Course curriculum

    1. Starting Point

    2. 1.1 Introduction to Real-World ICS Cybersecurity Threats and Defenses

    3. 1.2 Overview of the German Steel Mill Cyber Incident

    4. 1.3 Exploring the Attack Vector: How the Incident Happened

    5. 1.4 Detecting Cyber Threats: Lessons from the Incident

    6. 1.5 Quiz

    1. 2.1 Defending Against Similar Attacks: Part 1

    2. 2.2 Defending Against Similar Attacks: Part 2

    3. 2.3 Defending Against Similar Attacks: Part 3

    4. 2.4 Defending Against Similar Attacks: Part 4

    5. 2.5 Defending Against Similar Attacks: Part 5

    6. 2.6 Defending Against Similar Attacks: Part 6

    7. 2.7 Defending Against Similar Attacks: Part 7

    8. 2.8 Defending Against Similar Attacks: Part 8

    9. 2.9 Defending Against Similar Attacks: Part 9

    1. 3.1 Industroyer2: Introduction and Historical Context

    2. 3.2 Analyzing Industroyer2: Targets, Attack Vectors, and Detection

    3. 3.3 Defending Against Industroyer2: Strategies and Solutions

    4. 3.4 Quiz

    1. 4.1 The Colonial Pipeline Cyber Attack: An Overview

    2. 4.2 Preventative Measures and Security Insights

    3. 4.3 Quiz

    1. 5.1 Introduction & History

    2. 5.2 Analysis

    3. 5.3 Quiz

    4. Incredible Work!

About this course

  • €500,00
  • 26 lessons
  • 1 hour of video content

Discover your potential, starting today