Adventures in SCADA
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the world of SCADA (Supervisory Control and Data Acquisition) systems in this conference talk from TROOPERS11. Delve into real-world applications, focusing on power companies and their unique challenges. Learn about trust models, verification processes, and the importance of fuzzing in SCADA environments. Discover the concept of "Spike" and its relevance to SCADA security. Gain insights into effective mitigation controls to protect critical infrastructure. Engage with the speakers during the Q&A session to deepen your understanding of SCADA security challenges and solutions.
Syllabus
Intro
SCADA in the Wild
The Power Company
Trust and Verify
Fuzzing
Spike
Mitigation Controls
Questions
Taught by
WEareTROOPERS
Related Courses
Advanced White Hat Hacking & Penetration Testing TutorialUdemy Practical Buffer Overflows for OSCP
Udemy Buffer Overflows Made Easy
Cyber Mentor via YouTube Burp Suite
David Bombal via YouTube Buffer Overflows Made Easy - 2022 Edition
Cyber Mentor via YouTube