SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
REGISTER NOW



20 hrs of instructor-led training
Blended learning delivery model
Comprehensive introduction to OT/ICS
security for IT and OT professionals
*TC Apply
SPEAKER
Manjunath
14+ Years Of Experience
ANSI/IEC 62443
Cyber Security Expert @infosectrain
USD 249
EARLY BIRD OFFER
INR 14,999 TAXES
+
INR 24,999
USD 499
OT/ICS
Security Foundation
Training *TC Apply
HIRING COMPANIES
OT/ICS Security Foundation
Course Benefits
@infosectrain
OT/ICS Security
Analyst
$104436
OT/ICS Security
Consultant
$75221
OT/ICS Cyber
Security
Architect
$135200
Incident
Response
Specialist
$90623
Compliance and
Risk Management
Specialist
$150000
OT/ICS
Security
Engineer
$97000
OT/ICS
Project Manager
$96351
OT/ICS
Security
Sales Engineer
$90090
Course ADVISOR
Manjunath
14+ years of experience as an Industrial Automation and
Control System specialist in designing  delivering Secure
Industrial Control Systems.
Manjunath holds in-depth expertise on Risk assessment,
vulnerability assessment and upgrading existing plants to
security enhanced systems. Well versed with NIST,
NERC-CIP, and ABS Marine Cyber Safety Standards, he has
gained extensive knowledge and experience in
Process Control Network Design, Network Segmentation,
Network Monitoring Systems, Nozomi IDS solution, Identity
and Access Management, Firewall configurations, Patch
Management and STIG Management.
@infosectrain
Course CONTENT
Introduction to OT/ICS Security
• Overview of OT and ICS
• Importance of OT/ICS Security
• Differences between IT and OT Security
@infosectrain
Understanding OT/ICS Components
and Architecture
• Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI,
Engineering Workstation etc.,)
• ICS Network Architecture and Protocols
• ICS Network Segmentation and Zoning
Threat Landscape and Vulnerabilities
• Common OT/ICS Threats and Attack Vectors
• Vulnerabilities in OT/ICS Systems
• Notable Incidents and Case Studies
Risk Assessment and Management
• Risk Assessment Methodologies for OT/ICS
• Mitigation Strategies and Risk Treatment
• Monitoring and Incident Response Planning
@infosectrain
OT/ICS Security Best Practices and Standards
• Overview of OT/ICS Security Standards (NIST 800-82, IEC62443,
NERC CIP, Sector Specific standards)
• Security Policies, Procedures, and Controls.
• Physical and Environmental Security Considerations.
Overview of Tools and Technologies for
OT/ICS Security
• Network Traffic Analysis Tools (e.g., Wireshark)
• Network Monitoring and Anomaly Detection Solutions
(e.g., Suricata, Snort)
• Firewall and Security Solutions for OT/ICS Environments
@infosectrain
www.infosectrain.com I sales@infosectrain.com
ENROLL NOW
OT/ICS
Security Foundation Training
BECOME AN EXPERT IN

Weitere ähnliche Inhalte

Ähnlich wie OT ICS SECURITY FOUNDATION COURSE.pdf

Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
Ishita Kundu
 
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
John Kingsley
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
Ishita Kundu
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
Adel Zayed
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
Living Online
 
ITS-110 Certified Internet of Things Security Practitioner(CIoTSP) By Certs ...
ITS-110 Certified Internet of Things Security Practitioner(CIoTSP)  By Certs ...ITS-110 Certified Internet of Things Security Practitioner(CIoTSP)  By Certs ...
ITS-110 Certified Internet of Things Security Practitioner(CIoTSP) By Certs ...
Certs Warrior
 
Thamer Haidar_CV.PDF
Thamer Haidar_CV.PDFThamer Haidar_CV.PDF
Thamer Haidar_CV.PDF
Thamer haidar
 

Ähnlich wie OT ICS SECURITY FOUNDATION COURSE.pdf (20)

Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
 
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdfGet yourself trained or Certified for IEC 62443 and other trainings.pdf
Get yourself trained or Certified for IEC 62443 and other trainings.pdf
 
Abrar Cv
Abrar CvAbrar Cv
Abrar Cv
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
S.manjunath profile
S.manjunath profile S.manjunath profile
S.manjunath profile
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
ITS-110 Certified Internet of Things Security Practitioner(CIoTSP) By Certs ...
ITS-110 Certified Internet of Things Security Practitioner(CIoTSP)  By Certs ...ITS-110 Certified Internet of Things Security Practitioner(CIoTSP)  By Certs ...
ITS-110 Certified Internet of Things Security Practitioner(CIoTSP) By Certs ...
 
