Understanding Threat Modeling and Its Significance in Cybersecurity
Join Keith Barker in this informative video as he explores the concept of threat modeling, explaining its definition and importance in the field of cybersecurity. Start your learning journey with CBT Nuggets.

CBT Nuggets
91.5K views • Feb 8, 2021

About this video
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, Keith Barker covers threat modeling. He’ll dig into what it is, some of the main processes it involves, and then outline why it’s important. You’ll learn about the three primary approaches to threat modeling, how they’re different, and then decide which is the best for your case.
Threat modeling involves identifying potential (or real) vulnerabilities, then putting countermeasures and controls in place so that those vulnerabilities are not exploited. There are several different approaches we can use when engaging in threat modeling.
First, we can look at it from the attacker’s perspective, seeking to understand their goals and abilities, then reverse engineer protective measures. Second, we could look at things from an architecture perspective, digging into our web servers, email servers, routers, and switches. With this approach, we would identify weaknesses and then create defensive measures.
Finally, we can look at threat modeling from an asset perspective: what do we have, what are we trying to protect, and how is it vulnerable? This prioritizes what we need to defend.
🌐 Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/rnjj
⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/8eiu
Start learning with CBT Nuggets:
• CompTIA CySA+ (CS0-001) | https://courses.cbt.gg/o26
• Information Security | https://courses.cbt.gg/463
• CompTIA Security+ (SY0-501) | https://courses.cbt.gg/c26
In this video, Keith Barker covers threat modeling. He’ll dig into what it is, some of the main processes it involves, and then outline why it’s important. You’ll learn about the three primary approaches to threat modeling, how they’re different, and then decide which is the best for your case.
Threat modeling involves identifying potential (or real) vulnerabilities, then putting countermeasures and controls in place so that those vulnerabilities are not exploited. There are several different approaches we can use when engaging in threat modeling.
First, we can look at it from the attacker’s perspective, seeking to understand their goals and abilities, then reverse engineer protective measures. Second, we could look at things from an architecture perspective, digging into our web servers, email servers, routers, and switches. With this approach, we would identify weaknesses and then create defensive measures.
Finally, we can look at threat modeling from an asset perspective: what do we have, what are we trying to protect, and how is it vulnerable? This prioritizes what we need to defend.
🌐 Download the Free Ultimate Networking Cert Guide: https://blog.cbt.gg/rnjj
⬇️ 13-Week Study Plan: CCNA (200-301): https://blog.cbt.gg/8eiu
Start learning with CBT Nuggets:
• CompTIA CySA+ (CS0-001) | https://courses.cbt.gg/o26
• Information Security | https://courses.cbt.gg/463
• CompTIA Security+ (SY0-501) | https://courses.cbt.gg/c26
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
91.5K
Likes
1.0K
Duration
6:06
Published
Feb 8, 2021
User Reviews
4.4
(18) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now