VTG (Lab) Bundle

Network Defenses - VTG Ch4 (ICS004)


Description

Lab: 1.5 CPE


Using lessons learned from successfully attacking the power plant, learn how to harden the ICS network with firewalls, monitoring systems, and intrusion detection systems.. After completing this chapter, users will be able to:


• Monitor network flows

• Install and monitor an inline network intrusion detection system

• Investigate DNS exfiltration traffic

• Use Fortiphyd Logic's LogicWatch product to monitor the ICS network

• Write basic network firewall rules


The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

Content
  • LAB ENVIRONMENT
  • Introduction
  • Introduction
  • Key Terms Review
  • Flow Monitoring
  • Flow Monitoring
  • Flow Monitoring Review
  • Network Intrusion Detection
  • Network Intrusion Detection
  • Network IDS Review
  • Intro to Network Monitoring with GRASSMARLIN
  • Intro to GRASSMARLIN
  • Intro to Network Monitoring Review
  • Network Forensics - DNS Exfiltration
  • Network Forensics - DNS Exfiltration Pt 1
  • Network Forensics Review
  • Network Monitoring with LogicWatch
  • Network Monitoring with LogicWatch
  • Network Monitoring with LogicWatch Review
  • Network Firewall Rules
  • Network Firewall Rules
  • Network Firewall Review
  • Chapter 4 Feedback
  • Feedback
Completion rules
  • All units must be completed
  • Leads to a certificate with a duration: 3 years