Description
Upon completing this course, you will be able to meet these overall objectives:
- Understand the convergent enterprise and industrial IoT architecture, components and applications
- Contrast enterprise IT vs. industrial OT security
- Define layered security requirements from the network edge to the core, and from access to applications layer
- Protect endpoints, communications as well as data at rest and in motion
- Compliance to standards and regulations and auditing
- Understand protocols, applications and IPv6 for IIoT
- Identify vulnerabilities and threat
- Familiarize with common implementation issues
- Assess, monitor and detect vulnerabilities
- Walk through IIoT attacks
- Adopt best practices in design principles and process for securing and segmenting IIoT networks
- Application of the converged security model for the broader industry: manufacturing, utilities, transportation, O&G
- Secure and monitor/detect the IIoT framework with next generation security products and tools
Reviews
There are no reviews yet.