Cybersecurity For Operational Technology (OT) Professionals

Categories: OT Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Learning Objectives

By the end of this course you would be able to:

1. Describe the scope of Operational Technology (OT).
2. Identify examples of OT systems and devices.
3. Develop strategies to secure OT systems and devices.
4. Explain the performance, reliability, and safety requirements for OT.
5. Analyze the differences between OT and Information Technology (IT).

What Will You Learn?

  • Describe the scope of Operational Technology (OT).
  • Identify examples of OT systems and devices.
  • Develop strategies to secure OT systems and devices.
  • Explain the performance, reliability, and safety requirements for OT.
  • Analyze the differences between OT and Information Technology (IT).

Course Content

Industrial Control System Basics
By the end of this module, you will be able to: • Identify the three measurements that dominate OT cybersecurity conversations. • Identify the critical infrastructure sectors. • List the difference between IT and OT cybersecurity challenges. • Identify the three classes of ICS • Recognize the importance of the Purdue Model. • List the cybersecurity risk factors. • Recognize the key terms and definitions in the Industrial Cyber Security field.

  • Industrial Control System Basics
    21:20

Industrial Cyberthreat Landscape
By the end of this module, you will be able to: • Identify the different types of threats, • List the common types of ICS cyber events • Memorize the timeline for major industrial cybersecurity events.

Industrial Framework
MODULE OBJECTIVES By the end of this module, you will be able to: • Recognize the importance of an industrial framework • List the various CIS controls • Recognize the importance of MITRE ATT&CK for ICS • Recognize the purpose of the NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY • Recognize the importance of the AMERICAN WATER WORKS ASSOCIATION • Recognize the purpose of the NERC CIP

Best Practices for ICS Decision Makers
By the end of this module, you will be able to: • Explain Defense in Depth • Explain foundational controls • List the five foundational controls • Identify different types of monitoring

Cybersecurity Action Plan
By the end of this module, you will be able to: • Discuss how to spread cybersecurity awareness • List the tips for gaining executive leadership support • List the ICS solutions for the foundational controls

Assessment

Student Ratings & Reviews

No Review Yet
No Review Yet
Follow by Email
LinkedIn
Share
WhatsApp
Reddit
Copy link