return home
In this session we’ll talk about threat modeling, a process to determine which threats are important to an application and find points where defenses might be lacking.
What you’ll learn
- “Heavy-weight” threat modeling
- How to do it
- Why it isn’t a good fit for bug bounty hunters
- Light-weight threat modeling
- How to do it
- Why it’s simple and effective
Video
Resources
return home |
suggest changes