Course Information
Course Overview
The first and best ICS/SCADA Cyber Security course on this site! Gain a strong foundation in ICS/SCADA Cyber Security!
Our world is growing more and more dependent upon technology and systems that monitor and control industrial processes. The electric power grid, water and sewage systems, oil and natural gas pipelines, and many more critical infrastructure utilize Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) systems. ICS/SCADA is used to monitor and control these infrastructure processes. This ICS/SCADA Cyber Security course will provide you with a strong foundation in the field of ICS/SCADA Cyber Security. You will learn about various topics such as What is ICS/SCADA? What is the current ICS/SCADA Threat Landscape? How to defend yourself? and many more topics.
Course Content
- 11 section(s)
- 17 lecture(s)
- Section 1 Introduction
- Section 2 What is ICS/SCADA?
- Section 3 ICS/SCADA Architecture
- Section 4 ICS/SCADA Software Examples
- Section 5 ICS/SCADA Protocols
- Section 6 ICS/SCADA Security Standards/Guidance
- Section 7 Why does ICS/SCADA need to be defended?
- Section 8 ICS/SCADA Threat Landscape
- Section 9 ICS/SCADA Attack Surfaces
- Section 10 ICS/SCADA: How to defend yourself
- Section 11 Final Words
What You’ll Learn
- General understanding of what is ICS/SCADA, General understanding of typical ICS/SCADA architectures, General understanding of technologies used in ICS/SCADA, General understanding of software used in ICS/SCADA, General understanding of different ICS/SCADA protocols, General understanding of ICS/SCADA security regulations & standards, Why do these technologies need to be defended?, General understanding of the ICS/SCADA threat landscape, General understanding of ICS/SCADA attack surfaces, General understanding of how to defend yourself, with technical examples, You will learn about the tools and techniques that can be used to better understand your environments., You will have the appropriate mindset for defending your ICS/SCADA environments., You will be inspired to implement your own defenses.
Skills covered in this course
Reviews
-
DDaniel
Very good introductory course in ICS/SCADA. Instructor provides a clear layout, uses his experience, and numerous video/link examples to showcase concepts and technology.
-
AAnshuman Sharma
The course is a good introduction to ICS/SCADA. The author seems knowledgeable and tried covering as much as possible within the 4 hrs. Looking forward to the next detailed course.
-
SSabyasachi Sarkar
It's a very insightful programme with practical segments. The author provides a quiet reassurance as he shows one the lay of the land. While it's a great introduction to the ICS/SCADA information security field, he is careful to emphasise the vastness of the field and provide a direction to budding defenders. Looking forward to more from Ed especially more hands-on programmes. Thanks for the course.
-
SShyamsundar Das
This particular course on OT/ICS Security touches only some OT Attack surfaces and threats. I was excepting deep dive into more technical aspects of OT security like protocols(open source/vendor specific)weaknesses, analysis of the different pcaps, reverse engineering , firmware analysis/update mechanisms security tests. And as you said you come from smart grids back ground you could have shown a scenario of entire smart grid infrastructure and how it can be attacked and mitigated. That would provide end to end picture if cybe security landscape:)