Companies Home Search Profile

Industrial Cyber Security Controls from IEC62443 for ICS/OT

Focused View

Sourabh Suman

6:14:54

467 View
  • 1 - Introduction About IEC.mp4
    09:44
  • 1 - files.pdf
  • 1 - practical overview of implementing iec 62443 security levels in industrial.zip
  • 2 - Security Levels SL0 to SL5.mp4
    08:39
  • 3 - Levels of Control System Contextual Model L0L4.mp4
    06:06
  • 4 - Maturity Levels.mp4
    04:02
  • 5 - Security Level types Target Achieved and Capability.mp4
    04:43
  • 6 - Zone & Conduits.mp4
    05:38
  • 7 - Foundational requirements.mp4
    03:17
  • 8 - Identification and Authentication.mp4
    02:05
  • 9 - Use Control.mp4
    03:16
  • 10 - System Integrity.mp4
    02:32
  • 11 - Data Confidentiality.mp4
    01:51
  • 12 - Restricted Data flow.mp4
    03:20
  • 13 - Timely response to events.mp4
    03:04
  • 14 - Resource Availability.mp4
    03:13
  • 15 - Authentication & Authorization Briefing.mp4
    06:34
  • 16 - Role Based Access Control.mp4
    09:18
  • 17 - Password Authentication.mp4
    16:42
  • 18 - Challengeresponse Authentication.mp4
    10:23
  • 19 - Physical Token Authentication.mp4
    09:21
  • 20 - Smart Card Authentication.mp4
    12:47
  • 21 - Biometric Authentication.mp4
    11:25
  • 22 - Location Based Authentication.mp4
    10:04
  • 23 - Password Distribution & Management.mp4
    15:45
  • 24 - Device to Device Authentication.mp4
    05:50
  • 25 - Network Firewalls.mp4
    21:26
  • 26 - Host Based Firewalls.mp4
    14:13
  • 27 - Virtual Local Area Networks VLAN.mp4
    12:49
  • 28 - Virtual Private Networks VPN.mp4
    14:59
  • 29 - Symmetric Key Encryption.mp4
    09:58
  • 30 - Public Key Encryption.mp4
    10:56
  • 31 - Log Auditing Utilities.mp4
    14:30
  • 32 - Virus and Malicious Code Detection.mp4
    09:45
  • 33 - Intrusion Detection Systems.mp4
    12:58
  • 34 - How to implement.mp4
    07:11
  • 35 - Flowchart for Risk Assessment.mp4
    05:32
  • 36 - ZCR 1 Identification of SuC.mp4
    02:26
  • 37 - ZCR 2 High Level Risk Assessment.mp4
    02:57
  • 38 - ZCR 3 Partition of SuC in zones and conduits.mp4
    12:57
  • 39 - ZCR 4 Detailed Risk Assessment.mp4
    04:18
  • 40 - ZCR 5 Document Cybersecurity requirements assumptions and constraints.mp4
    05:25
  • 41 - Security Level 1.mp4
    19:41
  • 42 - Security Level 2.mp4
    11:35
  • 43 - Security Level 3.mp4
    11:39
  • Description


    IEC 62443 Standard, and implementation in the industrial control system (ICS). Technical controls, Levels & assessment.

    What You'll Learn?


    • Details of IEC 62443 standard
    • Authentication and Authorization controls
    • Cybersecurity Controls for ICS/OT
    • Controls: DFA, Firewalls, VPN, PKI
    • Controls: Password, Biometric, Token
    • Zones, Conduits and Security Levels
    • Foundational requirements
    • Log management
    • High/Low level Risk assessment
    • Industrial use case for SL1-SL3

    Who is this for?


  • Control engineers, integrators, and architects who design or implement OT systems
  • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
  • Security consultants who perform security assessments and penetration testing of OT systems
  • Cybersecurity managers who are responsible for OT systems
  • Vendors that are developing products that will be deployed as part of an OT system
  • What You Need to Know?


  • Basic industrial knowledge of DCS/SCADA/PLC
  • No programming knowledge required
  • Basic understanding of ICS/OT environment
  • Prior experience required in ICS
  • Architecture awareness of OT systems
  • More details


    Description

    Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing, etc., all are now integrated with IT technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is a prime concern now. Most industries are now implementing these measures and mitigating risks.

    ICS systems comprise SCADA, DCS, PLC, and many more proprietary systems and protocols, designing a cybersecurity solution for these systems need the understanding of both OT-related applications and IT-related controls which can fit into these environments.

    In this course, we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. Some controls can be implemented, what could be a probable weakness, and what does industry assessment says about those prescribed cybersecurity controls as per 62443-3-3. This course also covers risk assessment based on 62443-3-2 for high-level and detailed risk assessment. Industry uses case for zoning, segmentation is also explained in the course to make it easier to understand.

    These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for critical infrastructure.

    Who this course is for:

    • Control engineers, integrators, and architects who design or implement OT systems
    • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
    • Security consultants who perform security assessments and penetration testing of OT systems
    • Cybersecurity managers who are responsible for OT systems
    • Vendors that are developing products that will be deployed as part of an OT system

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Sourabh Suman
    Sourabh Suman
    Instructor's Courses
    I have over 11 years of experience in OT/ICS and ICS cybersecurity with companies like Schneider Electric, Siemens and Capgemini. I have implemented mega cybersecurity projects in Industrial Control Systems system and been a continuous practitioner of 62443 standards. Lets join hands to understand ICS cybersecurity and safeguard these critical infrastructures.ICS systems comprises of SCADA, DCS, PLC and many more proprietary systems and protocols, designing a cybersecurity solution for these system needs understanding of both OT related applications and IT related controls which can fit into these environments.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 43
    • duration 6:14:54
    • English subtitles has
    • Release Date 2022/11/20