From the course: CompTIA SecurityX (CAS-005) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Threat modeling frameworks

Threat modeling frameworks

- This is a very important web safari, and you really want to make sure for the SecurityX exam, you come and explore all these sites I'm going to show you of these different kind of threat modeling solutions. We're going to start with MITRE ATT&CK, which is a globally accessible knowledge base of adversary tactics and techniques, so TTPs. We can see the main domains here of the matrix where we have different Reconnaissance attacks. We have 8 Resource Development techniques. Initial Access, so things like hardware, phishing, supply chain compromise. There's Execution attacks. Persistence. There's the Privilege Escalation category, for example, Boot or Logon Startup Execution. Defense Evasion. We have Credential Access, Discovery, and then finally, Lateral Movement. So within each one of these categories, we have different tactics and techniques and you can drill down and explore each one of these individually that isn't necessary for the exam. We'll be talking about quite a few things…

Contents