HOME > IT & Software > ICS-OT Cyber Attack Tactics, Techniques Procedures MITRE

ICS-OT Cyber Attack Tactics, Techniques Procedures MITRE

SynopsisICS-OT Cyber Attack Tactics, Techniques & Procedures MITR...
ICS-OT Cyber Attack Tactics, Techniques Procedures MITRE  No.1

ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE, available at $49.99, has an average rating of 3.6, with 97 lectures, based on 76 reviews, and has 519 subscribers.

You will learn about ICS Attack Tactics ICS Attack Techniques MITRE ATT&CK Framework Mitigations for the techniques Major cybersecurity attacks in ICS This course is ideal for individuals who are Control engineers, integrators, and architects who design or implement OT systems or System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems or Managers who are responsible for OT systems or Security consultants who perform security assessments and penetration testing of OT systems or Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program or Researchers and analysts who are trying to understand the unique security needs of OT systems or Vendors that are developing products that will be deployed as part of an OT system It is particularly useful for Control engineers, integrators, and architects who design or implement OT systems or System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems or Managers who are responsible for OT systems or Security consultants who perform security assessments and penetration testing of OT systems or Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program or Researchers and analysts who are trying to understand the unique security needs of OT systems or Vendors that are developing products that will be deployed as part of an OT system.

Enroll now: ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE

Summary

Title: ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE

Price: $49.99

Average Rating: 3.6

Number of Lectures: 97

Number of Published Lectures: 97

Number of Curriculum Items: 97

Number of Published Curriculum Objects: 97

Original Price: $39.99

Quality Status: approved

Status: Live

What You Will Learn

  • ICS Attack Tactics
  • ICS Attack Techniques
  • MITRE ATT&CK Framework
  • Mitigations for the techniques
  • Major cybersecurity attacks in ICS
  • Who Should Attend

  • Control engineers, integrators, and architects who design or implement OT systems
  • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
  • Managers who are responsible for OT systems
  • Security consultants who perform security assessments and penetration testing of OT systems
  • Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
  • Researchers and analysts who are trying to understand the unique security needs of OT systems
  • Vendors that are developing products that will be deployed as part of an OT system
  • Target Audiences

  • Control engineers, integrators, and architects who design or implement OT systems
  • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
  • Managers who are responsible for OT systems
  • Security consultants who perform security assessments and penetration testing of OT systems
  • Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
  • Researchers and analysts who are trying to understand the unique security needs of OT systems
  • Vendors that are developing products that will be deployed as part of an OT system
  •                                                CAUTION: “DO NOT BUY IF YOU DON’T LIKE THEORETICAL COURSE”

    MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

    In this course, you will learn about all the tactics for ICS/OT as per the framework. This is not a practical course, this is solely for learning the concepts. Also, we will learn about all the techniques in detail for each tactic. And for mitigation, there could be the same mitigation to be applied for multiple techniques so we will cover mitigations as a whole. We will cover all the below-mentioned tactics:

    ICS Attack tactics:

    1. Initial Access

    2. Execution

    3. Persistence

    4. Privilege Escalation

    5. Evasion

    6. Discovery

    7. Lateral Movement

    8. Collection

    9. Command and Control

    10. Inhibit Response Function

    11. Impair Process Control

    12. Impact

    After completing this course you will have a good understanding of the techniques to be implemented and executed by adversaries. That will help you to answer clients, customers, and in meetings and discussions. Also whenever you are designing some solution you will keep these in mind and set proper mitigation to make the environment more secure and comprehensive.

    * Connect to me on Linkedin/ or visit cyberotsecure{dot}com website to get discounts.

    For understanding this course you should have a basic understanding of the Industrial control system and technical terms which are commonly used in cybersecurity so that you can understand the concepts. This is a theoretical course but in the future, I will keep on adding practical examples as well.

