Threat Modeling Explained| How to implement threat modeling| Pros and Cons of Threat Modeling Method

Поделиться
HTML-код
  • Опубликовано: 25 авг 2024

Комментарии • 19

  • @nishchayedmundpaschal8440
    @nishchayedmundpaschal8440 3 месяца назад

    Thanks a lot. This helped me a lot in understanding what is threat modeling.

  • @atulayagupta785
    @atulayagupta785 7 месяцев назад

    Thanks to the wonderful content, helps me understand the threat modelling in a better way!

  • @cowsecurity
    @cowsecurity 11 месяцев назад

    I've an interview tomorrow, This video is going to be really helpful for me!

  • @swizzlestixs7334
    @swizzlestixs7334 11 месяцев назад

    This is fantastic, nice job!

  • @drakesh6379
    @drakesh6379 10 месяцев назад

    You have covered a lot of things in depth.. Thanks... How about the recommended tools for the respective TM methodologies?

  • @vamsikadapa8918
    @vamsikadapa8918 Год назад

    Nice topic.

  • @harshalkukade8664
    @harshalkukade8664 4 месяца назад +1

    People don’t have any idea that if they watch this channel videos they can earn approximately 30Lacs

  • @jagadeeshkorukondi2082
    @jagadeeshkorukondi2082 4 месяца назад

    Where we can find threat modeling system complicated one in the description, can you please route me to that I was not able to find it thank you

  • @mdshiplu5670
    @mdshiplu5670 8 месяцев назад

    I'm cissp candidate...... thanks for this

  • @arfatbagwan48
    @arfatbagwan48 9 месяцев назад

    👏

  • @rajamohanreddy7701
    @rajamohanreddy7701 6 месяцев назад

    Please share the reference URLs if any complex web application threat modelling file

  • @ankurmathur82
    @ankurmathur82 9 месяцев назад

    Your website CN of certificate doesn't match. Please fix :)

  • @hitenahuja3989
    @hitenahuja3989 Год назад

    maam pls also upload this notes