Course Summary
This course will enhance your ability to gain visibility and identify assets within your Industrial Control System (ICS)/Operational Technology (OT) networks. The course covers how to monitor for and detect cyber threats, analyze ICS cyber attacks to extract valuable lessons, conduct incident response, and adopt an intelligence-driven approach to building a leading ICS cybersecurity program that ensures safe and reliable operations.
By the end of the course, students will be equipped to understand their networked ICS environment, monitor it for potential threats, respond to identified incidents, and leverage lessons learned from adversary interactions to strengthen network security.
Key Topics Covered:
Active Defense Concepts and Application, Detection, and Analysis in an ICS Environment
Discovery and Monitoring in an ICS Environment, ICS-Focused Digital Forensics, and ICS-Specific Incident Response
Malware Analysis Techniques, Threat Analysis in an ICS Environment, and Threat Intelligence Fundamentals
Active Defense in an ICS Environment
The candidate will demonstrate an understanding of how active defense strategies are applied within ICS environments, and how insights from well-known ICS attacks can inform modern defense practices.
Detection in an ICS Environment
The candidate will demonstrate proficiency in the tools and techniques used to analyze network security evidence in an ICS environment.
Incident Response in an ICS Environment
The candidate will demonstrate an understanding of digital forensics and incident response (DFIR), focusing on the unique challenges of performing these tasks within an ICS environment.
Monitoring in an ICS Environment
The candidate will demonstrate knowledge of network monitoring techniques specific to ICS protocols and environments.
Threat Hunting and Analysis in an ICS Environment
The candidate will demonstrate an understanding of threat hunting and analysis practices tailored to ICS environments.
Threat Intelligence in an ICS Environment
The candidate will demonstrate an understanding of threat intelligence concepts and how they apply to securing an ICS environment.
Visibility and Asset Awareness in an ICS Environment
The candidate will demonstrate knowledge of strategies for asset discovery and enhancing network visibility within an ICS environment.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT