FileMood

Download [ DevCourseWeb.com ] Udemy - Industrial SCADA and ITOT from Cyber Security and Zero Trust

DevCourseWeb com Udemy Industrial SCADA and ITOT from Cyber Security and Zero Trust

Name

[ DevCourseWeb.com ] Udemy - Industrial SCADA and ITOT from Cyber Security and Zero Trust

  DOWNLOAD Copy Link

Total Size

696.7 MB

Total Files

58

Last Seen

2025-02-20 00:13

Hash

22176A8269930EAAE91A0D8DFDD4800EBADD9D64

/

Get Bonus Downloads Here.url

0.2 KB

/1. Introduction/

1. Introduction and About me, the trainer.mp4

24.1 MB

1.1 LinkedIn Profile.html

0.1 KB

/.../10. Platform Backup/

1. Platform Backup.mp4

11.9 MB

/.../11. Best Practices/

1. Sandboxing.mp4

9.6 MB

2. Air Gapped Systems.mp4

15.3 MB

2.1 Stuxnet on Wikipedia.html

0.1 KB

3. PKI and Certification Authorities.mp4

4.2 MB

4. Physical Security.mp4

27.1 MB

5. Procedures and Protocols.mp4

5.7 MB

/.../12. Closing Thoughts/

1. This is Just the Beginning.mp4

4.2 MB

/.../2. Introduction on SCADA and why Cyber Security topic is so important/

1. Overview on SCADA and Cyber Security.mp4

27.1 MB

2. Components of SCADA platform.mp4

18.8 MB

3. SCADA vs ITOT.mp4

18.8 MB

4. Standards.mp4

8.8 MB

/.../3. Basic concepts when you plan the design of an ITOT/

1. Basic concepts when you plan the design of an ITOT.mp4

8.5 MB

2. Redundancy.mp4

17.6 MB

3. Single point of failure examples.mp4

7.9 MB

4. How to use maintenance windows for redundant units.mp4

25.7 MB

/.../4. Cyber Security for a SCADA system/

1. CIA Triad.mp4

3.8 MB

2. Zero trust and defense in depth.mp4

8.4 MB

3. Least privilege - using LDAP and Active Directory.mp4

14.7 MB

4. Multi-factor authentication (MFA).mp4

14.0 MB

5. Endpoints.mp4

8.0 MB

6. 802.1x Network Protocol.mp4

17.6 MB

7. Network access control.mp4

6.5 MB

8. Defense-in-depth.mp4

14.8 MB

9. Encryption.mp4

30.0 MB

/.../5. Computer Network Design and Considerations/

1. Network Segmentation.mp4

5.4 MB

10. Remote Devices and Industrial Communication Protocols.mp4

10.1 MB

2. Segmentation Based on Role.mp4

8.3 MB

3. Segmentation Based on Risk.mp4

15.2 MB

4. Computer Network Switches.mp4

16.5 MB

5. Computer Network Firewalls.mp4

7.5 MB

6. IPSIDS.mp4

8.4 MB

7. Encryption.mp4

9.2 MB

8. Remote Access.mp4

22.8 MB

9. VPN and Corporate Access.mp4

10.1 MB

/.../6. Servers and Other Infrastructure/

1. Physical servers.mp4

18.4 MB

2. Cloud servers.mp4

13.8 MB

3. Virtualization layer.mp4

11.9 MB

4. Operating Systems.mp4

5.4 MB

5. Other Infrastructure.mp4

8.3 MB

/.../7. Securing The Platform/

1. Defense In Depth.mp4

20.8 MB

2. Patching.mp4

14.5 MB

3. Fighting Malware.mp4

9.0 MB

4. Out Of Band Connections.mp4

5.9 MB

5. Centralized Management and Control.mp4

7.4 MB

6. Securing Common Network Protocols.mp4

14.6 MB

7. Vulnerability Testing and Assessment.mp4

16.3 MB

/.../8. Logging and monitoring/

1. Monitoring.mp4

22.1 MB

2. Asset Management and Inventory.mp4

8.4 MB

3. Syslog.mp4

13.0 MB

/9. Data Analysis/

1. Mirror Traffic and Network Taps.mp4

14.0 MB

2. NetFLOW and SFLOW.mp4

8.5 MB

3. Decrypting traffic for analysis.mp4

8.6 MB

4. SIEM.mp4

9.1 MB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 58


Copyright © 2025 FileMood.com