OPERATING SYSTEMSOS Linux

Getting Started in ICS/OT Cyber Security – 20+ Hours – Part 6

In Part 6, we cover the third critical step in securing our ICS/OT networks – Threat and Vulnerability Management!

In this section, we will cover main topics including, but not limited to:

– What is Threat & Vulnerability Management?
– Introduction to Risk in Control System Networks
– IT Vulnerability Management Process
– OT Vulnerability Management Process
– Operational Risks of Vulnerability Scanning
– Passively & Actively Identifying Vulnerabilities
– Patching ICS/OT Systems
– What is Threat Intel?
– Building a Threat Intelligence Program

If you like the content, please consider Liking the video and subscribing!

Thank you for checking it out!

source

by Mike Holcomb

linux foundation

One thought on “Getting Started in ICS/OT Cyber Security – 20+ Hours – Part 6

Comments are closed.