Skip to content

Latest commit

 

History

History
55 lines (31 loc) · 1.17 KB

LESSON-2.md

File metadata and controls

55 lines (31 loc) · 1.17 KB

Lesson 2: Think like an Attacker slidesview

Anatomy of an Attack


* Think like an attacker
* Attacker motivations

Attack Maps


* Understanding the attack vectors
* Mapping out all the possibilities

The Intel Highway


* Collecting data
* Making the data useful and finding patterns

Crawl, Walk Run


* Identify important security design constraints and controls that need to get built into your software
* Prioritize and build security defenses over time to reduce security risks
* Achieve limited security debt by developing a CWR strategy

Lab #2 slides


* Build an Attack Map
* Build a Crawl Walk Run Strategy

Resources