Industrial Cybersecurity 4: Defending ICS Against Real-World Attacks
Gain expert skills in protecting industrial systems from cyber attacks.
Starting Point
1.1 Introduction to Real-World ICS Cybersecurity Threats and Defenses
1.2 Overview of the German Steel Mill Cyber Incident
1.3 Exploring the Attack Vector: How the Incident Happened
1.4 Detecting Cyber Threats: Lessons from the Incident
1.5 Quiz
2.1 Defending Against Similar Attacks: Part 1
2.2 Defending Against Similar Attacks: Part 2
2.3 Defending Against Similar Attacks: Part 3
2.4 Defending Against Similar Attacks: Part 4
2.5 Defending Against Similar Attacks: Part 5
2.6 Defending Against Similar Attacks: Part 6
2.7 Defending Against Similar Attacks: Part 7
2.8 Defending Against Similar Attacks: Part 8
2.9 Defending Against Similar Attacks: Part 9
3.1 Industroyer2: Introduction and Historical Context
3.2 Analyzing Industroyer2: Targets, Attack Vectors, and Detection
3.3 Defending Against Industroyer2: Strategies and Solutions
3.4 Quiz
4.1 The Colonial Pipeline Cyber Attack: An Overview
4.2 Preventative Measures and Security Insights
4.3 Quiz
5.1 Introduction & History
5.2 Analysis
5.3 Quiz
Incredible Work!