Specialized Attacks: OT and ICS
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.
Attacks against Industrial Control Systems (ICS) can cause manufacturing downtime, disrupt electricity generation or water supplies, and stop public services such as transport and telecommunication systems. In this course, Specialized Attacks: OT and ICS, you’ll learn to identify vulnerable systems, exploit inherent weaknesses, and perform actions that could disrupt operational technologies. First, you’ll explore how to identify internet facing operational technology, including control systems. Next, you’ll discover how to analyze the communications between industrial control systems. Finally, you’ll learn how to interact with those systems to perform unintended operations and disrupt operations. When you’re finished with this course, you’ll understand how to assess ICS environments, identify weaknesses and describe the potential consequences of an attack. This will enable you to make the case for continued investment in cyber security and reduce the likelihood of operational downtime.
Attacks against Industrial Control Systems (ICS) can cause manufacturing downtime, disrupt electricity generation or water supplies, and stop public services such as transport and telecommunication systems. In this course, Specialized Attacks: OT and ICS, you’ll learn to identify vulnerable systems, exploit inherent weaknesses, and perform actions that could disrupt operational technologies. First, you’ll explore how to identify internet facing operational technology, including control systems. Next, you’ll discover how to analyze the communications between industrial control systems. Finally, you’ll learn how to interact with those systems to perform unintended operations and disrupt operations. When you’re finished with this course, you’ll understand how to assess ICS environments, identify weaknesses and describe the potential consequences of an attack. This will enable you to make the case for continued investment in cyber security and reduce the likelihood of operational downtime.
Syllabus
- Course Overview 1min
- Exploring ICS and OT Attacks 39mins
- Exploiting the Modbus Protocol 31mins
Taught by
Matthew Lloyd Davies
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru CompTIA PenTest+ Certification
A Cloud Guru CompTIA Security+ Certification Prep
A Cloud Guru Advanced Cyber Security Training
EC-Council via FutureLearn Advanced Python Scripting for Cybersecurity
Infosec via Coursera