Hardware and software systems that communicate with the physical world are collectively referred to as operational technology (OT). With a desire to integrate IT skills into physical systems that either replace or enhance the current physical control components, it has developed steadily through time.
https://www.infosectrain.com/courses/ot-security-fundamental-training/
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
OT ICS SECURITY FOUNDATION COURSE.pdf
1. REGISTER NOW
20 hrs of instructor-led training
Blended learning delivery model
Comprehensive introduction to OT/ICS
security for IT and OT professionals
*TC Apply
SPEAKER
Manjunath
14+ Years Of Experience
ANSI/IEC 62443
Cyber Security Expert @infosectrain
USD 249
EARLY BIRD OFFER
INR 14,999 TAXES
+
INR 24,999
USD 499
OT/ICS
Security Foundation
Training *TC Apply
3. Course ADVISOR
Manjunath
14+ years of experience as an Industrial Automation and
Control System specialist in designing delivering Secure
Industrial Control Systems.
Manjunath holds in-depth expertise on Risk assessment,
vulnerability assessment and upgrading existing plants to
security enhanced systems. Well versed with NIST,
NERC-CIP, and ABS Marine Cyber Safety Standards, he has
gained extensive knowledge and experience in
Process Control Network Design, Network Segmentation,
Network Monitoring Systems, Nozomi IDS solution, Identity
and Access Management, Firewall configurations, Patch
Management and STIG Management.
@infosectrain
4. Course CONTENT
Introduction to OT/ICS Security
• Overview of OT and ICS
• Importance of OT/ICS Security
• Differences between IT and OT Security
@infosectrain
Understanding OT/ICS Components
and Architecture
• Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI,
Engineering Workstation etc.,)
• ICS Network Architecture and Protocols
• ICS Network Segmentation and Zoning
5. Threat Landscape and Vulnerabilities
• Common OT/ICS Threats and Attack Vectors
• Vulnerabilities in OT/ICS Systems
• Notable Incidents and Case Studies
Risk Assessment and Management
• Risk Assessment Methodologies for OT/ICS
• Mitigation Strategies and Risk Treatment
• Monitoring and Incident Response Planning
@infosectrain
6. OT/ICS Security Best Practices and Standards
• Overview of OT/ICS Security Standards (NIST 800-82, IEC62443,
NERC CIP, Sector Specific standards)
• Security Policies, Procedures, and Controls.
• Physical and Environmental Security Considerations.
Overview of Tools and Technologies for
OT/ICS Security
• Network Traffic Analysis Tools (e.g., Wireshark)
• Network Monitoring and Anomaly Detection Solutions
(e.g., Suricata, Snort)
• Firewall and Security Solutions for OT/ICS Environments
@infosectrain