Adventures in SCADA
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the world of SCADA (Supervisory Control and Data Acquisition) systems in this conference talk from TROOPERS11. Delve into real-world applications, focusing on power companies and their unique challenges. Learn about trust models, verification processes, and the importance of fuzzing in SCADA environments. Discover the concept of "Spike" and its relevance to SCADA security. Gain insights into effective mitigation controls to protect critical infrastructure. Engage with the speakers during the Q&A session to deepen your understanding of SCADA security challenges and solutions.
Syllabus
Intro
SCADA in the Wild
The Power Company
Trust and Verify
Fuzzing
Spike
Mitigation Controls
Questions
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube