Industrial Ics/Ot Cybersecurity A To Z As Per Nist 800-82

Posted By: ELK1nG

Industrial Ics/Ot Cybersecurity A To Z As Per Nist 800-82
Published 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.71 GB | Duration: 6h 4m

Best ICS/OT Cyber Security course on this platform! Gain a strong foundation in Cyber Security based on NIST guidelines.

What you'll learn
About NIST 800-82
NIST 800-82 complete explanation
OT security risk management .
Guidance on applying the Cybersecurity Framework to OT systems
Applying the Risk Management Framework to OT systems
Defense in Depth Architecture
OT Security capabilities and tools
Development and deployment of an OT cybersecurity program
Requirements
Basic Industrial Software Knowledge Like DCS/SCADA/PLC/RTU etc
No programming knowledge required
Basic understanding of ICS/OT environment
No prior experience required
Architecture awareness of OT systems
Description
Industrial cybersecurity based on the NIST guidelines. OT is critical to the operation of critical infrastructures, which are often highly interconnected, mutually dependent systems. It is important to note that while federal agencies operate many of the nation’s critical infrastructures, many others are privately owned and operated.This course is created after thoroughly understanding and practically implementing in the OT environment, so this 6-hour course is summarised version of the NIST 800-82 standard. It will help to understand what it contains and how it should be understood. So, following are the basic topics which we will cover in this course:1. OT Overview: DCS/PLC/PLC/BACS/PACS2. About Cybersecurity program development3. Risk Management for OT systems4. OT Cybersecurity Architecture5. Cybersecurity Framework6. OT Security capabilities and toolsAfter finishing this course, you will have following understanding:1. Good grasp of NIST 800-82 Standard2. What technologies are required for securing a OT infrastructure.3. What is cybersecurity framework4. What to do to achieve defense in depth architecture5. Why cybersecurity program is required and how to set up6. Feel confident about referring standards in professional discussions7. Will help in cracking interviewsThis course provides guidance for establishing secure operational technology (OT) while addressing OT’s unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical environment (or manage devices that interact with the physical environment). These systems and devices detect or cause a direct change through monitoring and/or control of devices, processes, and events.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: OT Overview

Lecture 2 OT Based system and their interdependencies

Lecture 3 SCADA Systems

Lecture 4 Distributed Control Systems

Lecture 5 Programmable Logic Controller Based Topologies

Lecture 6 Building Automation Systems

Lecture 7 Physical Access Control Systems

Lecture 8 Safety Systems

Lecture 9 Industrial Internet of Things

Section 3: OT Cybersecurity Program Development

Lecture 10 OT Cybersecurity Program

Lecture 11 Establish Charter for OT Cybersecurity program

Lecture 12 Benefits of OT Cybersecurity Program

Lecture 13 OT Cybersecurity Program Content

Section 4: Risk Management for OT Systems

Lecture 14 Managing OT Security Risk

Lecture 15 Framing OT Risk

Lecture 16 Assessing Risk

Lecture 17 Responding to Risk

Lecture 18 Monitoring Risk

Lecture 19 Applying Risk Management Framework

Lecture 20 Prepare

Lecture 21 Categorize

Lecture 22 Select

Lecture 23 Implement

Lecture 24 Assess

Lecture 25 Authorize

Lecture 26 Monitor

Section 5: OT Cybersecurity Architecture

Lecture 27 Defense in Depth Architecture

Lecture 28 Layer-1 Security Management

Lecture 29 Layer-2 Physical Security

Lecture 30 Layer-3 Network Security

Lecture 31 Network Architecture

Lecture 32 Centralized Logging

Lecture 33 Network Monitoring

Lecture 34 Zero trust architecture

Lecture 35 Layer-4 Hardware Security

Lecture 36 Layer-5 Software Security

Lecture 37 Additional Considerations

Lecture 38 Distributed Control System (DCS)-Based OT Systems

Lecture 39 DCS/PLC-Based OT with IIoT

Lecture 40 SCADA-Based OT Environments

Section 6: Applying the Cybersecurity Framework to OT

Lecture 41 Identify

Lecture 42 Asset Management (ID.AM)

Lecture 43 Governance (ID.GV)

Lecture 44 Risk Assessment (ID.RA)

Lecture 45 Risk Management strategy (ID.RM)

Lecture 46 Supply Chain Risk Management (ID.SC)

Lecture 47 Protect

Lecture 48 Identity Management and Access Control (PR.AC)

Lecture 49 Logical Access Controls (PR.AC)

Lecture 50 Physical Access Controls (PR.AC-2)

Lecture 51 Network Segmentation and Isolation (PR.AC-5)

Lecture 52 User, Device, and Asset Authentication (PR.AC-7

Lecture 53 Awareness and Training (PR.AT)

Lecture 54 Data Security (PR.DS)

Lecture 55 Information Protection Processes and Procedures (PR.IP)

Lecture 56 Configuration Change Control (Configuration Management) (PR.IP-3)

Lecture 57 Backups (PR.IP-4)

Lecture 58 Physical Operating Environment (PR.IP-5)

Lecture 59 Response and Recovery Plans (PR.IP-9) and Response and Recovery Plan Testing

Lecture 60 Maintenance (PR.MA)

Lecture 61 Protective Technology (PR.PT)

Lecture 62 Detect

Lecture 63 Anomalies and Events (DE.AE)

Lecture 64 Security Continuous Monitoring (DE.CM)

Lecture 65 Network Monitoring (DE.CM-1

Lecture 66 System Use Monitoring (DE.CM-1 and DE-CM-3)

Lecture 67 Malicious Code Detection (DE.CM-4)

Lecture 68 Vulnerability Scanning (DE.CM-8)

Lecture 69 Detection Process (DE.DP)

Lecture 70 Respond

Lecture 71 Response Planning (RS.RP)

Lecture 72 Response Communications (RS.CO)

Lecture 73 Response Analysis (RS.AN)

Lecture 74 Response Mitigation (RS.MI)

Lecture 75 Response Improvements (RS.IM)

Lecture 76 Recover

Lecture 77 Recovery Planning/Improvements/Communication

Section 7: OT Security Capabilities and Tools

Lecture 78 Segmentation-Firewall

Lecture 79 Segmentation-Unidirectional Gateways

Lecture 80 Segmentation-VLAN

Lecture 81 Segmentation-Software Defined Networking

Lecture 82 Network Monitoring/SIEM-BAD/DLP

Lecture 83 Network Monitoring/SIEM-Deception & Digital Twin

Lecture 84 Data Security- Immutable storage/Hashing

Lecture 85 Data Security-Digital Signatures/Remote Access

Section 8: Summary & Conclusion

Lecture 86 What we learnt?

Control engineers, integrators, and architects who design or implement OT systems,System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems,Security consultants who perform security assessments and penetration testing of OT systems,Managers who are responsible for OT systems,Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program,Researchers and analysts who are trying to understand the unique security needs of OT systems,Vendors that are developing products that will be deployed as part of an OT system