ISSAP Domain 2: Section 2: Verify and validate design Course
18 minutes
Syllabus
Validate results of threat modeling (e.g., threat vectors, impact, probability)
Video - 00:07:00
Confirm that the sources of threats used in threat modeling are valid and trustworthy.
Identify gaps and alternative solutions
Video - 00:05:00
Determine existing (current) threat remediation and future requirements to establish the threat remediation gap. Then, propose solution for reducing the gap and getting to the desired (future) state.
Independent verification and validation (e.g., tabletop exercises, modeling and simulation, manual review of functions)
Video - 00:05:00
Determine existing (current) verification and validation activities and future requirements to establish the process which meets the stakeholder requirements.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps