This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
6.Performing Penetration Testing On Industrial Control Systems and OT Networks by Jonathan Pollet
Course Details
1.Introduction - About Speaker (0:59)
2.Introduction - About Course, Topics Covered (2:28)
3.Fundamentals 1 (16:19)
4.Fundamentals 2 (12:22)
5.Automation (19:27)
6.Demo (35:02)
7.Analysing Recent Threats, Types Of Threats (34:44)
8.Types of security Testing - ICS Systems, SCADA Lifecycle, Red Team Lifecycle (17:53)
9.How A Hacker Does Business Profiling Of A Target (Shodan, Google Hacking) (18:16)
10.Metadata In The Pen Test (15:38)
11.Radio Technology And Capturing Spectrum Signature (14:04)
12.Requirements To Persist In ICS Environment (10:25)
13.Sniffing, Listening For Host, Tools (21:17)
14.Detection And Entry Point (22:57)
15.Common SCADA Attack surface (17:15)
16.SCADA Static Analysis, Challenges, Analysis Basic (11:33)
17.ICS Environment Entry Points (2:31)
18.Demo (12:52)
19.SCADA Design, LAN vs SCADA (40:20)
20.Summary Of Topics Covered (7:53)
21.Sample high risk gaps from a controls framework assessment (7:10)
3.Fundamentals 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock