Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js PHP HTML5 Vue JS
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA Microsoft AZ-900 CompTIA Security+
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Data Analysis
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Blender
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin Mobile App Development SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Sound Therapy Meditation Emotional Intelligence
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Leadership
Digital Marketing Social Media Marketing Marketing Strategy Google Analytics Internet Marketing Email Marketing Copywriting YouTube Marketing Startup
2022-06-19T12:07:56Z

IT & SoftwareOther IT & SoftwareCyber Security

Industrial Cybersecurity Controls as per IEC62443

Types of Authorization/Authentication and Firewalls for industrial control system based on 62443 guidelines.
New
Rating: 4.5 out of 54.5 (5 ratings)
28 students
Created by Sourabh Suman
Last updated 6/2022
English
English [Auto]

What you'll learn

  • Industrial Cybersecurity Details as per 62443
  • Authentication and Authorization for ICS/OT
  • IEC 62443 Understanding
  • Understanding and Application in Industry
  • Cybersecurity controls for Oil& Gas, Power industry, Manufacturing etc.
  • Cybersecurity controls related to A&A
  • Dual factor Authentication
  • Smartcards
  • Password Management
  • Biometric Authentication
  • Physical Token Authentication
  • Firewalls : Host & Network

Requirements

  • Basic Industrial Software Knowledge Like DCS/SCADA/PLC/RTU etc
  • No programming knowledge required
  • Basic understanding of ICS/OT environment
  • No prior experience required

Description

Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing etc., all are now integrated with It technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is prime concern now. Most of the industries are now implementing these measures and mitigating risks.

ICS systems comprises of SCADA, DCS, PLC and many more proprietary systems and protocols, designing a cybersecurity solution for these system needs understanding of both OT related applications and IT related controls which can fit into these environments.

In this course we will learn about authorization and authentication controls which can be implemented in the ICS environment. What are the controls and how that can be implemented, what could be probable weakness and what does industry assessment says about those prescribed cybersecurity controls.

At the end of course learner will have understanding of the type of cybersecurity controls for authentication and authorization in the Industrial environment, like dual factor authentications, smart cards etc. These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for the critical infrastructure.

Who this course is for:

  • Control engineers, integrators, and architects who design or implement OT systems
  • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
  • Security consultants who perform security assessments and penetration testing of OT systems
  • Cybersecurity managers who are responsible for OT systems
  • Vendors that are developing products that will be deployed as part of an OT system

Instructor

Sourabh Suman
Industrial Cybersecurity Consultant
Sourabh Suman
  • 4.5 Instructor Rating
  • 5 Reviews
  • 28 Students
  • 1 Course

I have over 10 years of experience in OT/ICS and ICS cybersecurity with companies like Schneider Electric, Siemens and other. I have implemented large projects in cybersecurity for Industrial Control Systems system so I can correlate the standards better due to hand-on experience. Lets join hands to understand ICS cybersecurity and safeguard these critical infrastructures.

ICS systems comprises of SCADA, DCS, PLC and many more proprietary systems and protocols, designing a cybersecurity solution for these system needs understanding of both OT related applications and IT related controls which can fit into these environments.

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.