Companies Home Search Profile

ICS-OT Cyber Attack Tactics, Techniques & Procedures - MITRE

Focused View

Sourabh Suman

5:29:56

81 View
  • 1 - Introduction.mp4
    03:40
  • 2 - Tactics.mp4
    04:17
  • 3 - Initial Access.mp4
    04:02
  • 4 - Driveby Compromise.mp4
    05:48
  • 5 - Exploit PublicFacing Application.mp4
    05:35
  • 6 - Exploitation of Remote Services.mp4
    02:54
  • 7 - External Remote Services.mp4
    03:46
  • 8 - Internet Accessible Device.mp4
    06:09
  • 9 - Remote Services.mp4
    04:31
  • 10 - Replication Through Removable Media.mp4
    05:37
  • 11 - Rogue Master.mp4
    03:34
  • 12 - Spearphishing Attachment.mp4
    06:10
  • 13 - Supply Chain Compromise.mp4
    05:06
  • 14 - Transient Cyber Asset.mp4
    04:58
  • 15 - Wireless Compromise.mp4
    06:36
  • 16 - Execution.mp4
    03:42
  • 17 - Change Operating Mode.mp4
    06:29
  • 18 - CommandLine Interface.mp4
    04:29
  • 19 - Execution through API.mp4
    02:02
  • 20 - Graphical User Interface.mp4
    04:52
  • 21 - Hooking.mp4
    05:07
  • 22 - Modify Controller Tasking.mp4
    04:01
  • 23 - Native API.mp4
    05:18
  • 24 - Scripting.mp4
    05:49
  • 25 - User Execution.mp4
    05:08
  • 26 - Persistence.mp4
    01:53
  • 27 - Modify Program.mp4
    02:30
  • 28 - Module Firmware.mp4
    03:15
  • 29 - Project File Infection.mp4
    02:22
  • 30 - System Firmware.mp4
    03:18
  • 31 - Valid Accounts.mp4
    03:15
  • 32 - Privilege Escalation.mp4
    02:29
  • 33 - Exploitation for Privilege Escalation.mp4
    03:15
  • 34 - Hooking.mp4
    00:56
  • 35 - Evasion.mp4
    02:18
  • 36 - Exploitation for Evasion.mp4
    03:36
  • 37 - Indicator Removal on Host.mp4
    02:13
  • 38 - Masquerading.mp4
    05:33
  • 39 - Rootkit.mp4
    05:17
  • 40 - Spoof Reporting Message.mp4
    04:38
  • 41 - Discovery.mp4
    04:02
  • 42 - Network Connection Enumeration.mp4
    04:08
  • 43 - Network Sniffing.mp4
    05:31
  • 44 - Remote System Discovery.mp4
    04:19
  • 45 - Remote System Information Discovery.mp4
    02:59
  • 46 - Wireless Sniffing.mp4
    05:12
  • 47 - Lateral Movement.mp4
    03:17
  • 48 - Default Credentials.mp4
    02:22
  • 49 - Exploitation of Remote Services.mp4
    02:50
  • 50 - Lateral Tool Transfer.mp4
    03:01
  • 51 - Program Download.mp4
    02:43
  • 52 - Remote Services.mp4
    03:57
  • 53 - Collection.mp4
    02:38
  • 54 - Automated Collection.mp4
    01:46
  • 55 - Data from Information Repositories.mp4
    01:30
  • 56 - Detect Operating Mode.mp4
    01:44
  • 57 - IO Image.mp4
    02:42
  • 58 - Man in the Middle.mp4
    03:12
  • 59 - Monitor Process State.mp4
    01:40
  • 60 - Point & Tag Identification.mp4
    02:08
  • 61 - Program Upload.mp4
    01:17
  • 62 - Screen Capture.mp4
    01:14
  • 63 - Wireless Sniffing.mp4
    00:51
  • 64 - Command & Control.mp4
    01:50
  • 65 - Commonly Used Port.mp4
    02:32
  • 66 - Connection Proxy.mp4
    02:34
  • 67 - Standard Application Layer Protocol.mp4
    02:21
  • 68 - Inhibit Response Function.mp4
    03:35
  • 69 - Activate Firmware Update Mode.mp4
    03:31
  • 70 - Alarm Suppression.mp4
    03:30
  • 71 - Block Command Message.mp4
    02:21
  • 72 - Block Reporting Message.mp4
    02:32
  • 73 - Block Serial COM.mp4
    03:13
  • 74 - Data Destruction.mp4
    02:46
  • 75 - Denial of Service.mp4
    02:54
  • 76 - Device RestartShutdown.mp4
    03:12
  • 77 - Manipulate IO Image.mp4
    02:59
  • 78 - Modify Alarm Settings.mp4
    03:01
  • 79 - Service Stop.mp4
    03:39
  • 80 - Impair Process Control.mp4
    02:49
  • 81 - Brute Force IO.mp4
    03:26
  • 82 - Modify Parameter.mp4
    01:47
  • 83 - Unauthorized Command Message.mp4
    03:01
  • 84 - Impact.mp4
    02:41
  • 85 - Damage to Property.mp4
    01:34
  • 86 - Denial of Control.mp4
    02:16
  • 87 - Denial of View.mp4
    02:17
  • 88 - Loss of Availability.mp4
    01:31
  • 89 - Loss of Control.mp4
    02:18
  • 90 - Loss of Productivity and Revenue.mp4
    02:33
  • 91 - Loss of Protection.mp4
    03:16
  • 92 - Loss of Safety.mp4
    02:08
  • 93 - Loss of View.mp4
    01:36
  • 94 - Manipulation of Control.mp4
    02:19
  • 95 - Manipulation of View.mp4
    02:43
  • 96 - Theft of Operational Information.mp4
    02:17
  • 97 - Complete-Course-Material.pdf
  • 97 - Mitigation and MITRE Navigation.mp4
    11:23
  • 97 - apt profiler.zip
  • 97 - mitiagtaion explorer open att&ck for ics tt&m tool.zip
  • 97 - mitre att&ck framework.zip
  • Description


