Book Content
chapters • 26h40m total length
1. Introduction and Recap of First Edition
2. A Modern Look at the Industrial Control System Architecture
3. The Industrial Demilitarized Zone
4. Designing the ICS Architecture with Security in Mind
5. Introduction to Security Monitoring
6. Passive Security Monitoring
7. Active Security Monitoring
8. Industrial Threat Intelligence
9. Visualizing, Correlating, and Alerting
10. Threat Hunting
11. Threat Hunt Scenario 1 – Malware Beaconing
12. Threat Hunt Scenario 2 – Finding Malware and Unwanted Applications
13. Threat Hunt Scenario 3 – Suspicious External Connections
14. Different Types of Cybersecurity Assessments
15. Industrial Control System Risk Assessments
16. Red Team/Blue Team Exercises
17. Penetration Testing ICS Environments
18. Incident Response for the ICS Environment
19. Lab Setup














