CompTIA CASP+: Industrial Computing Environments

CompTIA    |    Intermediate
  • 8 videos | 39m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 59 users Rating 4.5 of 59 users (59)
Industrial control systems present a unique security risk when it comes to public services such as power, water, and other industrial processes. In this course, you'll learn how to recognize common industrial network protocols and terminology. Next, you'll learn how Supervisory Control and Data Acquisition relates to industrial control systems. You'll explore NIST ICS security control documentation. Lastly, you'll learn how to configure an S7 PLC emulator and use Metasploit to stop the device. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize security risks associated with industrial computing environments
    Identify common ics protocols
    Recognize how supervisory control and data acquisition (scada) relates to industrial control systems (ics)
  • Apply nist ics security controls
    Compile and start an s7 plc emulator in linux
    Attack an s7 plc emulator using metasploit
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 37s
    Meet your instructor and explore common industrial network protocols and terminology. You’ll learn how Supervisory Control and Data Acquisition, or SCADA, relates to Industrial Control Systems, or ICS. Next, you'll explore NIST ICS security control documentation. Finally, you’ll configure an S7 PLC emulator and use metasploit to stop the device. FREE ACCESS
  • 6m 32s
    Explore security and industrial computing. An industrial control system, or ICS, uses specialized computing devices to deliver a service or manufacture a product. This is driven by a PLC, a programmable logic controller, which is an industry-specific, specialized computer. ICS also use a remote terminal unit (RTU). Review security measures such as air-gapping and multi-factor authentication. FREE ACCESS
  • Locked
    3.  Industrial Control System Protocols
    4m 9s
    Learn about industrial control system protocols, or ICS. These systems use very specific software protocols, including Modbus, Profinet, or the S7 Communication protocol to allow communication between industrial devices. You’ll also explore the Common Industrial Protocol, or CIP. Finally, take a look at the importance of cybersecurity and knowing vulnerabilities. FREE ACCESS
  • Locked
    4.  Supervisory Control and Data Acquisition
    5m 50s
    Explore Supervisory Control and Data Acquisition, often referred to as SCADA. It’s a collection of Industrial Control Systems devices, along with protocols like Modbus, Profinet, or DNP3. It’s all about communication between these devices and collecting that data for monitoring purposes. You will also learn how it relates to DCS, SIS, PLCs, and touch on security. FREE ACCESS
  • Locked
    5.  Applying NIST SP 800-82: Guide to ICS Security
    5m 9s
    Review the National Institute of Standards and Technology, NIST, document SP 800-82: Guide to ICS Security. This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. FREE ACCESS
  • Locked
    6.  Installing and Starting an S7 PLC Emulator in Linux
    5m 47s
    Learn to install and start an S7 PLC Emulator in Linux. A PLC, or a programmable logic controller, comes in many forms. The S7 protocol for Siemens PLCs enables the connection of S7 automation devices without any communication partner. The S7 PLC can make a connection to control many different types of industrial devices because PLCs have multiple connection inputs. FREE ACCESS
  • Locked
    7.  Using Metasploit to Remotely Stop a Siemens S7 PLC
    9m 30s
    Learn to use Metasploit to remotely stop a Siemens S7 PLC. You’ll see a Siemens S7 server PLC emulator onscreen. You’ll exploit this remotely over the network from another Linux host. Essentially, you’ll use Kali Linux with Metasploit to stop the PLC emulator. FREE ACCESS
  • Locked
    8.  Course Summary
    1m 13s
    Review what you’ve learned in this course. You learned to recognize common industrial control systems, or ICS, terms and protocols, how to harden ICS environments, and how to install and start an S7 PLC in Linux. You explored security and industrial computing, and Supervisory Control and Data Acquisition, or SCADA. You also examined NIST Special Publication 800-82. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 87 users Rating 4.5 of 87 users (87)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 25 users Rating 4.3 of 25 users (25)
Rating 4.5 of 64 users Rating 4.5 of 64 users (64)
Rating 4.5 of 66 users Rating 4.5 of 66 users (66)