    Simplified understanding of adversary tactics and techniques based MITRE Framework for ICS, all techniques explained.

    What You'll Learn?


    • ICS Attack Tactics
    • ICS Attack Techniques
    • MITRE ATT&CK Framework
    • Mitigations for the techniques
    • Major cybersecurity attacks in ICS

    Who is this for?


  • Control engineers, integrators, and architects who design or implement OT systems
  • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
  • Managers who are responsible for OT systems
  • Security consultants who perform security assessments and penetration testing of OT systems
  • Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
  • Researchers and analysts who are trying to understand the unique security needs of OT systems
  • Vendors that are developing products that will be deployed as part of an OT system
  • More details


    Description

    *********************LEARN MITRE CLOSELY, CLEAR ALL CONCEPTS*******************

                            CAUTION: " DONOT BUY IF YOU DON"T LIKE THEORITICAL COURSE"

    MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.


    In this course, you will learn about all the tactics for ICS/OT as per the framework. This is not a practical course, this is solely for learning the concepts. Also, we will learn about all the techniques in detail for each tactic. And for mitigation, there could be the same mitigation to be applied for multiple techniques so we will cover mitigations as a whole. We will cover all the below-mentioned tactics:


    ICS Attack tactics:

    1. Initial Access

    2. Execution

    3. Persistence

    4. Privilege Escalation

    5. Evasion

    6. Discovery

    7. Lateral Movement

    8. Collection

    9. Command and Control

    10. Inhibit Response Function

    11. Impair Process Control

    12. Impact

    After completing this course you will have a good understanding of the techniques to be implemented and executed by adversaries. That will help you to answer clients, customers, and in meetings and discussions. Also whenever you are designing some solution you will keep these in mind and set proper mitigation to make the environment more secure and comprehensive.

    * Connect to me on Linkedin/ or visit cyberotsecure{dot}com website to get discounts.*

    For understanding this course you should have a basic understanding of the Industrial control system and technical terms which are commonly used in cybersecurity so that you can understand the concepts. This is a theoretical course but in the future, I will keep on adding practical examples as well.

    * Most affordable course on ICS MITRE,


    Who this course is for:

    • Control engineers, integrators, and architects who design or implement OT systems
    • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
    • Managers who are responsible for OT systems
    • Security consultants who perform security assessments and penetration testing of OT systems
    • Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
    • Researchers and analysts who are trying to understand the unique security needs of OT systems
    • Vendors that are developing products that will be deployed as part of an OT system

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Sourabh Suman
    Sourabh Suman
    Instructor's Courses
    I have over 11 years of experience in OT/ICS and ICS cybersecurity with companies like Schneider Electric, Siemens and Capgemini. I have implemented mega cybersecurity projects in Industrial Control Systems system and been a continuous practitioner of 62443 standards. Lets join hands to understand ICS cybersecurity and safeguard these critical infrastructures.ICS systems comprises of SCADA, DCS, PLC and many more proprietary systems and protocols, designing a cybersecurity solution for these system needs understanding of both OT related applications and IT related controls which can fit into these environments.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 97
    • duration 5:29:56
    • Release Date 2023/04/27