Introduction to Analyzing ThreatsIdentifying Security ThreatsMitigating ThreatsThreat ModelingProject: Insecure Juice Shop
Introduction to Vulnerability and RiskUnderstanding VulnerabilitiesAssessing VulnerabilitiesDetermining Risk and Business ImpactManaging and Mitigating RiskProject: Juice Shop Vulnerabilities Report