Lynda - Threat Modeling: Denial of Service and Elevation of Privilege

seeders: 11
leechers: 6
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 70
  • Language: English

Files

Threat Modeling Denial of Service and Elevation of Privilege [TutsNode.com] - Threat Modeling_ Denial of Service and Elevation of Privilege
  • Threat Modeling_ Denial of Service and Elevation of Privilege-description.txt (0.0 KB)
  • 06 EOP
    • 003 Main forms of corrupt input.mp4 (12.9 MB)
    • 003 Main forms of corrupt input-en.srt (4.2 KB)
    • 002 Input corrupts-en.srt (2.7 KB)
    • 001 What is elevation of privilege_-en.srt (1.7 KB)
    • 001 What is elevation of privilege_.mp4 (5.9 MB)
    • 002 Input corrupts.mp4 (5.0 MB)
    01 Introduction
    • 001 Let me interrupt you-en.srt (1.4 KB)
    • 002 STRIDE and the four question framework-en.srt (3.1 KB)
    • 002 STRIDE and the four question framework.mp4 (6.6 MB)
    • 001 Let me interrupt you.mp4 (6.5 MB)
    03 Properties of DoS Attacks
    • 002 Na239ve to clever_ Understanding DoS-en.srt (3.8 KB)
    • 003 Amplified or native_ Two modes of DoS-en.srt (3.1 KB)
    • 001 Persistence and transience of DoS-en.srt (1.7 KB)
    • 002 Na239ve to clever_ Understanding DoS.mp4 (10.5 MB)
    • 003 Amplified or native_ Two modes of DoS.mp4 (8.1 MB)
    • 001 Persistence and transience of DoS.mp4 (5.2 MB)
    07 EOP Defenses
    • 007 Stack canaries to protect your code-en.srt (3.7 KB)
    • 008 Sandboxes and isolation protect your environment-en.srt (3.2 KB)
    • 006 Memory safety as a defensive tool-en.srt (3.2 KB)
    • 005 Attenuation in defense-en.srt (3.1 KB)
    • 003 Validate for purpose to prevent elevations-en.srt (2.7 KB)
    • 009 Bolt-on or built-in defenses-en.srt (2.1 KB)
    • 002 Validation to defend against elevation-en.srt (2.1 KB)
    • 004 Validation not sanitization for defense-en.srt (2.0 KB)
    • 001 Ways to defend against EOP-en.srt (1.8 KB)
    • 006 Memory safety as a defensive tool.mp4 (9.8 MB)
    • 007 Stack canaries to protect your code.mp4 (8.5 MB)
    • 003 Validate for purpose to prevent elevations.mp4 (8.4 MB)
    • 005 Attenuation in defense.mp4 (8.3 MB)
    • 004 Validation not sanitization for defense.mp4 (6.7 MB)
    • 009 Bolt-on or built-in defenses.mp4 (6.2 MB)
    • 002 Validation to defend against elevation.mp4 (6.1 MB)
    • 008 Sandboxes and isolation protect your environment.mp4 (5.0 MB)
    • 001 Ways to defend against EOP.mp4 (3.8 MB)
    02 DoS Targets
    • 001 DoS in context-en.srt (1.6 KB)
    • 003 How attackers redline your CPU-en.srt (3.6 KB)
    • 002 Attackers fill networks-en.srt (2.3 KB)
    • 004 How attackers fill storage-en.srt (2.5 KB)
    • 005 How attackers spend your budget-en.srt (1.9 KB)
    • 006 How attackers drain your battery-en.srt (1.6 KB)
    • 003 How attackers redline your CPU.mp4 (10.2 MB)
    • 004 How attackers fill storage.mp4 (7.5 MB)
    • 006 How attackers drain your battery.mp4 (6.3 MB)
    • 002 Attackers fill networks.mp4 (5.8 MB)
    • 001 DoS in context.mp4 (5.7 MB)
    • 005 How attackers spend your budget.mp4 (4.8 MB)
    08 Conclusion
    • 001 Making great strides-en.srt (3.1 KB)
    • 001 Making great strides.mp4 (7.8 MB)
    04 DoS in Various Technologies
    • 002 Cloud denial of service-en.srt (2.3 KB)
    • 001 Mobile and IoT denial of service-en.srt (2.0 KB)
    • 001 Mobile and IoT denial of service.mp4 (6.7 MB)
    • 002 Cloud denial of service.mp4 (5.3 MB)
    05 DoS Defenses
    • 001 Designing for resilience-en.srt (2.0 KB)
    • 002 Quantity as a defense-en.srt (1.1 KB)
    • 001 Designing for resilience.mp4 (7.4 MB)
    • 002 Quantity as a defense.mp4 (4.0 MB)
    • TutsNode.com.txt (0.1 KB)
    • TutsNode.com.url (0.1 KB)
    • .pad
      • 0 (72.8 KB)
      • 1 (41.3 KB)
      • 2 (46.2 KB)
      • 3 (231.8 KB)
      • 4 (235.2 KB)
      • 5 (54.7 KB)
      • 6 (159.0 KB)
      • 7 (162.7 KB)
      • 8 (240.2 KB)
      • 9 (211.7 KB)
      • 10 (74.2 KB)
      • 11 (32.0 KB)
      • 12 (94.0 KB)
      • 13 (161.8 KB)
      • 14 (214.1 KB)
      • 15 (180.0 KB)
      • 16 (67.8 KB)
      • 17 (130.0 KB)
      • 18 (75.2 KB)
      • 19 (198.0 KB)
      • 20 (9.5 KB)
      • 21 (169.7 KB)
      • 22 (46.7 KB)
      • 23 (211.2 KB)
      • 24 (228.3 KB)
      • 25 (226.8 KB)
      • 26 (208.8 KB)

Description


Description

In this installment of Adam Shostack’s Threat Modeling series covering the STRIDE threat modeling framework, Adam goes over the D and E parts of the framework: denial of service and elevation of privilege. For both threats, Adam digs deep into two main questions: “What can go wrong?” and “What are we going to do about it?” He details the many targets of denial-of-service attacks like storage, memory, CPU bandwidth, and budget, and how elevation of privilege exists in basically any running code. He then goes over structured methods for ensuring that your systems are resistant to the various types of DoS attacks and elevation-of-privilege attacks. These attacks affect all manner of systems, and having an understanding of how they work and how to combat them are essential parts of a comprehensive approach to cybersecurity.

Released 2/19/2021



Download torrent
199.1 MB
seeders:11
leechers:6
Lynda - Threat Modeling: Denial of Service and Elevation of Privilege


Trackers

tracker name
udp://inferno.demonoid.pw:3391/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.opentrackr.org:1337/announce
udp://torrent.gresille.org:80/announce
udp://glotorrents.pw:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.pirateparty.gr:6969/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://9.rarbg.to:2710/announce
udp://shadowshq.yi.org:6969/announce
udp://tracker.zer0day.to:1337/announce
µTorrent compatible trackers list

Download torrent
199.1 MB
seeders:11
leechers:6
Lynda - Threat Modeling: Denial of Service and Elevation of Privilege


Torrent hash: 1E59BEDC366435197040A472CF4E7FA80903D22E