Description
Lab access included*
The Industrial IoT promises to make ICS more efficient than ever before, but with great technology comes great responsibility to secure it. In this course, exploit and mitigate common IIoT vulnerabilities in a simulated power plant. After completing this chapter you will be able to:
Communicate the benefits of deploying IIoT, as well as the added responsibility for securing IIoT
Use Shodan to perform basic reconnaissance on Internet facing ICS assets
Understand the difference between application layer security and transport layer security
Perform basic checks for default and hardcoded passwords in IIoT devices
1 CPE
The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.
*Professional users get 60 days of lab access with purchase of bundle or 7 days per individual course, starting during the next available time slot. Academic user pricing and duration of lab access dependent on agreement with school.
read more