Cyber Security Training Series

Number of Videos in Series: 13 Number of Credits that can be earned: 2 Price of Series: $FREE OF CHARGE
  • Cyber Security: Technology Review

    A very fast paced look at many types of hardware and software involved in security efforts, including keyboard sniffers, Ethernet routers, smart phones, and all sorts of common network devices. It...

  • Cyber Security: Common Exposures

    What are the ways that cyber criminals get into industrial networks? How can you find the vulnerabilities in your systems? There are all sorts of entrance strategies that hackers use. Once you...

  • Cyber Security: Understanding OSINT

    Open source intelligence (OSINT) and social engineering are techniques that hackers use to get information about your networks with the intent of finding weaknesses. Some are technical, but others...

  • Cyber Security: Control System Cyber Security

    Why is security important, and what is going on in the defensive arms race? What are the effects of intrusions? Many intrusions are relatively minor, but what is the worst case for your facility if a...

  • Cyber Security: Communications Attack Example

    An actual demonstration of how an attacker can get between a controller and HMI and override information moving both directions. It isn’t as difficult as you might think.

  • Cyber Security: Defense Techniques 1

    What types of security controls you should put in place, from an operational, physical, and cyber standpoint, including concepts of defense-in-depth. Your efforts have to include all these for...

  • Cyber Security: Defense Techniques 2

    How do you protect the range of devices that serve as hosts, everything from terminal units to PLCs? This process begins by identifying all those things on your networks that are cyber assets using...

  • Cyber Security: Defense Techniques 3

    Everything that communicates has to have a communication pathway. How do you identify those and protect them? It can be wired or wireless, and each approach has its own challenges.

  • Cyber Security: Common Cyber Asset Security Controls

    What security controls should you install on your cyber assets, both in your plant or enterprise level? Considers patches, applications, account management, threat indicators, physical access, and...

  • Cyber Security: Specific Control System Cyber Exposures

    What are the cyber security vulnerabilities unique to industrial networking environments? Much industrial equipment is not well hardened against intrusion, so with that in mind, what can we do to...

  • Cyber Security: Validating Vendor Security Awareness

    As you work with equipment vendors, how do you analyze those companies and determine their mindset relative to security? Some companies are better than others, so how can you make that determination?...

  • Cyber Security: Cyber Asset Vulnerability Assessments

    How do you determine where you are on the security spectrum? Without an effective plan, such an evaluation can be painfully difficult and leave you no better off. Some simple guidelines can keep you...

  • Cyber Security: Cyber Security Resources

    Once you’ve finished the series, here are some useful resources that can help keep your ongoing efforts focused and effective.