Fundamentals of OT Cybersecurity ICSSCADA
What you’ll learn
Introduction to operational technology Cybersecurity
Operational Technology terminology
Distributed Control System (DCS)
Supervisory Control And Data Acquisition (SCADA)
Industrial Control Systems (ICS)
IT / OT Gap and Convergence
Operational Technology Logical design and components
Operational Technology Network Protocols
Modbus Analysis
Modbus Packet Analysis – LAB
Simple Virtual PLC – HMI – LAB
Operational Technology Cybersecurity Controls
Requirements
Knowledge in IT Cybersecurity is required.
Description
After being in the field of Cybersecurity for many years, and a few years back I had to work on Operational Technology Cybersecurity. At that time I couldn’t find good resources to understand Operational Technology very well, Most of the time I found articles, videos, or outdated books! and they were misleading sometimes and confusing other times. And found some very expensive training that I couldn’t really afford at the time, however, out of studying, reading, hands on, and working as a Cybersecurity expert in the field of Operational Technology in the following years I found it’s really a good idea to make it easier for those who are going through the same path I had to go through, so I put this training together for you.This training is about Operational Technology Fundamentals, it will give you the key to understand the different systems within OT and get you ready to leverage your IT Cybersecurity knowledge in the world of OT.I Will begin by explaining the basic operations, then I will discuss and explain Distributed Control Systems, following to that will cover the subject of SCADA.Will continue to discuss the other OT terminology and differences with IT along with explaining the OT Network and Purdue Reference Model.At this point, you will have a good understanding of OT systems components and logical designs.Then will move into advanced subjects of OT protocols and communications, and will have deep technical dive into industrial protocol followed by several labs, and finally, in the last section, I will explain the OT Cybersecurity Controls and solutions.This course will be regularly updated, and presented with more bonus and gifts videos and some interesting and advanced subjects around OT Cybersecurity.
Overview
Section 1: Introduction to OT Components
Lecture 1 Introduction
Lecture 2 Welcome Message!
Lecture 3 Use case 1 – Water tank storage
Lecture 4 Explaining the use case components
Lecture 5 Explaining the use case requirements
Lecture 6 What can be automated?
Lecture 7 Active / Passive Components
Lecture 8 Larger Scale
Lecture 9 Connection of Active components
Lecture 10 Data representation and conversion
Lecture 11 Data conversion with example
Lecture 12 Input / Output
Lecture 13 Field Devices types
Lecture 14 Note to avoid confusion
Lecture 15 The Control Logic
Lecture 16 The Control Logic actions
Lecture 17 Control Logic Cycle
Lecture 18 Operation and Safety Considerations
Lecture 19 Monitoring & Writing values
Lecture 20 Maintenance
Lecture 21 Maintenance – Answer to previous question
Lecture 22 Safety Instrumented System (SIS)
Lecture 23 SIS implementation
Lecture 24 Data Historian
Lecture 25 Quick Summary
Section 2: Introduction to Distributed Control System (DCS)
Lecture 26 Introduction to Section 2
Lecture 27 Use Case – Product Manufacturer
Lecture 28 Production Phases
Lecture 29 Discrete vs Process Manufacturing
Lecture 30 Answer to question
Lecture 31 Answer to question
Lecture 32 Intro to DCS
Lecture 33 Plant / Control
Lecture 34 Distributed Control Systems
Lecture 35 DCS Controllers
Lecture 36 DCS Controller Programming Languages
Lecture 37 DCS Summary
Lecture 38 Operator station (HMI)
Lecture 39 DCS Layout – Eng WS
Lecture 40 Quick Summary
Section 3: Supervisory Control And Data Acquisition (SCADA)
Lecture 41 Introduction to section 3
Lecture 42 What is SCADA?
Lecture 43 SCADA main components
Lecture 44 SCADA Server (MTU)
Lecture 45 Programmable Logic Controller (PLC)
Lecture 46 Remote Terminal Unit (RTU)
Lecture 47 Programmable Automation Controller (PAC)
Lecture 48 Intelligent Electronic Device (IED)
Lecture 49 SCADA Alarms
Lecture 50 SCADA Connections
Lecture 51 Quick Summary
Section 4: Operational Technology vs Information Technology
Lecture 52 Introduction
Lecture 53 OT Terminology
Lecture 54 Terms under Operational Technology
Lecture 55 IT / OT GAP
Lecture 56 IT Network design
Lecture 57 OT – Level 0
Lecture 58 OT – Level 1
Lecture 59 OT – Level 2
Lecture 60 OT – Level 3
Lecture 61 OT – Level 4
Lecture 62 OT – Level 5
Lecture 63 Purdue Reference Model
Lecture 64 IT Within OT (part 1)
Lecture 65 IT within OT (part 2)
Lecture 66 Question?
Lecture 67 IT vs OT Cybersecurity (quick comparison)
Lecture 68 Air-gapped OT networks
Lecture 69 IT vs OT (part 1)
Lecture 70 IT vs OT (part 2)
Lecture 71 IT vs OT (part 3)
Lecture 72 Quick Summary
Section 5: OT Communication and Protocols
Lecture 73 Introduction
Lecture 74 Recap on Sensors and Signals
Lecture 75 Read Value
Lecture 76 Write Value
Lecture 77 Operational Technology Protocols by Industry
Lecture 78 Introduction to Modbus
Lecture 79 Modbus Communication types
Lecture 80 Modbus TCP Type
Lecture 81 PLC Memory Addresses
Lecture 82 PLC Memory Address types and values
Lecture 83 Modbus Request Format
Lecture 84 Modbus RTU and RTU over TCP Format
Lecture 85 Modbus TCP vs RTU
Lecture 86 Modbus TCP Segment
Lecture 87 Modbus Application Protocol Header
Lecture 88 Modbus Protocol Data Unit (PDU)
Lecture 89 Modbus TCP Request
Lecture 90 Decoding Modbus TCP Request
Lecture 91 Modbus Function Codes
Lecture 92 How to read the RFC (Modbus)
Lecture 93 LAB1: Modbus Simulator
Lecture 94 LAB2: Wireshark Analysis of Modbus (part 1)
Lecture 95 LAB2: Wireshark Analysis of Modbus (part 2)
Lecture 96 LAB3: Connect HMI to Modbus simulator
Lecture 97 Quick Summary
Section 6: Operational Technology Cybersecurity Controls
Lecture 98 Introduction
Lecture 99 Why you need to understand OT?
Lecture 100 Network Assists Discovery
Lecture 101 Network Discovery (Agentless)
Lecture 102 Network Discovery (Visual)
Lecture 103 Endpoint Security
Lecture 104 Identity and Access Management (IAM)
Lecture 105 Intrusion Detection
Lecture 106 NGFW and Intrusion Prevention
Lecture 107 Network Access Control
Lecture 108 Secure Remote Access
Lecture 109 OT is insecure by design
Lecture 110 OT Cybersecurity Compliance
Lecture 111 Quick Summary
This course is designed for IT Cybersecurity professionals who wants to understand the fundamentals of OT
Course Information:
Udemy | English | 4h 53m | 1.10 GB
Created by: Nebras ALQURASHI
You Can See More Courses in the IT & Software >> Greetings from CourseDown.com