Udemy

ICS/SCADA Cyber Security

Enroll Now
  • 2,133 Students
  • Updated 7/2020
4.0
(576 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 2 Minute(s)
Language
English
Taught by
Ed Galarza
Rating
4.0
(576 Ratings)

Course Overview

ICS/SCADA Cyber Security

The first and best ICS/SCADA Cyber Security course on this site! Gain a strong foundation in ICS/SCADA Cyber Security!

Our world is growing more and more dependent upon technology and systems that monitor and control industrial processes. The electric power grid, water and sewage systems, oil and natural gas pipelines, and many more critical infrastructure utilize Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) systems. ICS/SCADA is used to monitor and control these infrastructure processes. This ICS/SCADA Cyber Security course will provide you with a strong foundation in the field of ICS/SCADA Cyber Security. You will learn about various topics such as What is ICS/SCADA? What is the current ICS/SCADA Threat Landscape? How to defend yourself? and many more topics.

Course Content

  • 11 section(s)
  • 17 lecture(s)
  • Section 1 Introduction
  • Section 2 What is ICS/SCADA?
  • Section 3 ICS/SCADA Architecture
  • Section 4 ICS/SCADA Software Examples
  • Section 5 ICS/SCADA Protocols
  • Section 6 ICS/SCADA Security Standards/Guidance
  • Section 7 Why does ICS/SCADA need to be defended?
  • Section 8 ICS/SCADA Threat Landscape
  • Section 9 ICS/SCADA Attack Surfaces
  • Section 10 ICS/SCADA: How to defend yourself
  • Section 11 Final Words

What You’ll Learn

  • General understanding of what is ICS/SCADA, General understanding of typical ICS/SCADA architectures, General understanding of technologies used in ICS/SCADA, General understanding of software used in ICS/SCADA, General understanding of different ICS/SCADA protocols, General understanding of ICS/SCADA security regulations & standards, Why do these technologies need to be defended?, General understanding of the ICS/SCADA threat landscape, General understanding of ICS/SCADA attack surfaces, General understanding of how to defend yourself, with technical examples, You will learn about the tools and techniques that can be used to better understand your environments., You will have the appropriate mindset for defending your ICS/SCADA environments., You will be inspired to implement your own defenses.


Reviews

  • D
    Daniel
    4.5

    Very good introductory course in ICS/SCADA. Instructor provides a clear layout, uses his experience, and numerous video/link examples to showcase concepts and technology.

  • A
    Anshuman Sharma
    4.5

    The course is a good introduction to ICS/SCADA. The author seems knowledgeable and tried covering as much as possible within the 4 hrs. Looking forward to the next detailed course.

  • S
    Sabyasachi Sarkar
    5.0

    It's a very insightful programme with practical segments. The author provides a quiet reassurance as he shows one the lay of the land. While it's a great introduction to the ICS/SCADA information security field, he is careful to emphasise the vastness of the field and provide a direction to budding defenders. Looking forward to more from Ed especially more hands-on programmes. Thanks for the course.

  • S
    Shyamsundar Das
    3.0

    This particular course on OT/ICS Security touches only some OT Attack surfaces and threats. I was excepting deep dive into more technical aspects of OT security like protocols(open source/vendor specific)weaknesses, analysis of the different pcaps, reverse engineering , firmware analysis/update mechanisms security tests. And as you said you come from smart grids back ground you could have shown a scenario of entire smart grid infrastructure and how it can be attacked and mitigated. That would provide end to end picture if cybe security landscape:)

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed