Sale!

SCADA Security Pack of 4 Courses (Fundamentals, Analyst, CSSA)

Original price was: $45.00.Current price is: $14.00.

Price: 15.00 USD | Size: 7.55 GB |  Pack of 4 Courses | Duration : 24.33  Hours  |202 Video Lessons  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

 

Description

Price: 15.00 USD | Size: 7.55 GB |  Pack of 4 Courses | Duration : 24.33  Hours  |202 Video Lessons  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

 

What you will learn

This learning path teaches you how to defend the Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that manage our nation’s critical infrastructure. Fourteen courses build your SCADA security knowledge around the eight Certified SCADA Security Architect (CSSA) domains. You’ll learn about defending against common SCADA threats and vulnerabilities, conducting risk assessments, implementing remote access and physical controls, and more. Upon completion, you’ll be prepared to earn your CSSA certification and validate your SCADA security knowledge.

 

IACRB Certified SCADA Security Architect (CSSA)-New

001 – Introduction to CSSA
002 – Types of ICS (Industrial Control Systems)
003 – ICS Components
004 – BPCS and SIS
005 – Control System – Strengths and Weaknesses
006 – PCN (Process Control Network) Evolution
007 – RS-232 and RS-485
008 – ICS Protocols Modbus, DNP3, HART
009 – IT vs ICS
010 – Industrial Ethernet
011 – TASE 2.0ICCP
012 – CIP
013 – ProfiBusProfiNet
014 – Foundation Fieldbus
015 – BACnet
016 – Open vs Proprietary Protocols
017 – HMI Implementations
018 – OPC and OPC UA
019 – Data Historians
020 – Integration Software (ERPMES)
021 – Threats to SCADA
022 – Security Frameworks and Strategy
023 – Policies, Standards, Procedures and Guidelines
024 – Developing SCADA Security Policy
025 – SCADA Security Standards Bodies
026 – Risk Management Process
027 – SCADA Security Objectives
028 – Security Assessment Program
029 – SCADA Security Testing Methodology
030 – Vulnerability Assessment and Pentesting
031 – Information Gathering
032 – DNS and SNMP Recon
033 – Host and Port Scanning
034 – RF Signal Capture
035 – Sniffing Network Traffic
036 – Device Functionality Analysis
037 – Common SCADA Vulnerabilities
038 – Vulnerability Scanning
039 – Server OS Testing
040 – Authentication and Remote Access
041 – Attacking Standard Services
042 – Attacking Server OS
043 – Attacking ICS Protocols
044 – Attacking Wireless Communications
045 – Categorization of System Controls
046 – Physical Safety and Security
047 – Identification, Authentication and Authorization
048 – Remote Access Security
049 – Remote Access Technologies
050 – Remote Access Firewall Architectures
051 – Field Site Security
052 – Field Site Security – Firewalls
053 – Field Site Security – Encryption
054 – Secure Network Design
055 – Firewalls
056 – Logical Security Zones
057 – IDSIPS
058 – Introduction to Snort
059 – Log Monitoring and Management
060 – Security Architecture Lab
061 – Incident Response
062 – Anti-Malware
063 – Patch Management
064 – Application Whitelisting
065 – Active Directory and Group Policy
066 – SCADA Security Best Practices – Prevention
067 – SCADA Security Best Practices – Detection
068 – SCADA Security Best Practices – Correction
069 – CSSA Exam Overview

ICSSCADA Security Fundamentals

1. Introduction to SCADA Security
1. Types of ICS
2. ICS Components
3. BPCS SIS
4. Control System Strengths and Weaknesses
5. Introduction to SCADA Security

2. Access Control Fundamentals
1. Access Control Models
2. Access Control Implementation
3. Account Management Concepts
4. Credential Management and Enforcement
5. Access Control Fundamentals

3. Identification and AAA
1. Identification and AAA
2. Multifactor Authentication
3. Identity and Access Management
4. Identity and Access Services
5. Identification and AAA

4. Physical Security
1. Physical Security
2. Physical Security

5. Security Technologies and Tools
1. Firewalls
10. Security Technologies and Tools
2. VPN Concepts
3. IPsec
4. Intrusion Detection and Prevention
5. Network Devices
6. SIEM
7. DLP
8. NAC
9. Security Technologies

