Lab: 1 CPE
The Industrial IoT promises to make ICS more efficient than ever before, but with great technology comes great responsibility to secure it. In this course, exploit and mitigate common IIoT vulnerabilities in a simulated power plant. After completing this chapter you will be able to:
Communicate the benefits of deploying IIoT, as well as the added responsibility for securing IIoT
- Use Shodan to perform basic reconnaissance on Internet facing ICS assets
- Understand the difference between application layer security and transport layer security
- Perform basic checks for default and hardcoded passwords in IIoT devices
The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.