    * Most affordable course on ICS MITRE

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Tactics

    Chapter 2: Initial Access

    Lecture 1: Initial Access

    Lecture 2: Drive-by Compromise

    Lecture 3: Exploit Public-Facing Application

    Lecture 4: Exploitation of Remote Services

    Lecture 5: External Remote Services

    Lecture 6: Internet Accessible Device

    Lecture 7: Remote Services

    Lecture 8: Replication Through Removable Media

    Lecture 9: Rogue Master

    Lecture 10: Spearphishing Attachment

    Lecture 11: Supply Chain Compromise

    Lecture 12: Transient Cyber Asset

    Lecture 13: Wireless Compromise

    Chapter 3: Execution

    Lecture 1: Execution

    Lecture 2: Change Operating Mode

    Lecture 3: Command-Line Interface

    Lecture 4: Execution through API

    Lecture 5: Graphical User Interface

    Lecture 6: Hooking

    Lecture 7: Modify Controller Tasking

    Lecture 8: Native API

    Lecture 9: Scripting

    Lecture 10: User Execution

    Chapter 4: Persistence

    Lecture 1: Persistence

    Lecture 2: Modify Program

    Lecture 3: Module Firmware

    Lecture 4: Project File Infection

    Lecture 5: System Firmware

    Lecture 6: Valid Accounts

    Chapter 5: Privilege Escalation

    Lecture 1: Privilege Escalation

    Lecture 2: Exploitation for Privilege Escalation

    Lecture 3: Hooking

    Chapter 6: Evasion

    Lecture 1: Evasion

    Lecture 2: Exploitation for Evasion

    Lecture 3: Indicator Removal on Host

    Lecture 4: Masquerading

    Lecture 5: Rootkit

    Lecture 6: Spoof Reporting Message

    Chapter 7: Discovery

    Lecture 1: Discovery

    Lecture 2: Network Connection Enumeration

    Lecture 3: Network Sniffing

    Lecture 4: Remote System Discovery

    Lecture 5: Remote System Information Discovery

    Lecture 6: Wireless Sniffing

    Chapter 8: Lateral Movement

    Lecture 1: Lateral Movement

    Lecture 2: Default Credentials

    Lecture 3: Exploitation of Remote Services

    Lecture 4: Lateral Tool Transfer

    Lecture 5: Program Download

    Lecture 6: Remote Services

    Chapter 9: Collection

    Lecture 1: Collection

    Lecture 2: Automated Collection

    Lecture 3: Data from Information Repositories

    Lecture 4: Detect Operating Mode

    Lecture 5: I/O Image

    Lecture 6: Man in the Middle

    Lecture 7: Monitor Process State

    Lecture 8: Point & Tag Identification

    Lecture 9: Program Upload

    Lecture 10: Screen Capture

    Lecture 11: Wireless Sniffing

    Chapter 10: Command and Control

    Lecture 1: Command & Control

    Lecture 2: Commonly Used Port

    Lecture 3: Connection Proxy

    Lecture 4: Standard Application Layer Protocol

    Chapter 11: Inhibit Response Function

    Lecture 1: Inhibit Response Function

    Lecture 2: Activate Firmware Update Mode

    Lecture 3: Alarm Suppression

    Lecture 4: Block Command Message

    Lecture 5: Block Reporting Message

    Lecture 6: Block Serial COM

    Lecture 7: Data Destruction

    Lecture 8: Denial of Service

    Lecture 9: Device Restart/Shutdown

    Lecture 10: Manipulate I/O Image

    Lecture 11: Modify Alarm Settings

    Lecture 12: Service Stop

    Chapter 12: Impair Process Control

    Lecture 1: Impair Process Control

    Lecture 2: Brute Force I/O

    Lecture 3: Modify Parameter

    Lecture 4: Unauthorized Command Message

    Chapter 13: Impact

    Lecture 1: Impact

    Lecture 2: Damage to Property

    Lecture 3: Denial of Control

    Lecture 4: Denial of View

    Instructors

  • ICS-OT Cyber Attack Tactics, Techniques Procedures MITRE  No.2
    Sourabh Suman
    8000+ Enrollments | NIST | IEC 62443 | MITRE | GICSP
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 5 votes
  • 3 stars: 3 votes
  • 4 stars: 28 votes
  • 5 stars: 37 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!