Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Master Ics/Ot Cybersecurity: Fundamental To Advanced-Part 2

    Posted By: ELK1nG
    Master Ics/Ot Cybersecurity: Fundamental To Advanced-Part 2

    Master Ics/Ot Cybersecurity: Fundamental To Advanced-Part 2
    Published 5/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.00 GB | Duration: 4h 48m

    Master the Art of Cybersecurity: Empower Yourself with Linux, Cryptology, and Secure Network Design

    What you'll learn

    Basics to advanced of ICS /OT Cybersecurity

    Handson practice on Linux

    Handson practice on cryptography

    Learning of Incident response

    Contingency planing and continuity planning

    Requirements

    Basic Industrial Software Knowledge Windows Server, Workstation

    Prior experience in ICS required otherwise will be tough but not impossible

    Description

    Welcome to the sequel course of previous part!!Get ready to dive deep into the fascinating realm of Linux, Cryptology, Secure Network Design, Cybersecurity Management, Incident Response, and Contingency and Continuity in this comprehensive Udemy course.? Linux: Unveil the power of Linux as you explore its family tree and delve into the intricate filesystem layout. Put your skills to the test with hands-on labs that will sharpen your expertise in Linux commands.If you don't have Linux machine ask me, I can give you access for  that or create on Azure.? Endpoint Security: Safeguarding your systems is paramount, and this course equips you with the knowledge to protect them. Learn about antivirus software, host-based firewalls, EDR (Endpoint Detection and Response), DLP (Data Loss Prevention), and application allowlisting.(To be added later)? Cryptology: Discover the secrets of encryption and digital security. Explore various cryptography methods, including symmetric and asymmetric key algorithms, hashing, and digital signatures. Unleash the power of Cyberchef tools and dive into firmware analysis with Binwalk.? Secure Network Design: Understand the functional differences in network design and explore use cases for effective network segmentation. Study reference architectures that will help you build robust and secure network infrastructures.? Cybersecurity Management: Learn the key components of a NIST Cybersecurity Program and explore the impact of cybersecurity on manufacturing systems. Dive into cybersecurity frameworks, standards, and policies that guide industry best practices.? Incident Response: Gain invaluable insights into incident response strategies. Compare NIST and SANS methodologies, and master the art of preparation, identification, containment, eradication, recovery, and learning from past incidents.? Contingency and Continuity: Explore different types of plans and discover how business continuity and contingency planning ensure the resilience of organizations. Perform a Business Impact Analysis (BIA) and learn about disaster recovery (DR) strategies.This course is designed to provide you with a comprehensive understanding of essential cybersecurity concepts and practical skills. You'll have the opportunity to test your knowledge through engaging lab exercises and thought-provoking questions. (To be added)Don't miss this chance to become a cybersecurity expert and join the league of professionals protecting digital ecosystems. Enroll now and embark on an exciting journey towards securing the future!

    Overview

    Section 1: Introduction

    Lecture 1 Linux

    Lecture 2 Filesystem

    Lecture 3 Filesystem Lab

    Lecture 4 Linux Commands Lab -1

    Lecture 5 Linux User Commands Lab -2

    Lecture 6 Linux Files Commands Lab-3

    Lecture 7 Linux File Ownership Lab-4

    Lecture 8 Linux Disk Lab -5

    Section 2: Cryptography -Lab

    Lecture 9 Cryptography

    Lecture 10 Symmetric

    Lecture 11 Asymmetric

    Lecture 12 Hashing

    Lecture 13 Digital Signature

    Lecture 14 Cyberchef-1-Basic

    Lecture 15 Cyberchef-2- Timestamp Conversion

    Lecture 16 Cyberchef-3-Magic Receipe

    Lecture 17 Cyberchef- 4-Password Based Key

    Lecture 18 Binwalk Firmware Analysis

    Lecture 19 Cyberland Usecase-OpenSSL

    Lecture 20 Hashing Lab

    Section 3: Network Architecture Design Considerations

    Lecture 21 Functional Difference

    Lecture 22 Latency and Hop Use Case

    Lecture 23 Network Segmentation

    Lecture 24 Reference Architecture-1

    Lecture 25 Reference Architecture-2

    Lecture 26 Reference Architecture-3

    Section 4: OT Cybersecurity Management

    Lecture 27 NIST Cybersecurity Program

    Lecture 28 Industry Profiling

    Lecture 29 Manufacturing Impact Levels

    Lecture 30 Cybersecurity Framework

    Section 5: OT Cybersecurity Incident Response

    Lecture 31 IR Frameworks

    Lecture 32 Preparation

    Lecture 33 Identification

    Lecture 34 Containment

    Lecture 35 Eradication

    Lecture 36 Recovery

    Lecture 37 Lessons learned

    Section 6: Contingency & Continuity Planning

    Lecture 38 Types of Plan

    Lecture 39 Business Continuity

    Lecture 40 Contingency Planning Process

    Lecture 41 Business Impact Analysis

    Lecture 42 Disaster Recovery Plan

    Control engineers, integrators, and architects who design or implement OT systems,System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems,Security consultants who perform security assessments and penetration testing of OT systems,Researchers and analysts who are trying to have hands-on experience,Engineers who need practical understanding of systems,Vendors that are developing products that will be deployed as part of an OT system