Uploaded on May 11, 2023
Hardware and software systems that communicate with the physical world are collectively referred to as operational technology (OT). With a desire to integrate IT skills into physical systems that either replace or enhance the current physical control components, it has developed steadily through time. https://www.infosectrain.com/courses/ot-security-fundamental-training/
OT ICS SECURITY FOUNDATION COURSE
EARLY BIRD OFFER INR 14,999+ TAXES INR 24,999 USD 249 OT/ICS USD 499 Security Foundation Training *T&C Apply 20 hrs of instructor-led training Blended learning delivery model Comprehensive introduction to OT/ICS security for IT and OT professionals REGISTER NOW SPEAKER Manjunath 14+ Years Of Experience ANSI/IEC 62443 Cyber Security Expert @infosectrain *T&C Apply OT/ICS Security Foundation Course Benefits $150000 $104436 $135200 $90623 $97000 $75221 $96351 $90090 OT/ICS Security OT/ICS Security OT/ICS Cyber Incident Compliance and OT/ICS OT/ICS OT/ICS Analyst Consultant Security Response Risk Management Security Project Manager Security Architect Specialist Specialist Engineer Sales Engineer HIRING COMPANIES @infosectrain Course ADVISOR Manjunath 14+ years of experience as an Industrial Automation and Control System specialist in designing & delivering Secure Industrial Control Systems. Manjunath holds in-depth expertise on Risk assessment, vulnerability assessment and upgrading existing plants to security enhanced systems. Well versed with NIST, NERC-CIP, and ABS Marine Cyber Safety Standards, he has gained extensive knowledge and experience in Process Control Network Design, Network Segmentation, Network Monitoring Systems, Nozomi IDS solution, Identity and Access Management, Firewall configurations, Patch Management and STIG Management. @infosectrain Course CONTENT Introduction to OT/ICS Security • Overview of OT and ICS • Importance of OT/ICS Security • Differences between IT and OT Security Understanding OT/ICS Components and Architecture • Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI, Engineering Workstation etc.,) • ICS Network Architecture and Protocols • ICS Network Segmentation and Zoning @infosectrain Threat Landscape and Vulnerabilities • Common OT/ICS Threats and Attack Vectors • Vulnerabilities in OT/ICS Systems • Notable Incidents and Case Studies Risk Assessment and Management • Risk Assessment Methodologies for OT/ICS • Mitigation Strategies and Risk Treatment • Monitoring and Incident Response Planning @infosectrain OT/ICS Security Best Practices and Standards • Overview of OT/ICS Security Standards (NIST 800-82, IEC62443, NERC CIP, Sector Specific standards) • Security Policies, Procedures, and Controls. • Physical and Environmental Security Considerations. Overview of Tools and Technologies for OT/ICS Security • Network Traffic Analysis Tools (e.g., Wireshark) • Network Monitoring and Anomaly Detection Solutions (e.g., Suricata, Snort) • Firewall and Security Solutions for OT/ICS Environments @infosectrain BECOME AN EXPERT IN OT/ICS Security Foundation Training ENROLL NOW www.infosectrain.com I [email protected]
Comments