Module 6
Information Security Management
Unit 2
Threat Modelling Exercises
Learning Outcomes
- Describe where to find the key tools and resources used for threat modelling.
- Explain how to select the most appropriate tool for various situations.
- Critically evaluate the use of such tools.
e-Portfolio Component: Collaborative Discussion 1: The Risks of Digitalisation
- The discussion started in the previous unit was continued. Link to the discussion forum: here
Reflection
- In Unit 2, I concentrated on understanding threat modelling and its various methodologies. YouTube tutorials proved highly effective in establishing a foundational understanding of these concepts.
- Additionally, I reviewed the summative assessment for Unit 3 and began preparations for it.