Adventures in SCADA
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the world of SCADA (Supervisory Control and Data Acquisition) systems in this conference talk from TROOPERS11. Delve into real-world applications, focusing on power companies and their unique challenges. Learn about trust models, verification processes, and the importance of fuzzing in SCADA environments. Discover the concept of "Spike" and its relevance to SCADA security. Gain insights into effective mitigation controls to protect critical infrastructure. Engage with the speakers during the Q&A session to deepen your understanding of SCADA security challenges and solutions.
Syllabus
Intro
SCADA in the Wild
The Power Company
Trust and Verify
Fuzzing
Spike
Mitigation Controls
Questions
Taught by
WEareTROOPERS
Related Courses
Advanced IPv6 Attacks Using Chiron TrainingWEareTROOPERS via YouTube Advanced IPv6 Network Reconnaissance
WEareTROOPERS via YouTube An Unknown SAP Default Account
WEareTROOPERS via YouTube Anonymization IPv6 in PCAPs - Challenges and Wins
WEareTROOPERS via YouTube Attacking Nextgen Firewalls
WEareTROOPERS via YouTube