Softwarez.Info - Software's World!
Master ICS/OT Cybersecurity: Fundamental to Advanced-Part 2 - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: Master ICS/OT Cybersecurity: Fundamental to Advanced-Part 2 (/Thread-Master-ICS-OT-Cybersecurity-Fundamental-to-Advanced-Part-2)



Master ICS/OT Cybersecurity: Fundamental to Advanced-Part 2 - fessridakla - 05-29-2023

[Image: download-2.jpg]

Master ICS/OT Cybersecurity: Fundamental to Advanced-Part 2
Published 5/2023
Created by Sourabh Suman
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 42 Lectures ( 4h 48m ) | Size: 3 GB



Master the Art of Cybersecurity: Empower Yourself with Linux, Cryptology, and Secure Network Design

What you'll learn
Basics to advanced of ICS /OT Cybersecurity
Handson practice on Linux
Handson practice on cryptography
Learning of Incident response
Contingency planing and continuity planning

Requirements
Basic Industrial Software Knowledge Windows Server, Workstation
Prior experience in ICS required otherwise will be tough but not impossible

Description
Welcome to the sequel course of previous part!!Get ready to dive deep into the fascinating realm of Linux, Cryptology, Secure Network Design, Cybersecurity Management, Incident Response, and Contingency and Continuity in this comprehensive Udemy course.? Linux: Unveil the power of Linux as you explore its family tree and delve into the intricate filesystem layout. Put your skills to the test with hands-on labs that will sharpen your expertise in Linux commands.If you don't have Linux machine ask me, I can give you access for  that or create on Azure.? Endpoint Security: Safeguarding your systems is paramount, and this course equips you with the knowledge to protect them. Learn about antivirus software, host-based firewalls, EDR (Endpoint Detection and Response), DLP (Data Loss Prevention), and application allowlisting.(To be added later)? Cryptology: Discover the secrets of encryption and digital security. Explore various cryptography methods, including symmetric and asymmetric key algorithms, hashing, and digital signatures. Unleash the power of Cyberchef tools and dive into firmware analysis with Binwalk.? Secure Network Design: Understand the functional differences in network design and explore use cases for effective network segmentation. Study reference architectures that will help you build robust and secure network infrastructures.? Cybersecurity Management: Learn the key components of a NIST Cybersecurity Program and explore the impact of cybersecurity on manufacturing systems. Dive into cybersecurity frameworks, standards, and policies that guide industry best practices.? Incident Response: Gain invaluable insights into incident response strategies. Compare NIST and SANS methodologies, and master the art of preparation, identification, containment, eradication, recovery, and learning from past incidents.? Contingency and Continuity: Explore different types of plans and discover how business continuity and contingency planning ensure the resilience of organizations. Perform a Business Impact Analysis (BIA) and learn about disaster recovery (DR) strategies.This course is designed to provide you with a comprehensive understanding of essential cybersecurity concepts and practical skills. You'll have the opportunity to test your knowledge through engaging lab exercises and thought-provoking questions. (To be added)Don't miss this chance to become a cybersecurity expert and join the league of professionals protecting digital ecosystems. Enroll now and embark on an exciting journey towards securing the future!

Who this course is for
Control engineers, integrators, and architects who design or implement OT systems
System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
Security consultants who perform security assessments and penetration testing of OT systems
Researchers and analysts who are trying to have hands-on experience
Engineers who need practical understanding of systems
Vendors that are developing products that will be deployed as part of an OT system

HOMEPAGE

[To see links please register or login]


DOWNLOAD

[To see links please register or login]