Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT & OT/ICS CySEAT Professional
Week 1 - IT & OT/ICS Introduction & Overview
Introduction
Overview
General IT & OT/ICS Security Awareness Training
3 Phase and 12 Steps framework - a blueprint for getting started
IT Security Principals
OT Security Principals
Differences between IT & OT/ICS Cybersecurity
Security Awareness & Training - Compliance Requirements
Quiz
Week 2 - Goals & Business Needs
Introduction & Goals
Myths/Mistakes
Threats & Drivers
Threat Agents & Attack Vectors
Noteable IT & OT Disruptive Events
Business needs for IT & OT Cybersecurity Strategy
IT & OT Cybersecurity Program & Awareness
Week 3 - Digital Transformation (Opportunities & Cyber Risks)
Digital Manufacturing Lifecycle/Workflow & The Automation Stack
The Automation Stack
Industry 3.0
Industry 4.0 Concepts & Digital Transformation
Parallels between Digital Transformation & Cybersecurity Strategy
Risks Across CRM - Customer Relationship Management
Risks Across ERP - Enterprise Resource Planning
Risks Across MES - Manufacturing Execution System
Risks Across SCADA - Supervisory Control And Data Acquisition
Risks Across HMI - Human Machine Interface
Risks Across PLC - Programmable Logic Controller
Risks Across WMS - Warehouse Management Systems
Risks Across AR/AP - Accounts Receivable / Accounts Payable
PERA/Purdue Model with Threats & Mitigation Examples
Transient Devices - Risks, Security Controls & Best Practices
Week 4 - Building Strategy & Framework
Steps for building an IT & OT/ICS Cybersecurity & Resilience Strategy
Risk Analysis across the IT & OT/ICS Network Environments
Choosing a Framework / Standards
Discovery, Review & Assessments
Building the Roadmap (Prioritized list of initiatives)
New Lesson
Week 5 - IT & OT Cybersecurity Strategy Execution
Establishing a Joint IT-OT Governance (Committee) Structure
Introduction to IT & OT Security Dozen Framework by M. Yousuf Faisal
IT CBPRS (IT Cybersecurity Best Practices Requirements Specification)
OT CBPRS (OT Cybersecurity Best Practices Requirements Specifications)
IT Specific Security Controls & Solutions
OT Specific Security Controls & Solutions
Summing Up
Cybersecurity for IT & OT/ICS
Be Cyber Vigilant
Next Steps
Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock