Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

ICS - SCADA Network Security Monitoring in Difficult Scenarios

Security Onion via YouTube

Overview

Explore advanced network security monitoring techniques for Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments in challenging scenarios. Delve into a comprehensive 38-minute conference talk from the Security Onion Conference 2016, presented by Robert M. Lee and Jon Lavender. Gain insights into common applications, the Purdue Model, and the reality of air-gapped systems. Examine the sliding scale of cybersecurity, midpoint sensors, and ICS-specific network security monitoring approaches. Analyze the Cyber Kill Chain and its ICS counterpart, with a focus on power grid vulnerabilities, remote control access, and safety systems. Investigate real-world case studies, including remote sites and Nordic wind farms, and learn from the Dragonfly attack. Enhance your understanding of ICS/SCADA security challenges and develop strategies to protect critical infrastructure against evolving cyber threats.

Syllabus

Intro
Overview
Common Apps
Purdue Model
Air Gap
The Reality
Sliding Scale of Cybersecurity
Midpoint Sensors
Example
ICS NSM
The Cyber Kill Chain
The ICS Kill Chain
Power Grid
Monitoring Impacts
Remote Control Access
Safety Systems
Case Study
Remote Sites
Nordic Wind Farm
Dragonfly
Recap

Taught by

Security Onion

Reviews

Start your review of ICS - SCADA Network Security Monitoring in Difficult Scenarios

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.