Master Ics/Ot Cybersecurity: Fundamental To Advanced-Part 2

Posted By: ELK1nG

Master Ics/Ot Cybersecurity: Fundamental To Advanced-Part 2
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.00 GB | Duration: 4h 48m

Master the Art of Cybersecurity: Empower Yourself with Linux, Cryptology, and Secure Network Design

What you'll learn

Basics to advanced of ICS /OT Cybersecurity

Handson practice on Linux

Handson practice on cryptography

Learning of Incident response

Contingency planing and continuity planning

Requirements

Basic Industrial Software Knowledge Windows Server, Workstation

Prior experience in ICS required otherwise will be tough but not impossible

Description

Welcome to the sequel course of previous part!!Get ready to dive deep into the fascinating realm of Linux, Cryptology, Secure Network Design, Cybersecurity Management, Incident Response, and Contingency and Continuity in this comprehensive Udemy course.? Linux: Unveil the power of Linux as you explore its family tree and delve into the intricate filesystem layout. Put your skills to the test with hands-on labs that will sharpen your expertise in Linux commands.If you don't have Linux machine ask me, I can give you access forĀ  that or create onĀ Azure.? Endpoint Security: Safeguarding your systems is paramount, and this course equips you with the knowledge to protect them. Learn about antivirus software, host-based firewalls, EDR (Endpoint Detection and Response), DLP (Data Loss Prevention), and application allowlisting.(To be added later)? Cryptology: Discover the secrets of encryption and digital security. Explore various cryptography methods, including symmetric and asymmetric key algorithms, hashing, and digital signatures. Unleash the power of Cyberchef tools and dive into firmware analysis with Binwalk.? Secure Network Design: Understand the functional differences in network design and explore use cases for effective network segmentation. Study reference architectures that will help you build robust and secure network infrastructures.? Cybersecurity Management: Learn the key components of a NIST Cybersecurity Program and explore the impact of cybersecurity on manufacturing systems. Dive into cybersecurity frameworks, standards, and policies that guide industry best practices.? Incident Response: Gain invaluable insights into incident response strategies. Compare NIST and SANS methodologies, and master the art of preparation, identification, containment, eradication, recovery, and learning from past incidents.? Contingency and Continuity: Explore different types of plans and discover how business continuity and contingency planning ensure the resilience of organizations. Perform a Business Impact Analysis (BIA) and learn about disaster recovery (DR) strategies.This course is designed to provide you with a comprehensive understanding of essential cybersecurity concepts and practical skills. You'll have the opportunity to test your knowledge through engaging lab exercises and thought-provoking questions. (To be added)Don't miss this chance to become a cybersecurity expert and join the league of professionals protecting digital ecosystems. Enroll now and embark on an exciting journey towards securing the future!

Overview

Section 1: Introduction

Lecture 1 Linux

Lecture 2 Filesystem

Lecture 3 Filesystem Lab

Lecture 4 Linux Commands Lab -1

Lecture 5 Linux User Commands Lab -2

Lecture 6 Linux Files Commands Lab-3

Lecture 7 Linux File Ownership Lab-4

Lecture 8 Linux Disk Lab -5

Section 2: Cryptography -Lab

Lecture 9 Cryptography

Lecture 10 Symmetric

Lecture 11 Asymmetric

Lecture 12 Hashing

Lecture 13 Digital Signature

Lecture 14 Cyberchef-1-Basic

Lecture 15 Cyberchef-2- Timestamp Conversion

Lecture 16 Cyberchef-3-Magic Receipe

Lecture 17 Cyberchef- 4-Password Based Key

Lecture 18 Binwalk Firmware Analysis

Lecture 19 Cyberland Usecase-OpenSSL

Lecture 20 Hashing Lab

Section 3: Network Architecture Design Considerations

Lecture 21 Functional Difference

Lecture 22 Latency and Hop Use Case

Lecture 23 Network Segmentation

Lecture 24 Reference Architecture-1

Lecture 25 Reference Architecture-2

Lecture 26 Reference Architecture-3

Section 4: OT Cybersecurity Management

Lecture 27 NIST Cybersecurity Program

Lecture 28 Industry Profiling

Lecture 29 Manufacturing Impact Levels

Lecture 30 Cybersecurity Framework

Section 5: OT Cybersecurity Incident Response

Lecture 31 IR Frameworks

Lecture 32 Preparation

Lecture 33 Identification

Lecture 34 Containment

Lecture 35 Eradication

Lecture 36 Recovery

Lecture 37 Lessons learned

Section 6: Contingency & Continuity Planning

Lecture 38 Types of Plan

Lecture 39 Business Continuity

Lecture 40 Contingency Planning Process

Lecture 41 Business Impact Analysis

Lecture 42 Disaster Recovery Plan

Control engineers, integrators, and architects who design or implement OT systems,System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems,Security consultants who perform security assessments and penetration testing of OT systems,Researchers and analysts who are trying to have hands-on experience,Engineers who need practical understanding of systems,Vendors that are developing products that will be deployed as part of an OT system