Home
:
Book details
:
Book description
Description of
ICS/SCADA/OT Protocol Traffic Analysis IEC 608705104
SCADA and OT environments.SCADA or OT environments, but not essential. A strong hunger to enhance your Critical Infrastructure Cybersecurity, monitoring, and defense skills. Description Who this course is for This course is for someone who has a strong hunger to learn and improve their network traffic analysis and Cybersecurity skills. This course is for someone who has a strong hunger to enhance their Critical Infrastructure Cybersecurity, monitoring, and defense skills. This course is for someone who wants to learn about the threats to ICSOT Protocol Network Traffic Analysis Series: IEC 60870-5-104 What you'll learn Gain an understanding of the IEC 60870-5-104 Protocol. Learn about the background of this protocol, and how it's used in Electric Power Grid Operations & SCADA. Learn about the cyber threats to IEC 60870-5-104. Learn about real world events and malware that specifically targets IEC 60870-5-104 protocol. Use Wireshark to analyze network packet capture files containing IEC 60870-5-104 communications. How to use Snort Intrusion Detection and Security Onion Virtual Machine to test IEC 60870-5-104 Snort signatures. How to create a custom IEC 60870-5-104 Snort signature. How to analyze IEC 60870-5-104 Protocol Network Traffic. Requirements A strong hunger to learn and improve your network traffic analysis and Cybersecurity skills. Basic network traffic analysis skills, but not essential. Basic Snort Intrusion Detection skills, but not essential. Basic Security Onion Virtual Machine skills, but not essential. Basic Linux Operating System skills, but not essential. Basic understanding of ICSSCADA2023 Created by Ed Galarza MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 8 Lectures ( 46m ) | Size: 461 MB ICSPublished 7