What Will I Learn?

  • Understand the operational technology cybersecurity principles and domains

  • Get familiar with cyber security OT attacks examples

  • Recognize network, system, and data threats and vulnerabilities

  • Create strategies for securing networks, systems, and data

  • Define CIA vs. AIC and OT components

  • Monitor, detect and respond to security incidents

  • Implement best practices to safeguard operational technology systems

Course Details

  • Language

    Course is delivered in Arabic language with English presentations

  • Course Level

    Intermediate level - Fair knowledge of IT security concepts

  • Duration

    Estimated 3.5 hours to complete course

  • Course Nature

    The course consists of 35 videos. More to be added.

  • Course Availability

    The course will be available for 90 days from enrollment date

  • Certificate of Completion

    Shareable certificate of completion

Course Curriculum

    1. Agenda

      FREE PREVIEW
    2. Definition

    3. IT Cyber Security Domains

    4. OT Cyber Security Domains - Introduction - Part 1

    5. OT Cyber Security Domains - Introduction - Part 2

    1. Case #1 - Nuclear Program

    2. Case #2 - The Colonial Pipeline

    3. Case #3 - Florida Water Treatment Facility

    4. Case #4 - German Steel Mill

    5. Case #5 - Power Grid

    6. Case #6 - The Bowman Avenue Dam

    1. CIA vs. AIC - The Difference Between IT and OT Cyber Security

    2. OT Components Definitions

    3. OT Components and SCADA Architecture

    1. IT-OT Convergence - Part 1

    2. IT-OT Convergence - Part 2

    3. IT-OT Convergence - Part 3

    1. Digital Transformation and Enterprise Cyber Security Alignment

    2. Security Threats: Encryption, Applications, Systems and Proprietary Protocol

    3. OT Security Threats: Standards, Regulations, ICS Device Security and Network

    1. Domains Summary

    2. Network Design: Traditional Architecture

    3. Typical Industrial Network Architecture

    4. Network Designs - Recommendations

    5. Proprietary Protocols - Part 1

    6. Proprietary Protocols - Part 2

About this course

  • $500.00
  • 35 lessons
  • 3.5 hours of video content

What others have said about this course

Requirements and Prerequisites

  • Internet Speed

    Since the course is based on multiple videos, a reasonable Internet speed is required to allow for continuous viewing

  • Laptop or Mobile

    Course can be viewed from either a laptop or a mobile.

  • IT Concepts

    Adequate understanding of IT security concepts since the course is considered Intermediate Level