Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What is the second step in threat modeling
Threat identification
Map controls to threats
Project initiation
Categorise potential threats
Threat modeling is the security process where potential threats are IDENTIFIED; CATEGORIZED; and ANALYZED. (CISSP Official Study Guide, 8th Edition, page 44) Edit ** Question like this are not true CISSP question. ISC2 does not consider any particular book so giving numbers for specific steps are not right thing for CISSP. AIO steps can be different, CBK can be different.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.