You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set, you will look at the best practices and recommendations when it comes to bridging the air gap. You will learn a systematic process of intrusion and malware analysis. Once you have the process for analysis mastered, you will be introduced to the digital forensic process and how to respond to incidents when a breach is detected.
Il conseguimento preventivo delle certificazioni CND - Certified Network Defender e CEH - Certified Ethical Hacker è consigliato.
Module 1: Introduction to ICS/SCADA Network Defense
Module 2: TCP/IP 101
Module 3: Introduction to Hacking
Module 4: Vulnerability Management
Module 5: Standards and Regulations for Cybersecurity
Module 6: Securing the ICS network
Module 7: Bridging the Air Gap
Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)