Autoplay
Autocomplete
Previous Lesson
Complete and Continue
IT & OT/ICS CySEAT Professional
Section A - Introduction to the Course and Instructor!
Agreement, Copyright and Disclaimer!
Goals & Objectives
Course Materials | Course Units
Quick introduction about Me (Author / Instructor)
Section B - Assumptions Made and Pre-requisites for the course!
Assumptions made and Pre-requisites
Bonus Video: Getting Started in IT & OT Cybersecurity - A 3 Phase and 12 Steps Blueprint
Section C - Certification & Requirements for Completing This course…
Completion of Course Activities
Section 1 - The Digital Factory - Key Concepts | Definitions
Key Stakeholders, their relationships, CII sectors and Key definitions
IT and OT Cybersecurity – Key Security Goals and differences
Purdue Levels (PERA Model)
Industrial Automation Stack
Manufacturing Lifecycle
What is – Industry 3.0 | IIOT | Digital Transformation | Industry 4.0 | Digital Factory | UNS
Section 3 - Methodology and Approaches
Methodology & Approach
Introduction to IT & OT Security Dozen Framework by M. Yousuf Faisal
Standards or Framework Selection
Building the Roadmap (Prioritized list of initiatives)
Section 4 - Cybersecurity across IT & OT Project Lifecycles
Typical Stakeholders and their roles across Project Lifecycle
Cybersecurity activities across IT & OT Project lifecycle stages
Systems / Software Development Lifecycle (SDLC) in IT & OT and related cybersecurity activities
Section 5 - Digital Transformation Strategy and Cybersecurity Strategy
Parallels between Digital Transformation & Cybersecurity Strategy
Section 6 - IT-OT Cybersecurity Reviews / Assessments
Discovery (Building business or asset inventory across IT/OT automation stack)
Assessment / reviews methods and types
Reference Standards, technical, goals and objectives
Section 7 - Secure Business - Appointing a Leader for Cybersecurity Program & Governance
Appoint a lead for IT and for OT Cybersecurity Program
IT and OT Cybersecurity Program Charter
Joint IT-OT Cybersecurity Governance Committee
Section 8 - (Secure Business) IT & OT Cybersecurity Strategy / Program Execution | Policy & Trainings
IT and OT Cybersecurity Strategy
Presenting an IT and OT Cybersecurity Strategy
Sample IT & OT Cybersecurity Strategy Presentation & Exercise
IT & OT Cybersecurity Policies
IT & OT Cybersecurity Awareness and Specialized Trainings
Section 9 - (Secure Business) IT & OT Cybersecurity Requirements Specifications
Secure by 3Ds (Demand | Design | Default) - Cybersecurity Levers
IT CBPRS (IT Cybersecurity Best Practices Requirements Specification)
OT CBPRS (OT Cybersecurity Best Practices Requirements Specifications)
Supply Chain and Related Third-party security risks
OT CBPRS Toolkit -> ST offer
Section 10 - (Secure Architecture & Controls) – Identify | Predict | Prevent | Detect (Select & Implement)
Secure Network Architectures (IT/OT segmentation)
Secure Remote Access
Wireless Security
Visibility – Asset discovery, Vulnerability Identification, Threat Detection & Risks.
Endpoint Security (AV/EDR, Whitelisting, USB Controls)
Transient Devices - Risks, Security Controls & Best Practices
Identity and Access Management (IAM)
Patch Management
IIOT Security
Edge devices
Cloud Security
AI Cybersecurity
Section 11 - (Secure Operations IT/OT) – Monitor | Detect | Respond | Recover
Logging and Cybersecurity Operations (SecOps)
SOC / MSSP and Threat Intelligence
Incident Response (IR) Plan / Processes
IR Tabletop Exercises / Drills
Cybersecurity inclusion in Disaster Recovery (DR)
Business Continuity Program (BCP)
Section 12 - Industry Standards | AI Cybersecurity | Data Privacy!
Industry Standards & guidelines - ISO 27001
Industry Standards & guidelines - ISA/IEC 62443
Industry Standards & guidelines - NIST CSF
Industry Standards & guidelines - NIST OT Security Guidelines
Industry Regulations (Critical Infrastructure)
AI use and Cybersecurity risks across IT & OT
Data Privacy core topic areas, frameworks and Regulations
Introduction to Level 2 IT-OT CySEAT (towards STCCP certification) - IT-OT Cybersecurity Dozen in-depth!
Summing Up
Cybersecurity for IT & OT/ICS
Be Cyber Vigilant
Next Steps
Transient Devices - Risks, Security Controls & Best Practices
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock