Threat Modeling: Tampering in Depth

Go to class
Write Review

Free Online Course: Threat Modeling: Tampering in Depth provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Threat Modeling: Tampering in Depth is taught by Adam Shostack.

Overview
  • Learn how tampering threats work and how to mitigate them. Explore how attackers can tamper with a variety of systems and tools, from debuggers to cloud services.

Syllabus
  • Introduction

    • Mitigate tampering threats
    • Four-question framework
    • Tampering as part of STRIDE
    1. Tampering with a Process
    • Debuggers and input
    • Libraries
    • Mobile
    2. Tampering with Storage
    • Tampering with local storage
    • Permissions
    • Effects of tampering
    3. Tampering with Things
    • Whose screw? Physical tampering matters
    • Debug interfaces are exposed
    4. Tampering with Time Itself
    • Time is increasingly important
    5. Tampering with Cloud
    • Controls and authentication
    • Becoming Jane Admin
    6. Tampering with Data Flows
    • Channels and messages
    • Replay and reflection
    • Headers: Injection and order
    7. Integrity Defenses
    • Prevention and detection goals
    • Crypto
    • Something more privileged
    Conclusion
    • Next steps