Completed
Flow modeling
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Modelling Stories from the Trenches
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About me
- 3 Methodology
- 4 Design Flaws
- 5 App Check
- 6 What we learned
- 7 Stepup Authentication
- 8 Authentication Layer
- 9 Attack Scenarios
- 10 Link between the two
- 11 Flow modeling
- 12 Responsibilities
- 13 Cookies
- 14 Passwords
- 15 Change
- 16 Deployment Scenarios
- 17 Playing Well with Others
- 18 Do You Prevent This
- 19 Lessons