Charlie Module

Categories: SCADA Training
Wishlist Share
Share Course
Page Link
Share On Social Media

Course Prerequisite(s)

  • Please note that this course has the following prerequisites which must be completed before it can be accessed
  • scadahack cybersecurity Course Environment

About Course

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled

Course Content

Security Concepts

  • Attack Surface and Model
    05:23
  • Attack Tree
    02:20
  • Information Leakage
    05:27
  • Physical and Cybersecurity
    04:57
  • Planting Hardware and Software
    02:49
  • Hardware Hacking Tool Examples
    06:16
  • Cyber Investigation
    05:04
  • Attack Surface Management
    02:10
  • CISA
    06:15
  • NCCICs ICS-CERT
    04:15
  • MITRE ICS Techniques
    05:50
  • Passwords differences on ICS
    01:59

Cryptography

Enforcement Boundary Devices

Secure ICS Architectures

Defending Unix and Linux

Defending Microsoft Windows

Earn a Completion Certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?

error: Content is protected !!