In Depth
Title: Threat Modeling: Spoofing In Depth
Description: Delve into the crucial topic of spoofing, a prevalent threat targeting modern systems. This course, provided by LinkedIn Learning, thoroughly examines the types of authentication attacks affecting individuals, machines, file systems, and processes. Understand the mechanics behind these attacks.

Threat Modeling: Tampering in Depth
Title: Threat Modeling: Tampering in Depth
Description: Delve into the world of cybersecurity with our focused session on tampering threats, led by industry experts from LinkedIn Learning. This comprehensive workshop will cover the nuances of how attackers manipulate systems and tools ranging from debuggers to advanced cloud services. Understand th.