Course Summary
This course will enhance your ability to gain visibility and identify assets within your Industrial Control System (ICS)/Operational Technology (OT) networks. The course covers how to monitor for and detect cyber threats, analyze ICS cyber attacks to extract valuable lessons, conduct incident response, and adopt an intelligence-driven approach to building a leading ICS cybersecurity program that ensures safe and reliable operations.
By the end of the course, students will be equipped to understand their networked ICS environment, monitor it for potential threats, respond to identified incidents, and leverage lessons learned from adversary interactions to strengthen network security.
Key Topics Covered:
Active Defense Concepts and Application, Detection, and Analysis in an ICS Environment
Discovery and Monitoring in an ICS Environment, ICS-Focused Digital Forensics, and ICS-Specific Incident Response
Malware Analysis Techniques, Threat Analysis in an ICS Environment, and Threat Intelligence Fundamentals
Active Defense in an ICS Environment
The candidate will demonstrate an understanding of active defense applied to ICS environments and how well-known ICS attacks provide insight today.
Detection in an ICS Environment
The candidate will demonstrate an understanding of the tools and techniques used to analyze network security evidence in an ICS environment
Incident Response in an ICS Environment
The candidate will demonstrate an understanding of digital forensics and incident response and the unique challenges to performing DFIR in an ICS environment.
Monitoring in an ICS Environment
The candidate will demonstrate an understanding of network related monitoring specific to ICS protocols and environments.
Threat Hunting and Analysis in an ICS Environment
The candidate will demonstrate an understanding of threat hunting and analysis in an ICS environment.
Threat Intelligence in an ICS Environment
The candidate will demonstrate an understanding of threat intelligence concepts and their application to an ICS environment.
Visibility and Asset Awareness in an ICS Environment
The candidate will demonstrate an understanding of strategies for asset discovery and network visibility in an ICS environment.
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM