OT/ICS SECURITY FOUNDATION COURSE - PowerPoint PPT Presentation

About This Presentation
Title:

OT/ICS SECURITY FOUNDATION COURSE

Description:

Hardware and software systems that communicate with the physical world are collectively referred to as operational technology (OT). With a desire to integrate IT skills into physical systems that either replace or enhance the current physical control components, it has developed steadily through time. – PowerPoint PPT presentation

Number of Views:22
Slides: 8
Provided by: infosectrain02
Tags:

less

Transcript and Presenter's Notes

Title: OT/ICS SECURITY FOUNDATION COURSE


1
EARLY BIRD OFFER INR 14,999 TAXES INR 24,999
USD 249 USD 499
OT/ICS
Security Foundation Training 20 hrs of
instructor-led training Blended learning delivery
model Comprehensive introduction to OT/ICS
security for IT and OT professionals
TC Apply
REGISTER NOW
SPEAKER
Manjunath 14 Years Of Experience ANSI/IEC
62443 Cyber Security Expert
_at_infosectrain
2
OT/ICS Security Foundation
Course Benefits
150000 104436
135200
90623
97000
96351
75221
90090
OT/ICS Security Analyst
OT/ICS Security Consultant
OT/ICS Cyber Security Architect
Incident Response Specialist
Compliance and Risk Management Specialist
OT/ICS Security Engineer
OT/ICS Project Manager
OT/ICS Security Sales Engineer
HIRING COMPANIES
3
Course ADVISOR Manjunath
14 years of experience as an Industrial
Automation and Control System specialist in
designing delivering Secure Industrial Control
Systems. Manjunath holds in-depth expertise on
Risk assessment, vulnerability assessment and
upgrading existing plants to security enhanced
systems. Well versed with NIST, NERC-CIP, and ABS
Marine Cyber Safety Standards, he has gained
extensive knowledge and experience in Process
Control Network Design, Network Segmentation,
Network Monitoring Systems, Nozomi IDS solution,
Identity and Access Management, Firewall
configurations, Patch Management and STIG
Management.
4
Course CONTENT
  • Introduction to OT/ICS Security
  • Overview of OT and ICS
  • Importance of OT/ICS Security
  • Differences between IT and OT Security
  • Understanding OT/ICS Components and Architecture
  • Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA,
    HMI, Engineering Workstation etc.,)
  • ICS Network Architecture and Protocols
  • ICS Network Segmentation and Zoning

5
Threat Landscape and Vulnerabilities
  • Common OT/ICS Threats and Attack Vectors
  • Vulnerabilities in OT/ICS Systems
  • Notable Incidents and Case Studies
  • Risk Assessment and Management
  • Risk Assessment Methodologies for OT/ICS
  • Mitigation Strategies and Risk Treatment
  • Monitoring and Incident Response Planning

6
OT/ICS Security Best Practices and Standards
  • Overview of OT/ICS Security Standards (NIST
    800-82, IEC62443, NERC CIP, Sector Specific
    standards)
  • Security Policies, Procedures, and Controls.
  • Physical and Environmental Security
    Considerations.
  • Overview of Tools and Technologies for OT/ICS
    Security
  • Network Traffic Analysis Tools (e.g., Wireshark)
  • Network Monitoring and Anomaly Detection
    Solutions (e.g., Suricata, Snort)
  • Firewall and Security Solutions for OT/ICS
    Environments

7
BECOME AN EXPERT IN
OT/ICS
Security Foundation Training ENROLL
NOW www.infosectrain.com I sales_at_infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com