Course Overview

Industrial cybersecurity is based on the NIST guidelines. OT is critical to the operation of critical infrastructures, which are often highly interconnected, mutually dependent systems. It is important to note that while federal agencies operate many of the nation’s critical infrastructures, many others are privately owned and operated.

This course was created after thoroughly understanding and practically implementing it in the OT environment, so this 6-hour course is a summarized version of the NIST 800-82 standard. It will help to understand what it contains and how it should be understood. The course will start with an overview of DCS, PLC, BACS, and PACS. Next, you will learn about cybersecurity program development and risk management for Operational Technology systems. Moving ahead, you will learn about the cybersecurity framework. Finally, you will learn about the capabilities and tools of OT Security.

By the end of the course, you will have gained a good grasp of NIST 800-82 Standard and the technologies required for securing an OT infrastructure.

What You Will Learn

  • Familiarize with NIST 800-82 standard
  • Understand NIST 800-82 complete explanation
  • Learn about OT security risk management
  • Guidance on applying the Cybersecurity Framework to OT systems
  • Learn to apply the Risk Management Framework to OT systems
  • Understand about defense in Depth Architecture
  • Familiarize with OT Security capabilities and tools
  • Understand about development and deployment of an OT cybersecurity program

Program Curriculum

  • OT Based System and their Interdependencies
  • SCADA Systems
  • Distributed Control Systems
  • Programmable Logic Controller Based Topologies
  • Building Automation Systems
  • Physical Access Control Systems
  • Safety Systems
  • Industrial Internet of Things
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • OT Cybersecurity Program Development
  • Establish Charter for OT Cybersecurity Program
  • Benefits of OT Cybersecurity Program
  • OT Cybersecurity Program Content
  • Cybersecurity Program Implementation Team
  • OT Cybersecurity Strategy
  • Chapter 2 Quiz

  • Managing OT Security Risk
  • Framing OT Risk
  • Assessing Risk
  • Responding to Risk
  • Monitoring Risk
  • Applying Risk Management Framework
  • Chapter 3 Quiz

  • Prepare
  • P-1: Risk Management Roles
  • P-2: Risk Management Strategy
  • P-3: Risk Assessment – Organization
  • P-4: Organizationally Tailored Control Baselines and Cybersecurity Framework
  • P-5: Common Control Identification
  • P-6: Impact-Level Prioritization
  • P-7: Continuous Monitoring Strategy – Organization
  • P-8: Mission Or Business Focus
  • P-9: System Stakeholders
  • P-10: Asset Identification
  • Task P-11: Authorization Boundary
  • P-12: Information Types
  • P-13: Information Life Cycle
  • P-14: Risk Assessment – System
  • P-15: Requirements Definition
  • P-16: Enterprise Architecture
  • P-17: Requirements Allocation
  • P-18: System Registration
  • Categorize
  • Task C-1: System Description
  • Task C-2: Security Categorization
  • Task C-3: Security Categorization Review and Approval
  • Select
  • Task S-1: Control Selection
  • Task S-2: Control Tailoring
  • Task S-3: Control Allocation
  • Task S-4: Documentation Of Planned Control Implementations
  • Task S-5: Continuous Monitoring Strategy – System
  • Implement
  • Task I-1: Control Implementation
  • TASK I-2: Update Control Implementation Information
  • Assess
  • Task A-1: Assessor Selection
  • Task A-2: Assessment Plan
  • Task A-3: Control Assessments
  • Task A-4: Assessment Reports
  • Task A-5: Remediation Actions
  • Task A-6: Plan Of Action and Milestones
  • Authorize
  • Task R-1: Authorization Package
  • Task R-2: Risk Analysis and Determination
  • Task R-3: Risk Response
  • Task R-4: Authorization Decision
  • Task R-5: Authorization Reporting
  • Monitor
  • Task M-1: Checking System and Environment Changes
  • Task M-2: Ongoing Assessments
  • Task M-3: Ongoing Risk Response
  • Task M-4: Authorization Package Updates
  • Task M-5: Security and Privacy Reporting
  • Task M-6: Ongoing Authorization
  • Chapter 4 Quiz

  • Defense in Depth Architecture
  • Layer - 1 Security Management
  • Layer - 2 Physical Security
  • Layer - 3 Network Security
  • Network Architecture
  • Centralized Logging
  • Network Monitoring
  • Zero Trust Architecture
  • Layer - 4 Hardware Security
  • Layer - 5 Software Security
  • Additional Considerations
  • Distributed Control System (DCS)-Based OT Systems
  • DCS/PLC-Based OT with IIoT
  • SCADA-Based OT Environments
  • Chapter 5 Quiz

  • Segmentation - Firewall
  • Segmentation - Unidirectional Gateways
  • Segmentation - VLAN
  • Segmentation - Software Defined Networking
  • Network Monitoring/SIEM-BAD/DLP
  • Network Monitoring/SIEM-Deception & Digital Twin
  • Data Security - Immutable Storage/Hashing
  • Data Security - Digital Signatures/Remote Access
  • Chapter 6 Quiz
Load more modules

Instructor

Sourabh Suman

Sourabh Suman is a renowned ICS cybersecurity expert, an engaging instructor, and a sought-after speaker at industry conferences. With over a decade of experience working with elite companies like JPL, Schneider Electric, Siemens, and Capgemini, he has implemented several mega cybersecurity projects. Sourabh is known for his practical, hands-on approach and has authored "Unblocking Your Potential in ICS Cybersecurity," a comprehensive guide for those interested in building a successful career in this field. His Udemy courses on industrial automation, network security, and risk management are among the most popular in the industry. His clarity, depth of knowledge, and engaging teaching style have helped numerous professionals transform their careers, making him an asset to the ICS cybersecurity industry. He holds a bachelor’s in technology degree in Control and Instrumentation followed by Postgraduate in Management. He loves teaching and is passionate about spreading awareness on ICS cybersecurity.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8