Autoplay
Autocomplete
Previous Lesson
Complete and Continue
6.Performing Penetration Testing On Industrial Control Systems and OT Networks by Jonathan Pollet
Course Details
1.Introduction - About Speaker (0:59)
2.Introduction - About Course, Topics Covered (2:28)
3.Fundamentals 1 (16:19)
4.Fundamentals 2 (12:22)
5.Automation (19:27)
6.Demo (35:02)
7.Analysing Recent Threats, Types Of Threats (34:44)
8.Types of security Testing - ICS Systems, SCADA Lifecycle, Red Team Lifecycle (17:53)
9.How A Hacker Does Business Profiling Of A Target (Shodan, Google Hacking) (18:16)
10.Metadata In The Pen Test (15:38)
11.Radio Technology And Capturing Spectrum Signature (14:04)
12.Requirements To Persist In ICS Environment (10:25)
13.Sniffing, Listening For Host, Tools (21:17)
14.Detection And Entry Point (22:57)
15.Common SCADA Attack surface (17:15)
16.SCADA Static Analysis, Challenges, Analysis Basic (11:33)
17.ICS Environment Entry Points (2:31)
18.Demo (12:52)
19.SCADA Design, LAN vs SCADA (40:20)
20.Summary Of Topics Covered (7:53)
21.Sample high risk gaps from a controls framework assessment (7:10)
Teach online with
14.Detection And Entry Point
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock