Threat Modeling: Spoofing In Depth
This was a linkedin Learning about Threat Modeling – Spoofing. The speaker of this learning was Adam Shostack. During this learning, I learned about identifying and addressing key security risks in systems. I also learned the fundamentals of authentication, how different authentication factors are attacked, and the various ways spoofing can occur including spoofing hosts, people, files, and processes. This course will help me to design and implement systems with improved security measures.