课程详情
Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early in their careers, because it shapes every system they build and defend. Spoofing, pretending to be someone or something you're not, is one of the key threats to systems. This course teaches you many of the ways in which spoofing happens, including spoofing of people, machines, file systems, and processes. As instructor Adam Shostack explains, spoofing entails many factors: what you know, who you are, where you are, who you know, and more. There's spoofing of people and spoofing of roles, spoofing of processes or file spaces on a system, and spoofing of machine, IP, name, and TLS identities. Learning how and where these attacks take place will help you excel in your career and deliver more secure products and services.
您将获得的技能
获取证书,展示成果
分享学到的内容,成为理想行业的达人,获取证书,展示您在课程中所学的知识。
领英学习
结业证书
-
在领英档案中的“资格认证”版块下展示
-
下载或打印为 PDF,与他人分享
-
以图片形式在线分享,展现您的技能
了解讲师
学员评价
-
Javier Mauricio Salazar
Javier Mauricio Salazar
Cybersecurity Analyst at Régie de l'assurance maladie du Québec
-
Sergio Correa
Sergio Correa
Application Security Engineer | Master in Information Security | CISSP | AWS Solutions Architect Associate
-
内容
课程内容
- 随时随地学习 可在平板电脑和手机上访问