DeJesusSres274
DeJesusSres274DeJesusSres274
DeJesusSres274
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
CCNA (Cisco Certified Network Associate)
CCNA (Cisco Certified Network Associate)CCNA (Cisco Certified Network Associate)
CCNA (Cisco Certified Network Associate)
 
Thamer Haidar_CV.PDF
Thamer Haidar_CV.PDFThamer Haidar_CV.PDF
Thamer Haidar_CV.PDF
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 
Ramzan resume
Ramzan resumeRamzan resume
Ramzan resume
 

Mehr von infosec train

Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
infosec train
 

Mehr von infosec train (20)

SOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrainSOC Specailist Training.pdf InfosecTrain
SOC Specailist Training.pdf InfosecTrain
 
CISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdf
CISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdfCISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdf
CISSP Domain 1: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭.pdf
 
CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdf
 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrain
 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrain
 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTrain
 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrain
 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdf
 
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdf
 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdf
 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
 
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfPCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
 
Types of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfTypes of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdf
 
CEH v12 Online Certification Training.pdf
CEH v12 Online Certification Training.pdfCEH v12 Online Certification Training.pdf
CEH v12 Online Certification Training.pdf
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

OT ICS SECURITY FOUNDATION COURSE.pdf

  • 1. REGISTER NOW 20 hrs of instructor-led training Blended learning delivery model Comprehensive introduction to OT/ICS security for IT and OT professionals *TC Apply SPEAKER Manjunath 14+ Years Of Experience ANSI/IEC 62443 Cyber Security Expert @infosectrain USD 249 EARLY BIRD OFFER INR 14,999 TAXES + INR 24,999 USD 499 OT/ICS Security Foundation Training *TC Apply
  • 2. HIRING COMPANIES OT/ICS Security Foundation Course Benefits @infosectrain OT/ICS Security Analyst $104436 OT/ICS Security Consultant $75221 OT/ICS Cyber Security Architect $135200 Incident Response Specialist $90623 Compliance and Risk Management Specialist $150000 OT/ICS Security Engineer $97000 OT/ICS Project Manager $96351 OT/ICS Security Sales Engineer $90090
  • 3. Course ADVISOR Manjunath 14+ years of experience as an Industrial Automation and Control System specialist in designing delivering Secure Industrial Control Systems. Manjunath holds in-depth expertise on Risk assessment, vulnerability assessment and upgrading existing plants to security enhanced systems. Well versed with NIST, NERC-CIP, and ABS Marine Cyber Safety Standards, he has gained extensive knowledge and experience in Process Control Network Design, Network Segmentation, Network Monitoring Systems, Nozomi IDS solution, Identity and Access Management, Firewall configurations, Patch Management and STIG Management. @infosectrain
  • 4. Course CONTENT Introduction to OT/ICS Security • Overview of OT and ICS • Importance of OT/ICS Security • Differences between IT and OT Security @infosectrain Understanding OT/ICS Components and Architecture • Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI, Engineering Workstation etc.,) • ICS Network Architecture and Protocols • ICS Network Segmentation and Zoning
  • 5. Threat Landscape and Vulnerabilities • Common OT/ICS Threats and Attack Vectors • Vulnerabilities in OT/ICS Systems • Notable Incidents and Case Studies Risk Assessment and Management • Risk Assessment Methodologies for OT/ICS • Mitigation Strategies and Risk Treatment • Monitoring and Incident Response Planning @infosectrain
  • 6. OT/ICS Security Best Practices and Standards • Overview of OT/ICS Security Standards (NIST 800-82, IEC62443, NERC CIP, Sector Specific standards) • Security Policies, Procedures, and Controls. • Physical and Environmental Security Considerations. Overview of Tools and Technologies for OT/ICS Security • Network Traffic Analysis Tools (e.g., Wireshark) • Network Monitoring and Anomaly Detection Solutions (e.g., Suricata, Snort) • Firewall and Security Solutions for OT/ICS Environments @infosectrain
  • 7. www.infosectrain.com I sales@infosectrain.com ENROLL NOW OT/ICS Security Foundation Training BECOME AN EXPERT IN