The course introduces ICS and the major differences to classical IT environments; introduces the major challenges to secure ICS environments; indicates the nature of threats with examples; discusses security architecture for ICS (e.g., based on standards such as IEC 62443); introduce ICS-specific challenges associated with detecting attacks; as an advanced module, could give an introduction to penetration testing for ICS environments.
The course introduces ICS and the major differences to classical IT environments; introduces the major challenges to secure ICS environments; indicates the nature of threats with examples; discusses security architecture for ICS (e.g., based on standards such as IEC 62443); introduce ICS-specific challenges associated with detecting attacks; as an advanced module, could give an introduction to penetration testing for ICS environments.
Vulnerability assessment (using tools such as openVAS and its ICS extensions), re-arrange the architecture of the system to mitigate potential threats, configuring intrusion detection systems and firewall rules that reduce the exposure.
This course is dedicated to people who are familiar with: