ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE
ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE, available at $49.99, has an average rating of 3.6, with 97 lectures, based on 76 reviews, and has 519 subscribers.
You will learn about ICS Attack Tactics ICS Attack Techniques MITRE ATT&CK Framework Mitigations for the techniques Major cybersecurity attacks in ICS This course is ideal for individuals who are Control engineers, integrators, and architects who design or implement OT systems or System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems or Managers who are responsible for OT systems or Security consultants who perform security assessments and penetration testing of OT systems or Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program or Researchers and analysts who are trying to understand the unique security needs of OT systems or Vendors that are developing products that will be deployed as part of an OT system It is particularly useful for Control engineers, integrators, and architects who design or implement OT systems or System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems or Managers who are responsible for OT systems or Security consultants who perform security assessments and penetration testing of OT systems or Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program or Researchers and analysts who are trying to understand the unique security needs of OT systems or Vendors that are developing products that will be deployed as part of an OT system.
Enroll now: ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE
Summary
Title: ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE
Price: $49.99
Average Rating: 3.6
Number of Lectures: 97
Number of Published Lectures: 97
Number of Curriculum Items: 97
Number of Published Curriculum Objects: 97
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
- ICS Attack Tactics
- ICS Attack Techniques
- MITRE ATT&CK Framework
- Mitigations for the techniques
- Major cybersecurity attacks in ICS
Who Should Attend
- Control engineers, integrators, and architects who design or implement OT systems
- System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
- Managers who are responsible for OT systems
- Security consultants who perform security assessments and penetration testing of OT systems
- Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
- Researchers and analysts who are trying to understand the unique security needs of OT systems
- Vendors that are developing products that will be deployed as part of an OT system
Target Audiences
- Control engineers, integrators, and architects who design or implement OT systems
- System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
- Managers who are responsible for OT systems
- Security consultants who perform security assessments and penetration testing of OT systems
- Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
- Researchers and analysts who are trying to understand the unique security needs of OT systems
- Vendors that are developing products that will be deployed as part of an OT system
CAUTION: “DO NOT BUY IF YOU DON’T LIKE THEORETICAL COURSE”
MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
In this course, you will learn about all the tactics for ICS/OT as per the framework. This is not a practical course, this is solely for learning the concepts. Also, we will learn about all the techniques in detail for each tactic. And for mitigation, there could be the same mitigation to be applied for multiple techniques so we will cover mitigations as a whole. We will cover all the below-mentioned tactics:
ICS Attack tactics:
-
Initial Access
-
Execution
-
Persistence
-
Privilege Escalation
-
Evasion
-
Discovery
-
Lateral Movement
-
Collection
-
Command and Control
-
Inhibit Response Function
-
Impair Process Control
-
Impact
After completing this course you will have a good understanding of the techniques to be implemented and executed by adversaries. That will help you to answer clients, customers, and in meetings and discussions. Also whenever you are designing some solution you will keep these in mind and set proper mitigation to make the environment more secure and comprehensive.
* Connect to me on Linkedin/ or visit cyberotsecure{dot}com website to get discounts.
For understanding this course you should have a basic understanding of the Industrial control system and technical terms which are commonly used in cybersecurity so that you can understand the concepts. This is a theoretical course but in the future, I will keep on adding practical examples as well.
* Most affordable course on ICS MITRE
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: Tactics
Chapter 2: Initial Access
Lecture 1: Initial Access
Lecture 2: Drive-by Compromise
Lecture 3: Exploit Public-Facing Application
Lecture 4: Exploitation of Remote Services
Lecture 5: External Remote Services
Lecture 6: Internet Accessible Device
Lecture 7: Remote Services
Lecture 8: Replication Through Removable Media
Lecture 9: Rogue Master
Lecture 10: Spearphishing Attachment
Lecture 11: Supply Chain Compromise
Lecture 12: Transient Cyber Asset
Lecture 13: Wireless Compromise
Chapter 3: Execution
Lecture 1: Execution
Lecture 2: Change Operating Mode
Lecture 3: Command-Line Interface
Lecture 4: Execution through API
Lecture 5: Graphical User Interface
Lecture 6: Hooking
Lecture 7: Modify Controller Tasking
Lecture 8: Native API
Lecture 9: Scripting
Lecture 10: User Execution
Chapter 4: Persistence
Lecture 1: Persistence
Lecture 2: Modify Program
Lecture 3: Module Firmware
Lecture 4: Project File Infection
Lecture 5: System Firmware
Lecture 6: Valid Accounts
Chapter 5: Privilege Escalation
Lecture 1: Privilege Escalation
Lecture 2: Exploitation for Privilege Escalation
Lecture 3: Hooking
Chapter 6: Evasion
Lecture 1: Evasion
Lecture 2: Exploitation for Evasion
Lecture 3: Indicator Removal on Host
Lecture 4: Masquerading
Lecture 5: Rootkit
Lecture 6: Spoof Reporting Message
Chapter 7: Discovery
Lecture 1: Discovery
Lecture 2: Network Connection Enumeration
Lecture 3: Network Sniffing
Lecture 4: Remote System Discovery
Lecture 5: Remote System Information Discovery
Lecture 6: Wireless Sniffing
Chapter 8: Lateral Movement
Lecture 1: Lateral Movement
Lecture 2: Default Credentials
Lecture 3: Exploitation of Remote Services
Lecture 4: Lateral Tool Transfer
Lecture 5: Program Download
Lecture 6: Remote Services
Chapter 9: Collection
Lecture 1: Collection
Lecture 2: Automated Collection
Lecture 3: Data from Information Repositories
Lecture 4: Detect Operating Mode
Lecture 5: I/O Image
Lecture 6: Man in the Middle
Lecture 7: Monitor Process State
Lecture 8: Point & Tag Identification
Lecture 9: Program Upload
Lecture 10: Screen Capture
Lecture 11: Wireless Sniffing
Chapter 10: Command and Control
Lecture 1: Command & Control
Lecture 2: Commonly Used Port
Lecture 3: Connection Proxy
Lecture 4: Standard Application Layer Protocol
Chapter 11: Inhibit Response Function
Lecture 1: Inhibit Response Function
Lecture 2: Activate Firmware Update Mode
Lecture 3: Alarm Suppression
Lecture 4: Block Command Message
Lecture 5: Block Reporting Message
Lecture 6: Block Serial COM
Lecture 7: Data Destruction
Lecture 8: Denial of Service
Lecture 9: Device Restart/Shutdown
Lecture 10: Manipulate I/O Image
Lecture 11: Modify Alarm Settings
Lecture 12: Service Stop
Chapter 12: Impair Process Control
Lecture 1: Impair Process Control
Lecture 2: Brute Force I/O
Lecture 3: Modify Parameter
Lecture 4: Unauthorized Command Message
Chapter 13: Impact
Lecture 1: Impact
Lecture 2: Damage to Property
Lecture 3: Denial of Control
Lecture 4: Denial of View
Instructors
-
Sourabh Suman
8000+ Enrollments | NIST | IEC 62443 | MITRE | GICSP
Rating Distribution
- 1 stars: 3 votes
- 2 stars: 5 votes
- 3 stars: 3 votes
- 4 stars: 28 votes
- 5 stars: 37 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024