Udemy - Industrial SCADA and ITOT from Cyber Security and Zero Trust

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size664.4 MB
  • Uploaded Byfreecoursewb
  • Downloads33
  • Last checkedDec. 15th '23
  • Date uploadedDec. 14th '23
  • Seeders 11
  • Leechers11

Infohash : 22176A8269930EAAE91A0D8DFDD4800EBADD9D64

Industrial SCADA and ITOT from Cyber Security and Zero Trust

https://DevCourseWeb.com

Published 12/2023
Created by Alexandru Serghie
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 54 Lectures ( 1h 35m ) | Size: 666 MB

Overview about making SCADA and ITOT more secure for Cyber Security threats using Zero Trust techniues

What you'll learn
Learn concepts for building a secure SCADA from Cybersecurity point of view
Define Zero Trust objective and implementation
Detail on how to secure the network to overcome risks that nobody wants in SCADA and ITOT
Examples and practices will help achieve world wide standard of security and compliance

Requirements
This is designed for at least basic skilled understanding of network, operating systems, cyber security concepts

Files:

[ DevCourseWeb.com ] Udemy - Industrial SCADA and ITOT from Cyber Security and Zero Trust
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 1. Introduction and About me, the trainer.mp4 (23.0 MB)
    • 1.1 LinkedIn Profile.html (0.1 KB)
    10. Platform Backup
    • 1. Platform Backup.mp4 (11.3 MB)
    11. Best Practices
    • 1. Sandboxing.mp4 (9.2 MB)
    • 2. Air Gapped Systems.mp4 (14.6 MB)
    • 2.1 Stuxnet on Wikipedia.html (0.1 KB)
    • 3. PKI and Certification Authorities.mp4 (4.0 MB)
    • 4. Physical Security.mp4 (25.8 MB)
    • 5. Procedures and Protocols.mp4 (5.4 MB)
    12. Closing Thoughts
    • 1. This is Just the Beginning.mp4 (4.0 MB)
    2. Introduction on SCADA and why Cyber Security topic is so important
    • 1. Overview on SCADA and Cyber Security.mp4 (25.9 MB)
    • 2. Components of SCADA platform.mp4 (17.9 MB)
    • 3. SCADA vs ITOT.mp4 (17.9 MB)
    • 4. Standards.mp4 (8.4 MB)
    3. Basic concepts when you plan the design of an ITOT
    • 1. Basic concepts when you plan the design of an ITOT.mp4 (8.1 MB)
    • 2. Redundancy.mp4 (16.8 MB)
    • 3. Single point of failure examples.mp4 (7.6 MB)
    • 4. How to use maintenance windows for redundant units.mp4 (24.5 MB)
    4. Cyber Security for a SCADA system
    • 1. CIA Triad.mp4 (3.6 MB)
    • 2. Zero trust and defense in depth.mp4 (8.0 MB)
    • 3. Least privilege - using LDAP and Active Directory.mp4 (14.1 MB)
    • 4. Multi-factor authentication (MFA).mp4 (13.4 MB)
    • 5. Endpoints.mp4 (7.6 MB)
    • 6. 802.1x Network Protocol.mp4 (16.8 MB)
    • 7. Network access control.mp4 (6.2 MB)
    • 8. Defense-in-depth.mp4 (14.1 MB)
    • 9. Encryption.mp4 (28.6 MB)
    5. Computer Network Design and Considerations
    • 1. Network Segmentation.mp4 (5.2 MB)
    • 10. Remote Devices and Industrial Communication Protocols.mp4 (9.7 MB)
    • 2. Segmentation Based on Role.mp4 (7.9 MB)
    • 3. Segmentation Based on Risk.mp4 (14.5 MB)
    • 4. Computer Network Switches.mp4 (15.7 MB)
    • 5. Computer Network Firewalls.mp4 (7.2 MB)
    • 6. IPSIDS.mp4 (8.1 MB)
    • 7. Encryption.mp4 (8.8 MB)
    • 8. Remote Access.mp4 (21.7 MB)
    • 9. VPN and Corporate Access.mp4 (9.7 MB)
    6. Servers and Other Infrastructure
    • 1. Physical servers.mp4 (17.6 MB)
    • 2. Cloud servers.mp4 (13.1 MB)
    • 3. Virtualization layer.mp4 (11.4 MB)
    • 4. Operating Systems.mp4 (5.2 MB)
    • 5. Other Infrastructure.mp4 (8.0 MB)
    7. Securing The Platform
    • 1. Defense In Depth.mp4 (19.9 MB)
    • 2. Patching.mp4 (13.8 MB)
    • 3. Fighting Malware.mp4 (8.6 MB)
    • 4. Out Of Band Connections.mp4 (5.7 MB)
    • 5. Centralized Management and Control.mp4 (7.0 MB)
    • 6. Securing Common Network Protocols.mp4 (13.9 MB)
    • 7. Vulnerability Testing and Assessment.mp4 (15.5 MB)
    8. Logging and monitoring
    • 1. Monitoring.mp4 (21.1 MB)
    • 2. Asset Management and Inventory.mp4 (8.0 MB)
    • 3. Syslog.mp4 (12.4 MB)
    9. Data Analysis
    • 1. Mirror Traffic and Network Taps.mp4 (13.4 MB)
    • 2. NetFLOW and SFLOW.mp4 (8.1 MB)
    • 3. Decrypting traffic for analysis.mp4 (8.2 MB)
    • 4. SIEM.mp4 (8.7 MB)
    • Bonus Resources.txt (0.4 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce