Critical infrastructure

Critical infrastructure
Industrial controls systems (ICS) and supervisory control and data acquisition (SCADA) systems (a subset of ICS) manage our critical national infrastructure.

August 19, 2019
Tom Olzak
Critical infrastructure
Introduction Industrial control systems (ICS) are mainstays in the worlds of manufacturing, automation, utilities facilities and more. They make many process

August 08, 2019
Greg Belding
Critical infrastructure
Introduction Physical security for Industrial Control Systems/Supervisory Control and Data Acquisition systems (ICS/SCADA) is paramount for a proficiently-de

August 07, 2019
Greg Belding
Critical infrastructure
Introduction Supervisory Control and Data Acquisition, or SCADA, is a system used in many industries, including in the nation’s critical infrastructure, to h

August 06, 2019
Greg Belding
Critical infrastructure
Introduction The advent of Supervisory Control and Data Acquisition (SCADA), and Industrial Control Systems (ICS) generally can be described as a synthesis o

August 05, 2019
Greg Belding
Critical infrastructure
Industrial Control Systems (ICS) Equipment Under Attack Industrial Control Systems (ICS) are expected to be installed and left isolated for a long time. Tech

December 01, 2018
Pierluigi Paganini
Critical infrastructure
Anti-virus/anti-malware (AV) software is a critical component or layer of protection in securing your Industrial Control System (ICS) from external intrusion

April 28, 2018
John Henshell
Critical infrastructure
Overview: Internet Connection Sharing (ICS), a feature which has been available in Microsoft Windows Operating System since the deployment of Windows 98 seco

April 28, 2018
Richard Azu
Critical infrastructure
Introduction Situational awareness within the industrial control system (ICS) realm is a hot topic, with the recent release of commercial products targeting

November 04, 2017
Jim Acord
Critical infrastructure
ICS Attacks continues to increase worldwide Industrial control systems (ICS) are a privileged target of different categories of threat actors. According to I

April 26, 2017
Pierluigi PaganiniLearn ICS/SCADA Security
Build your critical infrastructure security skills with hands-on training in Infosec Skills. Train how you learn best:- Practice realistic scenarios
- Build hands-on skills
- Learn live or on-demand
- Get certified
In this series
- Securing operational technology: Safeguard infrastructure from cyberattack
- Operation technology sees rise in targeted remote access Trojans and ransomware
- Vehicle hacking: A history of connected car vulnerabilities and exploits
- Operational technology compromises: Low sophistication, high-frequency
- ICS/SCADA threats and threat actors
- Incident response and recovery best practices for industrial control systems
- BPCS & SIS
- Security Technologies for ICS/SCADA environments
- Data Loss Protection (DLP) for ICS/SCADA
- ICS/SCADA Wireless Attacks
- Security controls for ICS/SCADA environments
- SCADA & security of critical infrastructures [updated 2020]
- CIP (Common Industrial Protocol): CIP messages, device types, implementation and security in CIP
- Open vs proprietary protocols
- Critical security concerns facing the energy & utility industry
- ICS/SCADA Social Engineering Attacks
- ICS/SCADA Malware Threats
- Biggest threats to ICS/SCADA systems
- SIEM for ICS/SCADA environments
- Intrusion Detection and Prevention for ICS/SCADA Environments
- Firewalls for ICS/SCADA environments
- ICS/SCADA Security Technologies and Tools
- The state of threats to electric entities: 4 key findings from the 2020 Dragos report
- Modbus, DNP3 and HART
- RS-232 and RS-485
- BACnet
- TASE 2.0 and ICCP
- FOUNDATION Fieldbus
- Account Management Concepts for ICS/SCADA environments
- PROFIBUS and PROFINET
- ICS Strengths and Weaknesses (from security perspective)
- Access Control Implementation in ICS
- ICS Components
- Access Control Models for ICS/SCADA environments
- ICS/SCADA Security Specialist/Technician Role
- Credential Management and Enforcement for ICS/SCADA environments
- IT vs ICS
- Process control network (PCN) evolution
- ICS protocols
- Saving lives with ICS and critical infrastructure security
- ICS/SCADA Access Controls
- Types of ICS
- Physical security for ICS/SCADA environments
- Introduction to SCADA security
- ICS/SCADA security overview
- Who Is Targeting Industrial Facilities and ICS Equipment, and How?
- Configuration of Anti-Virus and Anti-Malware Software within an ICS Environment
- MyPublicWiFi – A Windows Utility to manage ICS
- Situational awareness and ICS Using GRASS MARLIN
- Cyber risks for Industrial environments continue to increase
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!