YoVDO

Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity

Offered By: Dragos: ICS Cybersecurity via YouTube

Tags

Cybersecurity Courses Industrial Control Systems Courses Threat Detection Courses Network Monitoring Courses Vulnerability Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an OT-native approach to network monitoring and cybersecurity in this 43-minute session presented by Nick Shaw, Principal Advisory Solution Architect at Dragos: ICS Cybersecurity. Dive into seven key principles for effective OT cyber-network visibility and monitoring, tailored specifically for Industrial Control Systems (ICS) and Operational Technology (OT) environments. Learn how to implement a "Do No Harm" strategy that ensures 100% uptime while maintaining comprehensive asset inventories across all Purdue Model levels. Discover methods for gaining deep insights through detailed OT system traffic monitoring, and explore practical vulnerability management techniques when patching isn't feasible. Understand the importance of OT-focused threat detection that goes beyond anomalies by leveraging OT Cyber Threat Intelligence. Explore ways to drive operational value through insightful root cause analysis and seamlessly integrate OT monitoring into existing IT security operations. Gain valuable knowledge on protecting critical infrastructure while preserving operational integrity in the face of increasingly sophisticated threats to OT environments.

Syllabus

Do No Harm: OT-Native Approach for Network Monitoring and Cybersecurity


Taught by

Dragos: ICS Cybersecurity

Related Courses

Data Plane Programming
Karlstad University via Independent
Cyber Security Operations (Cisco CCNA)
The Open University via FutureLearn
The Complete Cyber Security Course : Network Security!
Udemy
Hacking Academy: How to Monitor & Intercept Transmitted Data
Udemy
Networking in Google Cloud: Hybrid Connectivity and Network Management
Pluralsight