CISSP, CCSP THREAT MODELLING EXAM PRACTICE

Поделиться
HTML-код
  • Опубликовано: 25 авг 2024
  • In this video, I have discussed some questions related to threat modeling, which can be helpful for you while preparing for #cissp #ccsp #cisa #csslp exam #STRIDE

Комментарии • 25

  • @dangerzone2enter
    @dangerzone2enter 3 года назад +6

    I love this version of coffee.
    This session was a stress reliever one.
    Amazing once again .

  • @lonetlv
    @lonetlv Год назад

    Going through all your cofee shots bhai!
    I have my CISSP exam on feb and feel much confident after watching the shots series.

  • @MrAbinashi
    @MrAbinashi 3 года назад

    Awesome

  • @nadinegiannotti8327
    @nadinegiannotti8327 3 года назад

    Thanks Prabh for helping us break down the questions.

  • @anandarokiaraj
    @anandarokiaraj 2 года назад

    Excellent and was very helpful. Would like to more such coffee. 😊

  • @Vmr48765
    @Vmr48765 3 года назад

    awesome :)

  • @sankarravichandran2057
    @sankarravichandran2057 3 года назад

    Great Prabhu...

  • @maniayappa
    @maniayappa 3 года назад

    Excellent video sir

  • @gayan4u
    @gayan4u 3 года назад

    👍

  • @01020304050607ful
    @01020304050607ful 3 года назад

    Me too more sessions please

  • @Cybersecdebut
    @Cybersecdebut 3 года назад +2

    Wouldn't you want to identify vulnerabilities after you identify threats? Thanks

    • @PrabhNair1
      @PrabhNair1  3 года назад

      Yes u right but it's more like most framework

  • @jayshreedesai374
    @jayshreedesai374 2 года назад +2

    Prabh, I would like to know why this would not be correct sequence. PLEASE PLEASE HELP : Assessment scope
    Identity exploitable vulnerabilities
    Identify threat agents & possible attack
    Prioritize the risks
    Understand existing counter measure
    Identity countermeasure to reduce threat

    • @robm9663
      @robm9663 2 года назад

      This is precisely the order I came up with while viewing. I am confused by the answer in the video also.

    • @jaduami
      @jaduami Год назад

      In my opinion, unless you define a threat or a potential attack can take place (eg. fire) you would not be able to identify related vulnerability (electric room, server room, pantry gas/microwave) that can be exploited (to start a fire) so threat is identified first if it is really materialistic then analyze vulnerabilities

    • @Curious_Bob
      @Curious_Bob Год назад

      I came up the same sequence. If you don't know the vulnerability how can you determine threat agent who can exploit it by following a particular sequence of attack.

  • @gaurav7894
    @gaurav7894 2 года назад

    Threat agents could be large in numbers, once we have scope assessment why not understand existing vulnerabilities of systems in scope? Wouldn't it be more efficient instead of looking for all the threat agents and attacks?

  • @infosectraining
    @infosectraining Год назад

    Hi Prabh, I'm currently studying the Domain 8. While practicing in the CISSP Official Practice Tests, there is a question related to threat modeling program (Question 9), however, I couldn't find nothing related in the Official guide in this domain in particular. How is the approach that I have to take into account regarding threat modeling in Domain 8?

  • @AhlanWaSahlann
    @AhlanWaSahlann 3 года назад

    Excellent Prabh, if possible,
    plz give us coffee twice a day.. we're addicted:)

  • @vinayaksrimal3111
    @vinayaksrimal3111 3 года назад

    Dear prabh thanks a lot for the video! one doubt regarding the second question. unless we identify vulnerability, how can we identify threat agent and possible attacks? thx in advance

    • @PrabhNair1
      @PrabhNair1  3 года назад

      Threat has no connection with vulnerability
      Threat is an action w

    • @umairiqbal8747
      @umairiqbal8747 2 года назад

      I'm also confused as vulnerabilities give rise to threats and threat agents use exploit that vulnerability introduce .. you first should identify system vulnarebilites then only you will be able to effectively identify all threat agents .