Module 6

Information Security Management

Unit 2

Threat Modelling Exercises

Learning Outcomes

  • Describe where to find the key tools and resources used for threat modelling.
  • Explain how to select the most appropriate tool for various situations.
  • Critically evaluate the use of such tools.

e-Portfolio Component: Collaborative Discussion 1: The Risks of Digitalisation

  • The discussion started in the previous unit was continued. Link to the discussion forum: here

Reflection

  • In Unit 2, I concentrated on understanding threat modelling and its various methodologies. YouTube tutorials proved highly effective in establishing a foundational understanding of these concepts.
  • Additionally, I reviewed the summative assessment for Unit 3 and began preparations for it.

Phone

-

Address

Mumbai, India