Secure OT Network Architecture
Offered By: Pluralsight
Course Description
Overview
Ever wonder what makes OT networks special and what their unique challenges are? This course will teach you how OT networks should be designed and what key considerations must be made in this process.
This course will teach you the necessary skills to recognize the unique challenges within OT environments and how to take them into account when designing an OT network. In this course, Secure OT Network Architecture, you’ll learn to design OT networks and gain a knowledge of which frameworks could be used to support you during the design process. First, you’ll explore what the ‘OT mindset’ is and how seemingly basic actions within IT networks can have serious implications in OT networks. Next, you’ll discover reference architectures and what zones and conduits you should take into account when designing an OT network. Finally, you’ll learn how to take action if an event happens within an OT network. When you’re finished with this course, you’ll have the skills and knowledge of OT security architectures needed to become an OT design champion!
This course will teach you the necessary skills to recognize the unique challenges within OT environments and how to take them into account when designing an OT network. In this course, Secure OT Network Architecture, you’ll learn to design OT networks and gain a knowledge of which frameworks could be used to support you during the design process. First, you’ll explore what the ‘OT mindset’ is and how seemingly basic actions within IT networks can have serious implications in OT networks. Next, you’ll discover reference architectures and what zones and conduits you should take into account when designing an OT network. Finally, you’ll learn how to take action if an event happens within an OT network. When you’re finished with this course, you’ll have the skills and knowledge of OT security architectures needed to become an OT design champion!
Syllabus
- Course Overview 1min
- The OT Mindset 8mins
- OT Network Anatomy 21mins
- Securing the OT Network 34mins
- Securing OT Assets 13mins
Taught by
Davy Cavens
Related Courses
Edge Computing Business Value - Insights from Three Industry ExpertsCNCF [Cloud Native Computing Foundation] via YouTube A Real World Roadmap for Continuous Cybersecurity Improvement - Amgen's Story
Dragos: ICS Cybersecurity via YouTube Five Critical Controls for Process Manufacturing Cybersecurity
Dragos: ICS Cybersecurity via YouTube OT Cybersecurity for IT Professionals - Understanding ICS Environments
Dragos: ICS Cybersecurity via YouTube 5 Key Questions to Accelerate Your OT Cybersecurity Program
Dragos: ICS Cybersecurity via YouTube