Completed
Threats
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
OT Cybersecurity for IT Professionals - Understanding ICS Environments
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 OT vs IT
- 3 Challenges
- 4 Downsides
- 5 OT Security Triangle
- 6 What is OT
- 7 OT Attributes
- 8 OT Requirements
- 9 Security Controls
- 10 Risk
- 11 Threats
- 12 Crown Jewel Analysis
- 13 Crown Jewel Analysis Methodology
- 14 Refinery Example
- 15 How do we start
- 16 Instant Response Plan
- 17 Architecture
- 18 Network Monitoring
- 19 Vulnerability Management
- 20 Remote Access
- 21 Working Together
- 22 Continuous Process
- 23 OT Cybersecurity
- 24 QA