Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Industrial Ics/Ot Cybersecurity A To Z As Per Nist 800-82

    Posted By: ELK1nG
    Industrial Ics/Ot Cybersecurity A To Z As Per Nist 800-82

    Industrial Ics/Ot Cybersecurity A To Z As Per Nist 800-82
    Published 7/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 4.71 GB | Duration: 6h 4m

    Best ICS/OT Cyber Security course on this platform! Gain a strong foundation in Cyber Security based on NIST guidelines.

    What you'll learn
    About NIST 800-82
    NIST 800-82 complete explanation
    OT security risk management .
    Guidance on applying the Cybersecurity Framework to OT systems
    Applying the Risk Management Framework to OT systems
    Defense in Depth Architecture
    OT Security capabilities and tools
    Development and deployment of an OT cybersecurity program
    Requirements
    Basic Industrial Software Knowledge Like DCS/SCADA/PLC/RTU etc
    No programming knowledge required
    Basic understanding of ICS/OT environment
    No prior experience required
    Architecture awareness of OT systems
    Description
    Industrial cybersecurity based on the NIST guidelines. OT is critical to the operation of critical infrastructures, which are often highly interconnected, mutually dependent systems. It is important to note that while federal agencies operate many of the nation’s critical infrastructures, many others are privately owned and operated.This course is created after thoroughly understanding and practically implementing in the OT environment, so this 6-hour course is summarised version of the NIST 800-82 standard. It will help to understand what it contains and how it should be understood. So, following are the basic topics which we will cover in this course:1. OT Overview: DCS/PLC/PLC/BACS/PACS2. About Cybersecurity program development3. Risk Management for OT systems4. OT Cybersecurity Architecture5. Cybersecurity Framework6. OT Security capabilities and toolsAfter finishing this course, you will have following understanding:1. Good grasp of NIST 800-82 Standard2. What technologies are required for securing a OT infrastructure.3. What is cybersecurity framework4. What to do to achieve defense in depth architecture5. Why cybersecurity program is required and how to set up6. Feel confident about referring standards in professional discussions7. Will help in cracking interviewsThis course provides guidance for establishing secure operational technology (OT) while addressing OT’s unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical environment (or manage devices that interact with the physical environment). These systems and devices detect or cause a direct change through monitoring and/or control of devices, processes, and events.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: OT Overview

    Lecture 2 OT Based system and their interdependencies

    Lecture 3 SCADA Systems

    Lecture 4 Distributed Control Systems

    Lecture 5 Programmable Logic Controller Based Topologies

    Lecture 6 Building Automation Systems

    Lecture 7 Physical Access Control Systems

    Lecture 8 Safety Systems

    Lecture 9 Industrial Internet of Things

    Section 3: OT Cybersecurity Program Development

    Lecture 10 OT Cybersecurity Program

    Lecture 11 Establish Charter for OT Cybersecurity program

    Lecture 12 Benefits of OT Cybersecurity Program

    Lecture 13 OT Cybersecurity Program Content

    Section 4: Risk Management for OT Systems

    Lecture 14 Managing OT Security Risk

    Lecture 15 Framing OT Risk

    Lecture 16 Assessing Risk

    Lecture 17 Responding to Risk

    Lecture 18 Monitoring Risk

    Lecture 19 Applying Risk Management Framework

    Lecture 20 Prepare

    Lecture 21 Categorize

    Lecture 22 Select

    Lecture 23 Implement

    Lecture 24 Assess

    Lecture 25 Authorize

    Lecture 26 Monitor

    Section 5: OT Cybersecurity Architecture

    Lecture 27 Defense in Depth Architecture

    Lecture 28 Layer-1 Security Management

    Lecture 29 Layer-2 Physical Security

    Lecture 30 Layer-3 Network Security

    Lecture 31 Network Architecture

    Lecture 32 Centralized Logging

    Lecture 33 Network Monitoring

    Lecture 34 Zero trust architecture

    Lecture 35 Layer-4 Hardware Security

    Lecture 36 Layer-5 Software Security

    Lecture 37 Additional Considerations

    Lecture 38 Distributed Control System (DCS)-Based OT Systems

    Lecture 39 DCS/PLC-Based OT with IIoT

    Lecture 40 SCADA-Based OT Environments

    Section 6: Applying the Cybersecurity Framework to OT

    Lecture 41 Identify

    Lecture 42 Asset Management (ID.AM)

    Lecture 43 Governance (ID.GV)

    Lecture 44 Risk Assessment (ID.RA)

    Lecture 45 Risk Management strategy (ID.RM)

    Lecture 46 Supply Chain Risk Management (ID.SC)

    Lecture 47 Protect

    Lecture 48 Identity Management and Access Control (PR.AC)

    Lecture 49 Logical Access Controls (PR.AC)

    Lecture 50 Physical Access Controls (PR.AC-2)

    Lecture 51 Network Segmentation and Isolation (PR.AC-5)

    Lecture 52 User, Device, and Asset Authentication (PR.AC-7

    Lecture 53 Awareness and Training (PR.AT)

    Lecture 54 Data Security (PR.DS)

    Lecture 55 Information Protection Processes and Procedures (PR.IP)

    Lecture 56 Configuration Change Control (Configuration Management) (PR.IP-3)

    Lecture 57 Backups (PR.IP-4)

    Lecture 58 Physical Operating Environment (PR.IP-5)

    Lecture 59 Response and Recovery Plans (PR.IP-9) and Response and Recovery Plan Testing

    Lecture 60 Maintenance (PR.MA)

    Lecture 61 Protective Technology (PR.PT)

    Lecture 62 Detect

    Lecture 63 Anomalies and Events (DE.AE)

    Lecture 64 Security Continuous Monitoring (DE.CM)

    Lecture 65 Network Monitoring (DE.CM-1

    Lecture 66 System Use Monitoring (DE.CM-1 and DE-CM-3)

    Lecture 67 Malicious Code Detection (DE.CM-4)

    Lecture 68 Vulnerability Scanning (DE.CM-8)

    Lecture 69 Detection Process (DE.DP)

    Lecture 70 Respond

    Lecture 71 Response Planning (RS.RP)

    Lecture 72 Response Communications (RS.CO)

    Lecture 73 Response Analysis (RS.AN)

    Lecture 74 Response Mitigation (RS.MI)

    Lecture 75 Response Improvements (RS.IM)

    Lecture 76 Recover

    Lecture 77 Recovery Planning/Improvements/Communication

    Section 7: OT Security Capabilities and Tools

    Lecture 78 Segmentation-Firewall

    Lecture 79 Segmentation-Unidirectional Gateways

    Lecture 80 Segmentation-VLAN

    Lecture 81 Segmentation-Software Defined Networking

    Lecture 82 Network Monitoring/SIEM-BAD/DLP

    Lecture 83 Network Monitoring/SIEM-Deception & Digital Twin

    Lecture 84 Data Security- Immutable storage/Hashing

    Lecture 85 Data Security-Digital Signatures/Remote Access

    Section 8: Summary & Conclusion

    Lecture 86 What we learnt?

    Control engineers, integrators, and architects who design or implement OT systems,System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems,Security consultants who perform security assessments and penetration testing of OT systems,Managers who are responsible for OT systems,Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program,Researchers and analysts who are trying to understand the unique security needs of OT systems,Vendors that are developing products that will be deployed as part of an OT system