Adventures in SCADA
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the world of SCADA (Supervisory Control and Data Acquisition) systems in this conference talk from TROOPERS11. Delve into real-world applications, focusing on power companies and their unique challenges. Learn about trust models, verification processes, and the importance of fuzzing in SCADA environments. Discover the concept of "Spike" and its relevance to SCADA security. Gain insights into effective mitigation controls to protect critical infrastructure. Engage with the speakers during the Q&A session to deepen your understanding of SCADA security challenges and solutions.
Syllabus
Intro
SCADA in the Wild
The Power Company
Trust and Verify
Fuzzing
Spike
Mitigation Controls
Questions
Taught by
WEareTROOPERS
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network