Completed
Attacks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The SCADA That Didn't Cry Wolf - Who's Really Attacking Your ICS Devices
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who Am I
- 3 Agenda
- 4 ICS Devices
- 5 Glossary
- 6 Typical ICS Deployment
- 7 Modbus
- 8 DNP
- 9 Big Threats
- 10 ICS vs IT Security
- 11 Pure Numbers
- 12 Internetfacing
- 13 Water Pump
- 14 Control Units
- 15 The Environment
- 16 What does the attacker see
- 17 New Architecture
- 18 Tools
- 19 Vulnerability Overview
- 20 What is an Attack
- 21 Attack Statistics
- 22 NonCritical Attacks
- 23 Critical Attacks
- 24 Automated Attacks
- 25 Attacks
- 26 snort
- 27 Decoy Doc
- 28 Dump Files
- 29 Execution
- 30 APT1 Report
- 31 Contact Information
- 32 Attribution Framework
- 33 Beef
- 34 The Targeted Attack
- 35 Attacker Profile
- 36 Recommendations
- 37 USB Lockdown
- 38 Questions
- 39 Question 1 Modbus