Companies Home Search Profile

Specialized Attacks: OT and ICS

Focused View

Matthew Lloyd Davies

1:12:21

0 View
  • 1 -Course Overview.mp4
    01:46
  • 2 -Setting the Scene.mp4
    04:14
  • 3 -The ICS Cyber Kill-chain.mp4
    05:50
  • 4 -Demo Finding Internet Connected Operational Technology.mp4
    07:29
  • 5 -Gaining Access.mp4
    06:19
  • 6 -Internal Reconnaissance.mp4
    03:06
  • 7 -Demo Internal Reconnaissance Discovering ICS Devices.mp4
    10:00
  • 8 -Resources.mp4
    02:10
  • 9 -The Modbus Protocol.mp4
    05:13
  • 10 -DEMO Capturing and Analyzing Modbus Traffic.mp4
    03:51
  • 11 -DEMO Packet Crafting with Scapy.mp4
    05:05
  • 12 -Planning the Attack.mp4
    02:42
  • 13 -DEMO Launching the Attack.mp4
    06:54
  • 14 -ICS Cyber Security.mp4
    05:09
  • 15 -Drawing It All Together.mp4
    02:33
  • Description


    This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.

    What You'll Learn?


      Attacks against Industrial Control Systems (ICS) can cause manufacturing downtime, disrupt electricity generation or water supplies, and stop public services such as transport and telecommunication systems. In this course, Specialized Attacks: OT and ICS, you’ll learn to identify vulnerable systems, exploit inherent weaknesses, and perform actions that could disrupt operational technologies. First, you’ll explore how to identify internet facing operational technology, including control systems. Next, you’ll discover how to analyze the communications between industrial control systems. Finally, you’ll learn how to interact with those systems to perform unintended operations and disrupt operations. When you’re finished with this course, you’ll understand how to assess ICS environments, identify weaknesses and describe the potential consequences of an attack. This will enable you to make the case for continued investment in cyber security and reduce the likelihood of operational downtime.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Matthew Lloyd Davies
    Matthew Lloyd Davies
    Instructor's Courses
    With a background in Chemical Engineering and a career meandering through explosives safety research and accident investigation, Matt is now a Principal inspector and Deputy Professional Lead for Cyber Security and Information Assurance at the Office for Nuclear Regulation in the UK. For 11 years he has regulated nuclear safety and nuclear security across the whole of the UK’s nuclear estate and is currently responsible for regulating cyber security and information assurance across various parts of the nuclear fuel cycle. He is also responsible for developing ONR’s CS&IA regulatory capacity and capability and, as a GIAC certified penetration tester and incident handler, is the lead for technical assurance activities. Matt has planned and run national cyber security exercises that have simulated cyber-attacks against industrial control systems and has run projects to develop new and novel techniques for conducting assurance activities against industrial control systems.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 15
    • duration 1:12:21
    • level average
    • Release Date 2025/01/22

    Courses related to Ethical Hacking