Skip to content

What is Threat Modeling

Provider: CeriFi Checkpoint Learning

Information Technology 0.2 CPE Credits Overview Nano Learning
As organizations become more digital and cloud-based, IT systems face increased risk and vulnerability. What can go wrong in an information system? How can we pinpoint design and implementation issues? Are we confident that we did a 'good enough' job in protecting our information systems from privacy, safety, and security threats? When we perform threat modeling, we can begin to answer these vital questions. <br/><br/> This overview-level course provides a general review of this topic from a broad perspective. This course is appropriate for the professional at any organizational level.

Not an LCvista user, get in touch with our team to get started.

Get Started Back to Catalog