VTG (Lab) Bundle

Industrial IoT - VTG Ch6 (ICS006)


Description

Lab: 1 CPE


The Industrial IoT promises to make ICS more efficient than ever before, but with great technology comes great responsibility to secure it. In this course, exploit and mitigate common IIoT vulnerabilities in a simulated power plant. After completing this chapter you will be able to:


  • Communicate the benefits of deploying IIoT, as well as the added responsibility for securing IIoT
    • Use Shodan to perform basic reconnaissance on Internet facing ICS assets
    • Understand the difference between application layer security and transport layer security
    • Perform basic checks for default and hardcoded passwords in IIoT devices

      The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.
Content
  • LAB ENVIRONMENT
  • IIoT Benefits
  • IIoT Benefits
  • IIoT Benefits Review
  • SHODAN
  • Shodan
  • Shodan Review
  • Application Layer Security
  • Application Layer Security
  • Application Layer Security Review
  • Transport Layer Security
  • Transport Layer Security
  • Transport Layer Security Review
  • Weak Passwords
  • Weak Passwords
  • Weak Passwords Review
  • Firmware Vulnerabilities
  • Firmware Vulnerabilities
  • Firmware Vulnerabilities Review
  • Network Architecture
  • Network Architecture
  • Network Architecture Review
  • Feedback
Completion rules
  • All units must be completed
  • Leads to a certificate with a duration: 3 years