ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE

Simplified understanding of adversary tactics and techniques based MITRE Framework for ICS, all techniques explained.

4.30 (70 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE
487
students
5.5 hours
content
Nov 2023
last update
$49.99
regular price

What you will learn

ICS Attack Tactics

ICS Attack Techniques

MITRE ATT&CK Framework

Mitigations for the techniques

Major cybersecurity attacks in ICS

Why take this course?

                                               CAUTION: "DO NOT BUY IF YOU DON'T LIKE THEORETICAL COURSE"

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.


In this course, you will learn about all the tactics for ICS/OT as per the framework. This is not a practical course, this is solely for learning the concepts. Also, we will learn about all the techniques in detail for each tactic. And for mitigation, there could be the same mitigation to be applied for multiple techniques so we will cover mitigations as a whole. We will cover all the below-mentioned tactics:


ICS Attack tactics:

  1. Initial Access

  2. Execution

  3. Persistence

  4. Privilege Escalation

  5. Evasion

  6. Discovery

  7. Lateral Movement

  8. Collection

  9. Command and Control

  10. Inhibit Response Function

  11. Impair Process Control

  12. Impact

After completing this course you will have a good understanding of the techniques to be implemented and executed by adversaries. That will help you to answer clients, customers, and in meetings and discussions. Also whenever you are designing some solution you will keep these in mind and set proper mitigation to make the environment more secure and comprehensive.

* Connect to me on Linkedin/ or visit cyberotsecure{dot}com website to get discounts.

For understanding this course you should have a basic understanding of the Industrial control system and technical terms which are commonly used in cybersecurity so that you can understand the concepts. This is a theoretical course but in the future, I will keep on adding practical examples as well.

* Most affordable course on ICS MITRE


Screenshots

ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Screenshot_01ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Screenshot_02ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Screenshot_03ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Screenshot_04

Reviews

Mohammed
November 19, 2022
Recommended to do this , easy way to learn, on portla it is tough to read,but with this course it easy to understand.
Jenine
November 13, 2022
Going good, to learn these things it takes time and course is helping. I recommend go through the course twice or thrice.

Charts

Price

ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Price chart

Rating

ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Ratings chart

Enrollment distribution

ICS-OT Cyber Attack Tactics, Techniques & Procedures MITRE - Distribution chart
4808446
udemy ID
7/31/2022
course created date
9/29/2022
course indexed date
Bot
course submited by