What is Threat Modeling
Provider: CeriFi Checkpoint Learning
Information Technology
0.2 CPE Credits
Overview
Nano Learning
As organizations become more digital and cloud-based, IT systems face increased risk and vulnerability. What can go wrong in an information system? How can we pinpoint design and implementation issues? Are we confident that we did a 'good enough' job in protecting our information systems from privacy, safety, and security threats? When we perform threat modeling, we can begin to answer these vital questions. <br/><br/> This overview-level course provides a general review of this topic from a broad perspective. This course is appropriate for the professional at any organizational level.