Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

ICS SCADA Threat Hunting

via YouTube

Overview

This course aims to teach learners about threat hunting in Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments. By the end of the course, students will be able to understand the concept of threat hunting, assess cybersecurity maturity levels, generate hypotheses based on threat intelligence and situational awareness, and apply these skills to ICS environments. The course covers case studies such as the BTC Pipeline Attack and provides sample hypotheses for practical application. The teaching method involves lectures, case studies, and interactive discussions. This course is intended for cybersecurity professionals, threat hunters, ICS/SCADA security analysts, and individuals interested in enhancing their skills in threat hunting within critical infrastructure environments.

Syllabus

Introduction
Jon Lavender
Threat Hunting
What is Threat Hunting
Sliding Scale of Cybersecurity
How to Get Started
Hunting Maturity
Threat Hunting Jawbreaker
How do we start
Generating hypotheses
Threat Intelligence Inspire Hypothesis
Situational Awareness Inspire Hypothesis
Demesne Expertise
ICS
Whats Wrong
Fake Case Studies
BTC Pipeline Attack
Cyberkill Chains
Case Study Ukraine
Case Study UK
Case Study Norway
Case Study Naval Ship
Sample Hypothesis
Recap
Giveaway

Reviews

Start your review of ICS SCADA Threat Hunting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.