NIST SP 800-82 Rev-3

Categories: OT Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Learning Objectives:

  1. Describe the purpose of NIST SP 800-82 Rev-3 and its importance in industrial control systems and operational technology networks.
  2. Identify the five distinct areas of focus within the framework, including identification, protection, detection, response, and recovery, and explain their significance in cybersecurity.
  3. Discuss the topics covered by the framework, such as risk management, access control, network security, incident response, and disaster recovery.
  4. Explain how organizations can tailor their cybersecurity strategies to meet their specific needs and circumstances using the adaptable and flexible framework.
  5. Analyze the benefits of implementing the guidelines and best practices outlined in NIST SP 800-82 Rev-3, including improving cybersecurity posture, reducing the risk of successful cyber attacks, and complying with industry standards and regulations.
Show More

Course Content

Module-1 : NIST SP 800 82 Introduction:
MODULE OBJECTIVES By the end of this module, you will be able to: 1. Recognize the purpose and scope of NIST Special Publication 800-82. 2. Identify the audience suitable for reading NIST Special Publication 800-82. 3. List the NIST Special Publication 800-82's major sections.

  • NIST SP 800 82 Introduction:
    00:00

Module-2A : Overview of Operational Technology Part-1:
MODULE OBJECTIVES By the end of this module, you will be able to: 1. Classify different OT industrial sectors and their inter-dependencies. 2. Describe the operation of the ICS and its components.

Module-2B : Overview of Operational Technology Part-2:
Module-2B : Overview of Operational Technology Part-2:

Module-3A : OT Cybersec program development_Part1:
Module-3A : OT Cybersec program development_Part1:

Module-3B : OT Cybersec program development_Part 2:
Module-3B : OT Cybersec program development_Part 2:

Module-4A : Risk Management for OT Systems Part-1:
Module-4A : Risk Management for OT Systems Part-1:

Module-4B : Risk Management for OT Systems Part-2:
Module-4B : Risk Management for OT Systems Part-2:

Module-5A : OT Cybersecurity Architecture Part1
Module-5A : OT Cybersecurity Architecture Part1

Module-5B : OT Cybersecurity Architecture Part 2
Module-5B : OT Cybersecurity Architecture Part 2

Module-6A : Applying the Cybersecurity Framework to OT Part-1
Module-6A : Applying the Cybersecurity Framework to OT Part-1

Module-6B : Applying the Cybersecurity Framework to OT Part-2
Module-6B : Applying the Cybersecurity Framework to OT Part-2

Module-6C : Applying the Cybersecurity Framework to OT Part-3
Module-6C : Applying the Cybersecurity Framework to OT Part-3

Student Ratings & Reviews

No Review Yet
No Review Yet
Follow by Email
LinkedIn
Share
WhatsApp
Reddit
Copy link