Master Ics/Ot Cybersecurity: Fundamental To Advanced-Part 2
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.00 GB | Duration: 4h 48m
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.00 GB | Duration: 4h 48m
Master the Art of Cybersecurity: Empower Yourself with Linux, Cryptology, and Secure Network Design
What you'll learn
Basics to advanced of ICS /OT Cybersecurity
Handson practice on Linux
Handson practice on cryptography
Learning of Incident response
Contingency planing and continuity planning
Requirements
Basic Industrial Software Knowledge Windows Server, Workstation
Prior experience in ICS required otherwise will be tough but not impossible
Description
Welcome to the sequel course of previous part!!Get ready to dive deep into the fascinating realm of Linux, Cryptology, Secure Network Design, Cybersecurity Management, Incident Response, and Contingency and Continuity in this comprehensive Udemy course.? Linux: Unveil the power of Linux as you explore its family tree and delve into the intricate filesystem layout. Put your skills to the test with hands-on labs that will sharpen your expertise in Linux commands.If you don't have Linux machine ask me, I can give you access forĀ that or create onĀ Azure.? Endpoint Security: Safeguarding your systems is paramount, and this course equips you with the knowledge to protect them. Learn about antivirus software, host-based firewalls, EDR (Endpoint Detection and Response), DLP (Data Loss Prevention), and application allowlisting.(To be added later)? Cryptology: Discover the secrets of encryption and digital security. Explore various cryptography methods, including symmetric and asymmetric key algorithms, hashing, and digital signatures. Unleash the power of Cyberchef tools and dive into firmware analysis with Binwalk.? Secure Network Design: Understand the functional differences in network design and explore use cases for effective network segmentation. Study reference architectures that will help you build robust and secure network infrastructures.? Cybersecurity Management: Learn the key components of a NIST Cybersecurity Program and explore the impact of cybersecurity on manufacturing systems. Dive into cybersecurity frameworks, standards, and policies that guide industry best practices.? Incident Response: Gain invaluable insights into incident response strategies. Compare NIST and SANS methodologies, and master the art of preparation, identification, containment, eradication, recovery, and learning from past incidents.? Contingency and Continuity: Explore different types of plans and discover how business continuity and contingency planning ensure the resilience of organizations. Perform a Business Impact Analysis (BIA) and learn about disaster recovery (DR) strategies.This course is designed to provide you with a comprehensive understanding of essential cybersecurity concepts and practical skills. You'll have the opportunity to test your knowledge through engaging lab exercises and thought-provoking questions. (To be added)Don't miss this chance to become a cybersecurity expert and join the league of professionals protecting digital ecosystems. Enroll now and embark on an exciting journey towards securing the future!
Overview
Section 1: Introduction
Lecture 1 Linux
Lecture 2 Filesystem
Lecture 3 Filesystem Lab
Lecture 4 Linux Commands Lab -1
Lecture 5 Linux User Commands Lab -2
Lecture 6 Linux Files Commands Lab-3
Lecture 7 Linux File Ownership Lab-4
Lecture 8 Linux Disk Lab -5
Section 2: Cryptography -Lab
Lecture 9 Cryptography
Lecture 10 Symmetric
Lecture 11 Asymmetric
Lecture 12 Hashing
Lecture 13 Digital Signature
Lecture 14 Cyberchef-1-Basic
Lecture 15 Cyberchef-2- Timestamp Conversion
Lecture 16 Cyberchef-3-Magic Receipe
Lecture 17 Cyberchef- 4-Password Based Key
Lecture 18 Binwalk Firmware Analysis
Lecture 19 Cyberland Usecase-OpenSSL
Lecture 20 Hashing Lab
Section 3: Network Architecture Design Considerations
Lecture 21 Functional Difference
Lecture 22 Latency and Hop Use Case
Lecture 23 Network Segmentation
Lecture 24 Reference Architecture-1
Lecture 25 Reference Architecture-2
Lecture 26 Reference Architecture-3
Section 4: OT Cybersecurity Management
Lecture 27 NIST Cybersecurity Program
Lecture 28 Industry Profiling
Lecture 29 Manufacturing Impact Levels
Lecture 30 Cybersecurity Framework
Section 5: OT Cybersecurity Incident Response
Lecture 31 IR Frameworks
Lecture 32 Preparation
Lecture 33 Identification
Lecture 34 Containment
Lecture 35 Eradication
Lecture 36 Recovery
Lecture 37 Lessons learned
Section 6: Contingency & Continuity Planning
Lecture 38 Types of Plan
Lecture 39 Business Continuity
Lecture 40 Contingency Planning Process
Lecture 41 Business Impact Analysis
Lecture 42 Disaster Recovery Plan
Control engineers, integrators, and architects who design or implement OT systems,System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems,Security consultants who perform security assessments and penetration testing of OT systems,Researchers and analysts who are trying to have hands-on experience,Engineers who need practical understanding of systems,Vendors that are developing products that will be deployed as part of an OT system