11. Remote Access (telnet vs. SSH) Lab Screenshots
11. Remote Access (telnet vs. SSH)
6. Introduction to Security Controls
1. Security Control Types
2. Data Destruction – Sanitization
3. Data Sensitivity
4. Introduction to Security Controls

7. Threats and Threat Actors
1. Sec+ Study Guide Glossary
2. Malware
3. Attack Types – Social Engineering
4. Attack Types – Application and Service Attacks
5. Attack Types – Wireless Attacks
6. Attack Types – Cryptographic Attacks
7. Threat Actors
8. Threats and Threat Actors

8. Resiliency and Automation
1. Resiliency and Automation
2. Resiliency and Automation

9. ICS Protocols
1. PCN Evolution
10. BACnet
11. Open vs Proprietary Protocols
12. ICS Protocols
2. RS-232 and RS-485
3. Modbus DNP3 HART
4. IT vs ICS
5. Industrial Ethernet
6. TASE 2.0 and ICCP
7. CIP
8. PROFIBUS and PROFINET
9. FOUNDATION Fieldbus

ICSSCADA Security Analyst – New

001 – Threat to SCADA
002 – Security Frameworks and Strategy
003 – Policies, Standards, Procedures and Guidelines
004 – Developing SCADA Security Policy
005 – SCADA Security Standards Bodies
006 – Risk Management Process
007 – SCADA Security Objectives
008 – Security Assessment Program
009 – SCADA Security Testing Methodology
010 – Vulnerability Assessment and Pentesting
011 – Information Gathering
012 – DNS and SNMP Recon
013 – Host and Port Scanning
014 – RF Signal Capture
015 – Sniffing Network Traffic
016 – Device Functionality Analysis
017 – Common SCADA Vulnerabilities
018 – Vulnerability Scanning
019 – Server OS Testing
020 – Authentication and Remote Access
021 – Attacking Standard Services
022 – Attacking Server OS
023 – Attacking ICS Protocols
024 – Attacking Wireless Communications
025 – Categorization of System Controls
026 – Physical Safety and Security
027 – Identification, Authentication and Authorization
028 – Access Control Models
029 – Remote Access Security
030 – Remote Access Technologies
031 – Remote Access Firewall Architectures
032 – Field Site Security
033 – Field Site Firewalls
034 – Encryption
035 – Secure Network Design
036 – Firewalls
037 – Logical Security Zones
038 – IDS & IPS
039 – Introduction to Snort
040 – Log Monitoring and Management
041 – Incident Response
042 – Anti-Malware
043 – Patch Management
044 – Application Whitelisting
045 – Active Directory and Group Policy

SCADA Security Architect CSSA

1. SCADA Security Frameworks
1. Threat to SCADA
2. Security Frameworks and Strategy
3. Policies Standards Procedures and Guidelines
4. Developing SCADA Security Policy
5. SCADA Security Standards Bodies

10. SCADA Preventative Controls
1. Anti-Malware
2. Patch Management
3. Application Whitelisting
4. Active Directory and Group Policy

2. SCADA Security Assessment
1. Risk Management Process
2. SCADA Security Objectives
3. Security Assessment Program
4. SCADA Security Testing Methodology
5. Vulnerability Assessment and Pentesting

3. SCADA Device Identification and Analysis
1. Information Gathering
2. DNS and SNMP Recon
3. Host and Port Scanning
4. RF Signal Capture
5. Sniffing Network Traffic
6. Device Functionality Analysis

4. SCADA Vulnerabilities
1. Common SCADA Vulnerabilities
2. Vulnerability Scanning
3. Server OS Testing
4. Authentication and Remote Access

5. Pentesting SCADA Services and Protocols
1. Attacking Standard Services
2. Attacking Server OS
3. Attacking ICS Protocols
4. Attacking Wireless Communications

6. SCADA Access Controls
1. Categorization of System Controls
2. Physical Safety and Security
3. Identification Authentication and Authorization
4. Access Control Models
7. Remote Access and Field Site Security
1. Remote Access Security
2. Remote Access Technologies
3. Remote Access Firewall Architectures
4. Field Site Security
5. Field Site Firewalls
6. Encryption
8. SCADA Network Security
1. Secure Network Design
2. Firewalls
3. Logical Security Zones
9. SCADA Intrusion Detection and Incident Response
1. IDS IPS
2. Introduction to Snort
3. Log Monitoring and Management
4. Incident Response

 

 


Discover more from Easy Learning (Since 2013)

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.