Course Overview

The course is designed to equip participants with a comprehensive understanding of the five pivotal functions of the NIST framework: Identify, Protect, Detect, Respond, and Recover, with a specific focus on addressing the unique challenges and solutions within the OT (Operational Technology) security domain. 

In this course, participants delve into Asset Management, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management. Here, they learn how to establish a comprehensive inventory of assets and effectively manage associated risks.

The course then shifts focus to Identity Management and Access Control, Awareness and Training, Data Security, and other key areas such as Information Protection Processes and Procedures, Maintenance, and Protective Technology. This section equips participants with the skills to fortify their OT environment against potential threats. Moving forward, the course covers Anomalies and Events, Security Continuous Monitoring, and Detection Processes. Participants develop expertise in identifying cybersecurity events, enabling swift intervention.

The course discusses Response Planning, Communications, Analysis, Mitigation, and Improvements. Participants are trained on crafting and executing effective response strategies to minimize the impact of cybersecurity incidents. Lastly, emphasis is placed on Recovery Planning, Improvements, and Communications. Participants learn how to restore and improve systems post-incident, ensuring resilience and continuity of operations.

By the end of the course, through navigating the complexities of OT security and mastering the application of the NIST 800-82 Risk Management Framework, participants contribute to shaping a resilient future for critical infrastructure and industrial systems.

What You Will Learn

  • Applying the Risk Management Framework to OT systems.
  • Learning in details about IPDRR.
  • Complete knowledge of NIST Cybersecurity framework.
  • Conceptual learning of OT Cybersecurity NIST perspective.

Program Curriculum

  • Applying Cybersecurity Framework to OT
  • Threat Sources
  • Threat Event
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Identify
  • Asset Management (ID.AM)
  • Mapping Data Flows (ID.AM-3)
  • Network Architecture Documentation
  • Governance (ID.GV)
  • Risk Assessment (ID.RA)
  • Risk Management Strategy (ID.RM)
  • Supply Chain Risk Management (ID.SC)
  • Exercise - Physical
  • Chapter 2 Quiz

  • Protect
  • Identity Management and Access Control (PR.AC)
  • Logical Access Controls (PR.AC)
  • Physical Access Controls (PR.AC-2)
  • Network Segmentation and Isolation (PR.AC-5)
  • User, Device, and Asset Authentication (PR.AC-7)
  • Awareness and Training (PR.AT)
  • Data Security (PR.DS)
  • Information Protection Processes and Procedures (PR.IP)
  • Least Functionality (PR.IP-1)
  • Configuration Change Control (Configuration Management) (PR.IP-3)
  • Backups (PR.IP-4)
  • Physical Operating Environment (PR.IP-5)
  • Response and Recovery Plans (PR.IP-9) and Response and Recovery Plan Testing
  • Maintenance (PR.MA)
  • Protective Technology (PR.PT)
  • Logging (PR.PT-1)
  • Media Protection (PR.PT-2)
  • Personnel Security
  • Wireless Communication
  • Flaw Remediation
  • Chapter 3 Quiz

  • Detect
  • Anomalies and Events (DE.AE)
  • Security Continuous Monitoring (DE.CM)
  • Network Monitoring (DE.CM-1)
  • System Use Monitoring (DE.CM-1 and DE-CM-3)
  • Malicious Code Detection (DE.CM-4)
  • Vulnerability Scanning (DE.CM-8)
  • Detection Process (DE.DP)
  • Chapter 4 Quiz

  • Respond
  • Response Planning (RS.RP)
  • Response Communications (RS.CO)
  • Response Analysis (RS.AN)
  • Response Mitigation (RS.MI)
  • Response Improvements (RS.IM)
  • Chapter 5 Quiz

  • Recover
  • Recovery Planning (RC.RP)
  • Recovery Improvements (RC.IM)
  • Recovery Communications (RC.CO)
  • Chapter 6 Quiz

Conclusion

Load more modules

Instructor

Sourabh Suman

Sourabh Suman is a renowned ICS cybersecurity expert, an engaging instructor, and a sought-after speaker at industry conferences. With over a decade of experience working with elite companies like JPL, Schneider Electric, Siemens, and Capgemini, he has implemented several mega cybersecurity projects. Sourabh is known for his practical, hands-on approach and has authored "Unblocking Your Potential in ICS Cybersecurity," a comprehensive guide for those interested in building a successful career in this field. His Udemy courses on industrial automation, network security, and risk management are among the most popular in the industry. His clarity, depth of knowledge, and engaging teaching style have helped numerous professionals transform their careers, making him an asset to the ICS cybersecurity industry. He holds a bachelor’s in technology degree in Control and Instrumentation followed by Postgraduate in Management. He loves teaching and is passionate about spreading awareness on ICS cybersecurity.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8