Companies Home Search Profile

Industrial SCADA and ITOT from Cyber Security and Zero Trust

Focused View

Alexandru Serghie

1:35:03

15 View
  • 1.1 LinkedIn Profile.html
  • 1. Introduction and About me, the trainer.mp4
    02:54
  • 1. Overview on SCADA and Cyber Security.mp4
    02:53
  • 2. Components of SCADA platform.mp4
    02:49
  • 3. SCADA vs ITOT.mp4
    02:49
  • 4. Standards.mp4
    01:40
  • 1. Basic concepts when you plan the design of an ITOT.mp4
    01:58
  • 2. Redundancy.mp4
    01:40
  • 3. Single point of failure examples.mp4
    01:19
  • 4. How to use maintenance windows for redundant units.mp4
    02:17
  • 1. CIA Triad.mp4
    01:01
  • 2. Zero trust and defense in depth.mp4
    02:17
  • 3. Least privilege - using LDAP and Active Directory.mp4
    02:38
  • 4. Multi-factor authentication (MFA).mp4
    02:10
  • 5. Endpoints.mp4
    01:27
  • 6. 802.1x Network Protocol.mp4
    02:05
  • 7. Network access control.mp4
    00:52
  • 8. Defense-in-depth.mp4
    01:32
  • 9. Encryption.mp4
    01:20
  • 1. Network Segmentation.mp4
    01:06
  • 2. Segmentation Based on Role.mp4
    01:56
  • 3. Segmentation Based on Risk.mp4
    02:09
  • 4. Computer Network Switches.mp4
    02:23
  • 5. Computer Network Firewalls.mp4
    01:15
  • 6. IPSIDS.mp4
    01:23
  • 7. Encryption.mp4
    01:22
  • 8. Remote Access.mp4
    02:18
  • 9. VPN and Corporate Access.mp4
    01:54
  • 10. Remote Devices and Industrial Communication Protocols.mp4
    01:51
  • 1. Physical servers.mp4
    01:25
  • 2. Cloud servers.mp4
    01:53
  • 3. Virtualization layer.mp4
    01:47
  • 4. Operating Systems.mp4
    00:58
  • 5. Other Infrastructure.mp4
    02:00
  • 1. Defense In Depth.mp4
    02:44
  • 2. Patching.mp4
    02:03
  • 3. Fighting Malware.mp4
    01:49
  • 4. Out Of Band Connections.mp4
    01:12
  • 5. Centralized Management and Control.mp4
    01:20
  • 6. Securing Common Network Protocols.mp4
    01:37
  • 7. Vulnerability Testing and Assessment.mp4
    01:49
  • 1. Monitoring.mp4
    01:34
  • 2. Asset Management and Inventory.mp4
    01:04
  • 3. Syslog.mp4
    01:28
  • 1. Mirror Traffic and Network Taps.mp4
    02:09
  • 2. NetFLOW and SFLOW.mp4
    01:14
  • 3. Decrypting traffic for analysis.mp4
    01:26
  • 4. SIEM.mp4
    01:19
  • 1. Platform Backup.mp4
    02:09
  • 1. Sandboxing.mp4
    01:29
  • 2.1 Stuxnet on Wikipedia.html
  • 2. Air Gapped Systems.mp4
    01:52
  • 3. PKI and Certification Authorities.mp4
    00:46
  • 4. Physical Security.mp4
    02:55
  • 5. Procedures and Protocols.mp4
    00:50
  • 1. This is Just the Beginning.mp4
    00:53
  • Description


    Overview about making SCADA and ITOT more secure for Cyber Security threats using Zero Trust techniues

    What You'll Learn?


    • Learn concepts for building a secure SCADA from Cybersecurity point of view
    • Define Zero Trust objective and implementation
    • Detail on how to secure the network to overcome risks that nobody wants in SCADA and ITOT
    • Examples and practices will help achieve world wide standard of security and compliance

    Who is this for?


  • Engineers, Network and Infrastructure, System and Operations, Managers, Architects
  • What You Need to Know?


  • This is designed for at least basic skilled understanding of network, operating systems, cyber security concepts
  • More details


    Description

    In this course, I will give an overview on how to design and implement highly secure SCADA platforms. This course can be a good start point for beginners and also I hope will be interesting to follow even for experts in the field. The theory from this course will surely need adaptation over time while new threats will appear.

    The course follows zero trust techniques that I am also using in my daily activities. They are very important because older frameworks which contains even methods like just unplugging cable and considering it more secure. methods that was proven in practice to be a really bad one.

    This course is intended to share the knowledge I gathered in many years of experience. I will happily accept discussions invites and debates and maybe they will me and also this course to improve while we all improve the security of our systems.

    This will not be the definite containing all and have the direct and proven path to success. I can't say enough, cyber security needs to evolve over time at same rate or better than vulnerabilities evolves. Our lives start to depend more end more on IT and OT is just a part that usually we don't easily see with our own eyes but believe me, you don't want an OT system to be hacked and used in malicious activities.

    Who this course is for:

    • Engineers, Network and Infrastructure, System and Operations, Managers, Architects

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alexandru Serghie
    Alexandru Serghie
    Instructor's Courses
    Working IT&C since 2008 and in Automation (University Degree) since 2013. Cisco CCNA, Linux Security, ITIL , Automation Security Certifications, VMWare vSphere and NSX-T, CompTIA CYSA+.Very good knowledge also in Windows Server management and administration, network administration, other Microsoft services non Windows Server based, such as Exchange.Database management and programming in MySQL and MS SQL.Experienced Network and Server Administrator (Fertigate, CISCO and HP network equipment, Windows Server and VMWare ESX running on IBM, Dell, HP hardware). Managing VPN, MPLS, VLAN working with CISCO and HP network equipment and also Windows and Linux Servers Taking part of the teams that manages ERP (Navision) and CRM systems. Managing the backup strategy and plans in the Data Centers.IT&C consulting for Industrial SCADA System teams.  Virtualization projects (VMWare and Hyper-V) for cost reducing and efficiency of Data-Center. Intense using of NAS/SAN Storage.Data Center projects and infrastructure implementation in various projects over time on premises and also Hybrid Cloud, in industrial, energy and government structures.Lately working on many IT corporate projects in roles for IT Architect and SMECross Automation and IT projects, data reading and writing from PLC, SCADA integrations, etc.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 54
    • duration 1:35:03
    • Release Date 2024/01/05