![]() |
Hardening Windows & Linux In Ics Environments
![]() Hardening Windows & Linux In Ics Environments Published 3/2026 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch Language: English | Duration: 2h 10m | Size: 2.87 GB What you'll learn Identify why traditional IT endpoint security fails in ICS/OT environments and adapt your approach accordingly Apply CIS benchmarks and Group Policy hardening techniques to Windows-based HMIs, engineering workstations, and SCADA servers Harden Linux and Unix systems used in ICS environments - including SSH lockdown, permission control, and service minimisation Implement application whitelisting strategies that protect OT endpoints without disrupting operations Design and execute a risk-based patch management programme with vendor coordination, testing, and compensating controls Evaluate endpoint protection options - from traditional AV to EDR - against ICS-specific performance and safety constraints Enforce removable media controls and USB security policies to close one of the most common OT attack vectors Build robust backup and recovery procedures for PLC programmes, controller configurations, and golden images Requirements Basic understanding of IT networking concepts (TCP/IP, DNS, firewalls) General familiarity with Windows and/or Linux operating systems Awareness of what industrial control systems (ICS/SCADA) are - no deep OT experience required No specialist cybersecurity certifications needed - this course builds from foundational principles Description This course contains the use of artificial intelligence. Industrial control systems were never designed to be patched, updated, or hardened the way corporate IT endpoints are. Yet every unpatched HMI, every legacy Windows XP station still running a SCADA application, and every Linux-based historian with default SSH credentials represents a direct pathway to process disruption - or worse, a safety incident. The gap is clear: IT security frameworks assume regular patching, endpoint detection, and frequent reboots. OT reality demands 24/7 uptime, vendor-locked configurations, and change windows measured in months, not days. Security professionals entering the OT space struggle to adapt their hardening playbooks to environments where a misconfigured Group Policy Object can shut down a compressor station, and a failed antivirus update can lock out a safety system. This course bridges that gap. You will learn how to harden Windows and Linux endpoints in real ICS environments - not in theory, but through the practical constraints that define operational technology. From CIS benchmark adaptation for OT to risk-based patch management strategies that protect production, every lesson is built around the realities of Level 0-3 systems. What makes this course different is its focus on the operational consequences of endpoint security decisions. You will understand why application whitelisting succeeds where traditional antivirus fails in OT, how to implement removable media controls without paralysing maintenance workflows, and how to build backup and recovery strategies that protect PLC programmes, not just file servers. Built by an instructor with over 15 years of hands-on experience delivering major infrastructure projects across pipeline, gas compression, and process safety environments - with deep expertise in IEC 62443, functional safety, and real-world ICS architecture. By the end of this course, you will have a practical, defensible approach to endpoint hardening that works within the constraints of industrial operations - not against them. Enrol now and start protecting the endpoints that keep critical infrastructure running. Who this course is for OT engineers and technicians responsible for maintaining ICS endpoints in production environments IT security professionals transitioning into ICS/OT cybersecurity roles Blue team and SOC analysts extending their coverage to industrial networks Control system integrators and vendors who need to harden systems before handover Plant managers and operations leads who need to understand endpoint risk in their facilities Anyone preparing for GICSP, ISA/IEC 62443, or similar ICS cybersecurity certifications Цитата:
|
| Часовой пояс GMT +3, время: 15:14. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
Перевод: zCarot