CEH v11: Operational Technology Concepts, Attack Tools & Countermeasures
Ethical Hacker v11 | Intermediate
- 2 videos | 45m 41s
- Includes Assessment
- Earns a Badge
To be effective at both defending and attacking Operational Technology (OT) systems, you must first be aware of the basic components and concepts that OT systems are made of. In this course, you'll explore OT systems and their base components, as well as systems such as Industrial Control System, Supervisory Control and Data Acquisition, programmable logic controllers, and Intelligent Electronic Devices. You'll also learn about the common security challenges facing OT systems. Finally, you'll examine common OT-related attacks, tools, and defensive countermeasures. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe some of the operational and security challenges of Operational Technologyidentify the common components and interfaces for Operational Technology systemsdescribe the components of Operational Technology systemsdescribe the base components of Operational Technology systems
identify common OT tools that can be used to attack an OT networkdescribe common OT vulnerabilitiesdescribe OT related attacksdescribe common OT tools and how they work
IN THIS COURSE
22m 18sUpon completion of this video, you will be able to describe some of the operational and security challenges of operational technology. FREE ACCESS
23m 23sUpon completion of this video, you will be able to describe common vulnerabilities in OT systems. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.