ICS/SCADA/OT Protocol Traffic Analysis: IEC 60870-5-104
Published 7/2023
Duration: 47m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 461 MB
Genre: eLearning | Language: English
Published 7/2023
Duration: 47m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 461 MB
Genre: eLearning | Language: English
ICS/SCADA/OT Protocol Network Traffic Analysis Series: IEC 60870-5-104
What you'll learn
Gain an understanding of the IEC 60870-5-104 Protocol. Learn about the background of this protocol, and how it's used in Electric Power Grid Operations & SCADA.
Learn about the cyber threats to IEC 60870-5-104. Learn about real world events and malware that specifically targets IEC 60870-5-104 protocol.
Use Wireshark to analyze network packet capture files containing IEC 60870-5-104 communications.
How to use Snort Intrusion Detection and Security Onion Virtual Machine to test IEC 60870-5-104 Snort signatures.
How to create a custom IEC 60870-5-104 Snort signature.
How to analyze IEC 60870-5-104 Protocol Network Traffic.
Requirements
A strong hunger to learn and improve your network traffic analysis and Cybersecurity skills.
Basic network traffic analysis skills, but not essential.
Basic Snort Intrusion Detection skills, but not essential.
Basic Security Onion Virtual Machine skills, but not essential.
Basic Linux Operating System skills, but not essential.
Basic understanding of ICS/SCADA or OT environments, but not essential.
A strong hunger to enhance your Critical Infrastructure Cybersecurity, monitoring, and defense skills.
Description
This course is one of a series of courses that are geared towards anyone who would like to learn more about ICS/SCADA/OT Protocols and ICS/SCADA/OT Cybersecurity. If you have a hunger to learn more about these protocols, and how to better monitor them, then this course is for you!
Specifically the course covers the background/history of the protocol, the threats related to the protocol, how to use Wireshark to analyze the protocol network traffic, it provides many resources to analyze and secure this protocol, and it also covers how to create Snort Intrusion Detection rules to detect and alert on specific ICS/SCADA/OT protocol network traffic. Monitoring ICS/SCADA/OT protocols can be very beneficial from a safety and a cybersecurity perspective because it will provide a better overall situational awareness of how this protocol is being used within your industrial environments. As an Industrial Process owner and operator, it is imperative to maintain situational awareness of your environment. It will also enable you to create a protocol network traffic baseline which can allow you to identify protocol network traffic anomalies over time. Overall this will help you understand more about the ICS/SCADA/OT protocol, and how to better monitor it from a safety and Cybersecurity perspective.
Who this course is for:
This course is for someone who has a strong hunger to learn and improve their network traffic analysis and Cybersecurity skills.
This course is for someone who has a strong hunger to enhance their Critical Infrastructure Cybersecurity, monitoring, and defense skills.
This course is for someone who wants to learn more about the field of ICS/SCADA Cybersecurity and OT Cybersecurity.
This course is for someone who wants to learn about the threats to ICS/SCADA and OT environments.
More Info