SCADA Security Awareness and Standards

(WU-SEC6086.AE1)
Lessons
Lab
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Industrial Control Systems

  • Introduction
  • Basic Process Control Systems
  • OT/IT Network Integration
  • Industrial Safety and Protection Systems
2

ICS Architecture

  • Introduction
  • Network Transmission Media
  • Field Device Architecture
  • Industrial Network Protocols
  • Enterprise Network Protocols
  • Introduction to Secure ICS Architecture
  • Boundary Protection
  • Security Topologies
  • Security Zoning Models
  • The SANS ICS410 Reference Model
  • Wireless Networking
3

ICS Module, Element Hardening, and Cybersecurity Essentials

  • Introduction
  • Endpoint Security and Hardening
  • OS Security/Hardening
  • Application Software Security
  • Anti-Malware
  • Embedded Device Security
  • Network Hardening
  • Introduction to Cybersecurity Essentials for ICS
  • Basic Security Tenets
  • Vulnerability and Threat Identification
  • Events, Incidents, and Attacks
  • Cryptographics
4

Physical Security and Access Management

  • Introduction
  • Infrastructure Security
  • Intrusion Detection and Reporting Systems
  • Video Surveillance Systems
  • Physical Security for ICS
  • Introduction to Access Management
  • Access Control Models
  • Application Runtime and Execution Control
  • User Access Management
  • ICS Access Control
  • Access Control for Cloud Systems
5

ICS Security Governance, Risk Management, and Security Assessments

  • Introduction
  • Security Policies and Procedure Development
  • Risk Management
  • Introduction to ICS Security Assessments
  • Introduction
  • Security Assessments
  • ICS Device Testing
  • ICS Penetration Testing
  • Security Testing Tools
6

ICS Security Monitoring and Incident Response

  • Introduction
  • ICS Lifecycle Challenges
  • Change Management
  • Monitoring
  • Logging and Auditing
  • Incident Management
7

Disaster Recovery and Business Continuity

  • Introduction
  • Business Continuity Plans
  • System Backup and Restoration
  • Disaster Recovery

1

ICS Module, Element Hardening, and Cybersecurity Essentials

  • Exploiting a Website Using SQL Injection
  • Defending Against IP Spoofing
  • Simulating a DDoS Attack
  • Intercepting Traffic with MitM Attacks Using Ettercap
2

Physical Security and Access Management

  • Enabling an ACL
  • Creating a User Account in AD
  • Using File Permissions in Linux
3

ICS Security Governance, Risk Management, and Security Assessments

  • Fingerprinting Using Nmap
  • Exploiting Vulnerable SMB Services (EternalBlue Exploit)
4

ICS Security Monitoring and Incident Response

  • Running Snort in IDS Mode
  • Performing Intrusion Detection Using Zeek
  • Preparing and Performing Post-Incident Activities
  • Performing Incident Response Activities
5

Disaster Recovery and Business Continuity

  • Taking a Full Backup

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top