Introduction
How to handle risk
()
1. Risk Management
Risk management
()
Quantitative risk assessment
()
Risk management actions
()
Ongoing risk management
()
Risk management frameworks
()
Risk visibility and reporting
()
2. Threat Modeling
Identifying threats
()
Understanding attacks
()
Technology and process remediation
()
3. Threat Assessment
Security assessment tools
()
Scan for threats and vulnerabilities
()
Assess threats
()
Threat assessment techniques
()
Penetration testing
()
Advanced vulnerability scanning
()
Common Vulnerability Scoring System (CVSS)
()
Interpreting CVSS scores
()
Analyzing scan reports
()
4. Remediating Vulnerabilites
Report scan results
()
Prioritize remediation
()
Create a remediation workflow
()
Barriers to vulnerability remediation
()
5. Security Monitoring
Monitor log files
()
Security information and event management
()
Continuous security monitoring
()
Visualization and reporting
()
Compliance monitoring
()
Legal and ethical issues in monitoring
()
6. Software Testing
Code review
()
Code tests
()
Fuzz testing
()
Interface testing
()
Misuse case testing
()
Test coverage analysis
()
Conclusion
What's next?
()