Hardware and software systems that communicate with the physical world are collectively referred to as operational technology (OT). With a desire to integrate IT skills into physical systems that either replace or enhance the current physical control components, it has developed steadily through time.
https://www.infosectrain.com/courses/ot-security-fundamental-training/
1. REGISTER NOW
20 hrs of instructor-led training
Blended learning delivery model
Comprehensive introduction to OT/ICS
security for IT and OT professionals
*TC Apply
SPEAKER
Manjunath
14+ Years Of Experience
ANSI/IEC 62443
Cyber Security Expert @infosectrain
USD 249
EARLY BIRD OFFER
INR 14,999 TAXES
+
INR 24,999
USD 499
OT/ICS
Security Foundation
Training *TC Apply
3. Course ADVISOR
Manjunath
14+ years of experience as an Industrial Automation and
Control System specialist in designing delivering Secure
Industrial Control Systems.
Manjunath holds in-depth expertise on Risk assessment,
vulnerability assessment and upgrading existing plants to
security enhanced systems. Well versed with NIST,
NERC-CIP, and ABS Marine Cyber Safety Standards, he has
gained extensive knowledge and experience in
Process Control Network Design, Network Segmentation,
Network Monitoring Systems, Nozomi IDS solution, Identity
and Access Management, Firewall configurations, Patch
Management and STIG Management.
@infosectrain
4. Course CONTENT
Introduction to OT/ICS Security
โข Overview of OT and ICS
โข Importance of OT/ICS Security
โข Differences between IT and OT Security
@infosectrain
Understanding OT/ICS Components
and Architecture
โข Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI,
Engineering Workstation etc.,)
โข ICS Network Architecture and Protocols
โข ICS Network Segmentation and Zoning
5. Threat Landscape and Vulnerabilities
โข Common OT/ICS Threats and Attack Vectors
โข Vulnerabilities in OT/ICS Systems
โข Notable Incidents and Case Studies
Risk Assessment and Management
โข Risk Assessment Methodologies for OT/ICS
โข Mitigation Strategies and Risk Treatment
โข Monitoring and Incident Response Planning
@infosectrain
6. OT/ICS Security Best Practices and Standards
โข Overview of OT/ICS Security Standards (NIST 800-82, IEC62443,
NERC CIP, Sector Specific standards)
โข Security Policies, Procedures, and Controls.
โข Physical and Environmental Security Considerations.
Overview of Tools and Technologies for
OT/ICS Security
โข Network Traffic Analysis Tools (e.g., Wireshark)
โข Network Monitoring and Anomaly Detection Solutions
(e.g., Suricata, Snort)
โข Firewall and Security Solutions for OT/ICS Environments
@infosectrain