Industrial Cybersecurity
This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.
Offered by
Difficulty Level
Intermediate
Completion Time
26h40m
Language
English
About Book
Who Is This Book For?
If you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.
Industrial Cybersecurity
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 26h40m total length
Introduction and Recap of First Edition
A Modern Look at the Industrial Control System Architecture
The Industrial Demilitarized Zone
Designing the ICS Architecture with Security in Mind
Introduction to Security Monitoring
Passive Security Monitoring
Active Security Monitoring
Industrial Threat Intelligence
Visualizing, Correlating, and Alerting
Threat Hunting
Threat Hunt Scenario 1 – Malware Beaconing
Threat Hunt Scenario 2 – Finding Malware and Unwanted Applications
Threat Hunt Scenario 3 – Suspicious External Connections
Different Types of Cybersecurity Assessments
Industrial Control System Risk Assessments
Red Team/Blue Team Exercises
Penetration Testing ICS Environments
Incident Response for the ICS Environment
Lab Setup
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!