Companies Home Search Profile

Xage Zero Trust Blockchain-Protected Fabric for IIOT

Focused View

Hatem Metwally

2:51:26

45 View
  • 1. Installation - Part1.mp4
    23:18
  • 2. Installation - Part2.mp4
    59:54
  • 3. GUI demstifyied.mp4
    11:16
  • 4. Access Management.mp4
    18:16
  • 5. Configure Users & User Groups with MFA.mp4
    21:26
  • 6. WebSSH Access Policy with Authorization.mp4
    19:54
  • 7. Session Collaboration - Part1.mp4
    13:13
  • 8. Session Collaboration - Part2.mp4
    04:09
  • Description


    Zero trust approach for access management for critical infrastructure

    What You'll Learn?


    • Zero trust approach for access management for critical infrastructure including the operational technology
    • Zero trust secure local access for floor operations within the OT infrastructure itself
    • Securely facilitate vendor and third-party OEM remote access into the critical infrastructure down to the OT devices the L1 devices the PLCs and the RTUs
    • Enable Dynamic data security to secure the sharing of events and data streams from the OT devices to any external entity without exposing those OT systems
    • Cyber-hardening Interconnected Operations with an Asset and Identity-centric Approach
    • Modernizing Access Management with Zero Trust

    Who is this for?


  • IT Support, Security administrators, System administrators, Network administrators, SOC analyst
  • What You Need to Know?


  • Basic IT and Linux/Unix skills
  • More details


    Description

    Xage is specialized in Zero Trust approach for access management for critical infrastructure including the operational technology to serve basically three key use cases:


    1) Zero trust secure local access for floor operations within the OT infrastructure itself, as well as


    2)  Securely facilitate vendor and third-party OEM remote access into the critical infrastructure down to the OT devices the L1 devices the PLCs and the RTUs, as well as


    3) Enable Dynamic data security to secure the sharing of events and data streams from the OT devices to any external entity without exposing those OT systems to any other networks


    So all the sessions will always be terminated within the OT infrastructure itself to achieve that


    Xage is basically three different products bonded into one single fabric platform

    1) Identity-based Access Management

    2) Zero trust Remote Access

    3) Zero Trust Data Security


    Xage does privilege access management, it basically allows you to create or integrate with active directory and create user accounts with specific privileges to Target critical devices where the Xage fabric will be the interface for accessing those critical devices  and all the critical device credentials will not be exposed to the user, however it will be closely managed by the Xage fabric itself


    In this course we will try to cover the following

    - Foundations and Architecture

    - Zero Trust Remote Access, File Transfer, and Data Exchange

    - Installation and Deployment

    - GUI demstifyied

    - Access Management

    - Device Management

    - Policies

    - Configure Users & User Groups with MFA

    - WebSSH Access Policy with Authorization

    - Session Collaboration

    Who this course is for:

    • IT Support, Security administrators, System administrators, Network administrators, SOC analyst

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Hatem Metwally
    Hatem Metwally
    Instructor's Courses
    MBA - Business Analytics, CISSP, CISM, SIEM Specialist, and 13+ years of experience into Network and Information Security.+++++++ +++++++ +++++++ EDUCATION +++++++ +++++++ +++++++ QATAR UNIVERSITY, MBA - BUSINESS ANALYTICSThe MBA program in Qatar University is AACSB accredited which ensures that business schools meet the highest standards of excellence in teaching, research, curriculum, and learner success. Started the program in Fall 2019 and graduated in Spring 2022 with GPA of 3.95 and concentrated in Business Analytics by electing courses in Business Analytics and Data Mining beside core courses in Corporate Finance, Operations Management, Managerial Accounting and Managerial Economics.AIN SHAMS UNIVERSITY, BSC. IN COMPUTRS AND SYSTEMS ENGINEERINGFrom 1998 ~ 2003 – Grade: Distinguished with Honor
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 8
    • duration 2:51:26
    • Release Date 2023/09/13