Aperçu du cours
According to Gartner, OT security is defined as « the set of practices and technologies used to (a) Protect people, resources, and information, (b) Monitor and/or control devices, processes, and events, and (c) Initiate change within enterprise OT systems. » OT security solutions span a wide range of security technologies, from next-generation firewalls to SIEM systems, and deploy different layers of protection.
Historically, OT-specific cybersecurity was not necessary, since OT systems were not connected to the Internet. Therefore, they were not exposed to external threats. As digital innovation initiatives progress, and IT and OT networks converge, companies have tended to deploy standalone tools to address specific issues. These approaches to OT security have resulted in a complex network that no longer shares information or provides the necessary visibility.
Often, IT and OT networks operate separately, resulting in a duplication of security efforts and a lack of transparency in operations. These IT/OT networks cannot track what is happening across the entire attack surface. Because of different referees in security organization of both platforms, this results in two separate security teams protecting their respective network perimeters.
When looking into OT, the biggest subset is ICS. ICS (Industrial Control System) is a broad term that embodies both SCADA and DCS.
Prérequis
- Basic understanding of IT systems (Linux/Windows)
- Basic networking knowledge
- Basic system administration
Fonctionnalités
- Understand ICS components
- Understand the different layers/levels
- Enhance threat handling
Public ciblé
- Cybersecurity expert
- OT expert in charge of the security
Détails
- 21 Sections
- 63 Lessons
- 5 Days
- Overview of ICS2
- Purdue Model6
- IT & ICS Differences1
- Secure Network Architectures for ICS1
- ICS Attack Surface4
- Level 0 and 15
- Ethernet and TCP/IP5
- Enforcement Zone Devices3
- Understanding Basic Cryptography2
- Level 2 and 34
- Wireless Technologies3
- Wireless Attacks and Defenses2
- Patching ICS Systems2
- Defending IT Systems4
- Endpoint Protection and SIEMS3
- Event Logging and Analysis2
- Internet connectivity2
- ICS Cybersecurity Programs3
- ICS Cybersecurity Policy3
- Measuring Cybersecurity Risk2
- Incident Response4