VTG (Lab) Bundle

Network Defenses - VTG Ch4 (ICS004)


Description
Lab: 1.5 CPE

Using lessons learned from successfully attacking the power plant, learn how to harden the ICS network with firewalls, monitoring systems, and intrusion detection systems.. After completing this chapter, users will be able to:

• Monitor network flows
• Install and monitor an inline network intrusion detection system
• Investigate DNS exfiltration traffic
• Use Fortiphyd Logic's LogicWatch product to monitor the ICS network
• Write basic network firewall rules

The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

Content
  • LAB ENVIRONMENT
  • Introduction
  • Introduction
  • Key Terms Review
  • Flow Monitoring
  • Flow Monitoring
  • Flow Monitoring Review
  • Network Intrusion Detection
  • Network Intrusion Detection
  • Network IDS Review
  • Intro to Network Monitoring with GRASSMARLIN
  • Intro to GRASSMARLIN
  • GRASSMARLIN Review
  • Network Forensics - DNS Exfiltration
  • Network Forensics - DNS Exfiltration Pt 1
  • DNS Exfiltration Pt 1 Review
  • Network Monitoring with LogicWatch
  • Network Monitoring with LogicWatch
  • Network Monitoring Review
  • Network Firewall Rules
  • Network Firewall Rules
  • Network Firewall Review
  • Chapter 4 Feedback
  • Discussion and Q&A
Completion rules
  • All units must be completed
  • Leads to a certificate with a duration: 3 years