mirror of
https://github.com/hysnsec/awesome-threat-modelling.git
synced 2024-10-01 08:25:38 -04:00
Added 'Securing Systems', CAIRIS and 'from the trenches'
This commit is contained in:
parent
d961f36810
commit
2d67ca984a
@ -30,10 +30,13 @@ Contributions welcome. Add links through pull requests or create an issue to sta
|
|||||||
|
|
||||||
- [Threat Modeling](https://www.amazon.in/Threat-Modeling-Microsoft-Professional-Swiderski/dp/0735619913)
|
- [Threat Modeling](https://www.amazon.in/Threat-Modeling-Microsoft-Professional-Swiderski/dp/0735619913)
|
||||||
|
|
||||||
|
- [Securing Systems: Applied Security Architecture and Threat Models](https://www.amazon.com/Securing-Systems-Brook-S-Schoenfield/dp/1032027401)
|
||||||
|
|
||||||
- [Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis](https://www.amazon.in/Risk-Centric-Threat-Modeling-Simulation/dp/0470500964)
|
- [Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis](https://www.amazon.in/Risk-Centric-Threat-Modeling-Simulation/dp/0470500964)
|
||||||
|
|
||||||
- [Threat Modeling: A Practical Guide for Development Teams](https://www.oreilly.com/library/view/threat-modeling/9781492056546/)
|
- [Threat Modeling: A Practical Guide for Development Teams](https://www.oreilly.com/library/view/threat-modeling/9781492056546/)
|
||||||
|
|
||||||
|
- [Designing Usable and Secure Software with IRIS and CAIRIS](https://link.springer.com/book/10.1007/978-3-319-75493-2)
|
||||||
|
|
||||||
## Courses
|
## Courses
|
||||||
|
|
||||||
@ -45,9 +48,11 @@ Contributions welcome. Add links through pull requests or create an issue to sta
|
|||||||
- [Threat Modeling, or Architectural Risk Analysis by Coursera](https://www.coursera.org/lecture/software-security/threat-modeling-or-architectural-risk-analysis-bQAoU)
|
- [Threat Modeling, or Architectural Risk Analysis by Coursera](https://www.coursera.org/lecture/software-security/threat-modeling-or-architectural-risk-analysis-bQAoU)
|
||||||
|
|
||||||
- [Threat Modeling Workshop by Robert Hurlbut](https://github.com/rhurlbut/CodeMash2019/blob/master/Robert-Hurlbut-CodeMash2019-Threat-Modeling-Workshop-20190108.pdf)
|
- [Threat Modeling Workshop by Robert Hurlbut](https://github.com/rhurlbut/CodeMash2019/blob/master/Robert-Hurlbut-CodeMash2019-Threat-Modeling-Workshop-20190108.pdf)
|
||||||
|
|
||||||
- [Rapid Threat Model Prototyping (RTMP)](https://github.com/geoffrey-hill-tutamantic/rapid-threat-model-prototyping-docs) - Methodology to create quick threat models (1) add threat metadata describing the threats and mitigations directly to software diagrams using 11 simple and repeatable steps (2) integrate these steps into Agile workstreams (3) how to best use the outputs of a threat model (Threats & Mitigations)
|
- [Rapid Threat Model Prototyping (RTMP)](https://github.com/geoffrey-hill-tutamantic/rapid-threat-model-prototyping-docs) - Methodology to create quick threat models (1) add threat metadata describing the threats and mitigations directly to software diagrams using 11 simple and repeatable steps (2) integrate these steps into Agile workstreams (3) how to best use the outputs of a threat model (Threats & Mitigations)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Paid
|
### Paid
|
||||||
|
|
||||||
- [Certified Threat Modeling Professional by Practical DevSecOps](https://www.practical-devsecops.com/certified-threat-modeling-professional)
|
- [Certified Threat Modeling Professional by Practical DevSecOps](https://www.practical-devsecops.com/certified-threat-modeling-professional)
|
||||||
@ -106,6 +111,8 @@ Contributions welcome. Add links through pull requests or create an issue to sta
|
|||||||
|
|
||||||
- [Look, there's a threat model in my DevOps](https://www.youtube.com/watch?v=ASwZ7cnz-Q4&ab_channel=Auth0)
|
- [Look, there's a threat model in my DevOps](https://www.youtube.com/watch?v=ASwZ7cnz-Q4&ab_channel=Auth0)
|
||||||
|
|
||||||
|
- [Lessons from the threat modeling trenches](https://www.youtube.com/watch?v=DEVt1Adybvs)
|
||||||
|
|
||||||
## Tutorials and Blogs
|
## Tutorials and Blogs
|
||||||
|
|
||||||
*Tutorials and blogs that explain threat modeling*
|
*Tutorials and blogs that explain threat modeling*
|
||||||
|
Loading…
Reference in New Issue
Block a user