When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Performing Threat Modeling with the OCTAVE Methodology
This course focuses on utilizing the OCTAVE Methodology to identify critical assets, infrastructure vulnerabilities, and an overall protection plan.

This Course Includes
pluralsight
3 (14 reviews )
1 hour 15 minutes
english
Online - Self Paced
core courses
pluralsight
About Performing Threat Modeling with the OCTAVE Methodology
Creating a protection plan to protect your organizations critical assets can be a daunting task. In this course, Performing Threat Modeling with the OCTAVE Methodology, you will utilize the OCTAVE methodology. First, you will learn how to create security requirements. Next, you will learn how to identify infrastructure vulnerabilities. Finally, you will use the information gathered in the methodology to create an overarching security plan that reduces risk, and can be used on a continual basis. When you are finished with the course, you will have the skills and knowledge of performing the OCTAVE Methodology to reduce risk, identify critical assets, and infrastructure vulnerabilities needed to create a security program that is customized to your organization.
What You Will Learn?
- Course Overview : 1min.
- Defining OCTAVE Method Structure : 2mins.
- Building Security Requirements : 31mins.
- Identifying Infrastructure Vulnerabilities : 16mins.
- Determining Security Risk Management Strategy : 22mins.