17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Industrial SCADA And ITOT From Cyber Security And Zero Trust
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Overview about making SCADA and ITOT more secure for Cyber Security threats using Zero Trust techniues
What you'll learn
Learn concepts for building a secure SCADA from Cybersecurity point of view
Define Zero Trust objective and implementation
Detail on how to secure the network to overcome risks that nobody wants in SCADA and ITOT
Examples and practices will help achieve world wide standard of security and compliance
Requirements
This is designed for at least basic skilled understanding of network, operating systems, cyber security concepts
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Introduction and About me, the trainer.mp4
23 MB
~Get Your Files Here !/1. Introduction/1.1 LinkedIn Profile.html
116 B
~Get Your Files Here !/10. Platform Backup/1. Platform Backup.mp4
11.3 MB
~Get Your Files Here !/11. Best Practices/1. Sandboxing.mp4
9.2 MB
~Get Your Files Here !/11. Best Practices/2. Air Gapped Systems.mp4
14.6 MB
~Get Your Files Here !/11. Best Practices/2.1 Stuxnet on Wikipedia.html
98 B
~Get Your Files Here !/11. Best Practices/3. PKI and Certification Authorities.mp4
4 MB
~Get Your Files Here !/11. Best Practices/4. Physical Security.mp4
25.8 MB
~Get Your Files Here !/11. Best Practices/5. Procedures and Protocols.mp4
5.4 MB
~Get Your Files Here !/12. Closing Thoughts/1. This is Just the Beginning.mp4
4 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/1. Overview on SCADA and Cyber Security.mp4
25.9 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/2. Components of SCADA platform.mp4
17.9 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/3. SCADA vs ITOT.mp4
17.9 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/4. Standards.mp4
8.4 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/1. Basic concepts when you plan the design of an ITOT.mp4
8.1 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/2. Redundancy.mp4
16.8 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/3. Single point of failure examples.mp4
7.6 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/4. How to use maintenance windows for redundant units.mp4
24.5 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/1. CIA Triad.mp4
3.6 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/2. Zero trust and defense in depth.mp4
8 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/3. Least privilege - using LDAP and Active Directory.mp4
14.1 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/4. Multi-factor authentication (MFA).mp4
13.4 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/5. Endpoints.mp4
7.6 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/6. 802.1x Network Protocol.mp4
16.8 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/7. Network access control.mp4
6.2 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/8. Defense-in-depth.mp4
14.1 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/9. Encryption.mp4
28.6 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/1. Network Segmentation.mp4
5.2 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/10. Remote Devices and Industrial Communication Protocols.mp4
9.7 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/2. Segmentation Based on Role.mp4
7.9 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/3. Segmentation Based on Risk.mp4
14.5 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/4. Computer Network Switches.mp4
15.7 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/5. Computer Network Firewalls.mp4
7.2 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/6. IPSIDS.mp4
8.1 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/7. Encryption.mp4
8.8 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/8. Remote Access.mp4
21.7 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/9. VPN and Corporate Access.mp4
9.7 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/1. Physical servers.mp4
17.6 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/2. Cloud servers.mp4
13.1 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/3. Virtualization layer.mp4
11.4 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/4. Operating Systems.mp4
5.2 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/5. Other Infrastructure.mp4
8 MB
~Get Your Files Here !/7. Securing The Platform/1. Defense In Depth.mp4
19.9 MB
~Get Your Files Here !/7. Securing The Platform/2. Patching.mp4
13.8 MB
~Get Your Files Here !/7. Securing The Platform/3. Fighting Malware.mp4
8.6 MB
~Get Your Files Here !/7. Securing The Platform/4. Out Of Band Connections.mp4
5.7 MB
~Get Your Files Here !/7. Securing The Platform/5. Centralized Management and Control.mp4
7 MB
~Get Your Files Here !/7. Securing The Platform/6. Securing Common Network Protocols.mp4
13.9 MB
~Get Your Files Here !/7. Securing The Platform/7. Vulnerability Testing and Assessment.mp4
15.5 MB
~Get Your Files Here !/8. Logging and monitoring/1. Monitoring.mp4
21.1 MB
~Get Your Files Here !/8. Logging and monitoring/2. Asset Management and Inventory.mp4
8 MB
~Get Your Files Here !/8. Logging and monitoring/3. Syslog.mp4
12.4 MB
~Get Your Files Here !/9. Data Analysis/1. Mirror Traffic and Network Taps.mp4
13.4 MB
~Get Your Files Here !/9. Data Analysis/2. NetFLOW and SFLOW.mp4
8.1 MB
~Get Your Files Here !/9. Data Analysis/3. Decrypting traffic for analysis.mp4
8.2 MB
~Get Your Files Here !/9. Data Analysis/4. SIEM.mp4