70 likes | 120 Views
Hardware and software systems that communicate with the physical world are collectively referred to as operational technology (OT). With a desire to integrate IT skills into physical systems that either replace or enhance the current physical control components, it has developed steadily through time.<br><br>https://www.infosectrain.com/courses/ot-security-fundamental-training/<br>
E N D
EARLY BIRD OFFER INR 14,999 INR 24,999 + TAXES OT/ICS Security Foundation Training USD 249 USD 499 *T&C Apply 20 hrs of instructor-led training Blended learning delivery model Comprehensive introduction to OT/ICS security for IT and OT professionals ? ? ? REGISTER NOW SPEAKER Manjunath 14+ Years Of Experience ANSI/IEC 62443 Cyber Security Expert @infosectrain *T&C Apply
OT/ICS Security Foundation Course Benefits $150000 $104436 $135200 $90623 $97000 $96351 $75221 $90090 OT/ICS Security Consultant OT/ICS Cyber Security Architect Compliance and Risk Management Specialist OT/ICS Security Engineer OT/ICS OT/ICS Security Sales Engineer OT/ICS Security Analyst Incident Response Specialist Project Manager HIRING COMPANIES @infosectrain
Course ADVISOR Manjunath 14+ years of experience as an Industrial Automation and Control System specialist in designing & delivering Secure Industrial Control Systems. Manjunath holds in-depth expertise on Risk assessment, vulnerability assessment and upgrading existing plants to security enhanced systems. Well versed with NIST, NERC-CIP, and ABS Marine Cyber Safety Standards, he has gained extensive knowledge and experience in Process Control Network Design, Network Segmentation, Network Monitoring Systems, Nozomi IDS solution, Identity and Access Management, Firewall configurations, Patch Management and STIG Management. @infosectrain
Course CONTENT Introduction to OT/ICS Security • Overview of OT and ICS • Importance of OT/ICS Security • Differences between IT and OT Security Understanding OT/ICS Components and Architecture • Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI, Engineering Workstation etc.,) • ICS Network Architecture and Protocols • ICS Network Segmentation and Zoning @infosectrain
Threat Landscape and Vulnerabilities • Common OT/ICS Threats and Attack Vectors • Vulnerabilities in OT/ICS Systems • Notable Incidents and Case Studies Risk Assessment and Management • Risk Assessment Methodologies for OT/ICS • Mitigation Strategies and Risk Treatment • Monitoring and Incident Response Planning @infosectrain
OT/ICS Security Best Practices and Standards • Overview of OT/ICS Security Standards (NIST 800-82, IEC62443, NERC CIP, Sector Specific standards) • Security Policies, Procedures, and Controls. • Physical and Environmental Security Considerations. Overview of Tools and Technologies for OT/ICS Security • Network Traffic Analysis Tools (e.g., Wireshark) • Network Monitoring and Anomaly Detection Solutions (e.g., Suricata, Snort) • Firewall and Security Solutions for OT/ICS Environments @infosectrain
BECOME AN EXPERT IN OT/ICS Security Foundation Training ENROLL NOW www.infosectrain.com I sales@infosectrain.com