×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified OT Security Professional (COSP)
Welcome
Introduction to the Certified OT Security Professional (COSP) training series
Module 01: Introduction to OT/ICS
Lesson 1: Introduction to Industrial Control Systems (4:01)
Knowledge Check - Introduction to Industrial Control Systems
Lesson 2: The Vital Role of ICS in CIP (6:26)
Knowledge Check - The Vital Role of ICS in CIP
Lesson 3: Understanding ICS Components and Their Roles (7:05)
Knowledge Check -Understanding ICS Components and Their Roles
Lesson 4: The Fundamentals of ICS Architecture (8:38)
Knowledge Check - The Fundamentals of ICS Architecture
Lesson 5: Purdue Enterprise Reference Architecture (PERA) (9:34)
Knowledge Check - Purdue Enterprise Reference Architecture (PERA)
Lesson 6: ICS Architecture with Security in Mind (13:24)
Knowledge Check - ICS Architecture with Security in Mind
Lesson 7: IT vs OT vs ICS (10:14)
Knowledge Check - IT vs OT vs ICS
Lesson 8: IT/OT Convergence (7:20)
Knowledge Check - IT/OT Convergence
Lesson 9: IT vs ICS/OT Security (13:24)
Knowledge Check - IT vs ICS/OT Security
Module 02: OT/ICS Attack Surface
Lesson 1: Overview of the Attack Surface in ICS/OT system (6:12)
Lesson 2: The Importance of Attack Surface Management (15:11)
Lesson 3: Components of the ICS/OT Attack Surface (7:50)
Lesson 4: Difference between IT and OT Attack Surfaces (12:45)
Lesson 5: Expanding Attack Surface in ICS/OT Systems: Factors and Considerations (17:22)
Lesson 6: Impact of a Compromised Attack Surface in ICS/OT Systems (13:17)
Lesson 7: Securing Attack Surface with 6 Key Factors (13:48)
Module 03: OT/ICS Protocols & Networking
Lesson 1: Understanding the OSI Model: A Guide to ICS Networking (10:08)
Lesson 1.1 Additional Content
Lesson 2: Key Network Protocols in ICS: The Driving Force of Industrial Automation (9:38)
Lesson 3: Deep Dive into Modbus (10:01)
Lesson 3.1 Additional Content
Lesson 4: Deep Dive into DNP3 (8:16)
Lesson 4.1 Additional Content
Lesson 5: Deep Dive into Ethernet/IP (5:18)
Lesson 5.1 Additional Content
Lesson 6: Other ICS Protocols
Module 04: Risk Management in OT/ICS
Lesson 1: Introduction to OT/ICS Risk Management (7:37)
Lesson 1.1 : Additional Content
Lesson 2: Cyber Risk Assessment (11:40)
Lesson 2.1 : Additional Content
Lesson 3: Threat Evaluation (8:56)
Lesson 3.1 : Additional Content
Lesson 4: Impact Determination (8:07)
Lesson 4.1 : Additional Content
Lesson 5: Risk Analysis (6:02)
Lesson 5.1 : Additional Content
Lesson 6: Developing a Comprehensive OT/ICS Risk Management Plan (9:23)
Lesson 7: Risks Monitoring and Communication (9:06)
Lesson 7.1: Additional Content
Module 05: Security Architecture for ICS/OT
Lesson 1: Introduction to ICS Cybersecurity Frameworks and Standards (9:45)
Lesson 2: Key ICS Cybersecurity Standards
Lesson 3: Deep Dive into ISA/IEC 62443
Lesson 4: Deep Dive into NIST SP 800-82 Standard (2:56)
Lesson 5: Deep Dive into NIST CSF Framework (7:19)
Lesson 6: Deep Dive into NERC CIP Framework (5:14)
Module 6 Securing Wireless and Remote Access
Lesson 1: Introduction to Wireless and Remote Access Security
Lesson 2: Remote Access (8:33)
Lesson 2: Additional Content
Lesson 3: Securing Wireless Networks
Lesson 4: Securing Wireless and Remote Access for OT/ICS Systems (8:12)
Module 7 Summary
Comprehensive Security Strategy for OT/ICS (10:24)
Knowledge Check - IT vs OT vs ICS
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock