Показать сообщение отдельно
  #1  
Старый 27.03.2026, 00:45
jitexsubtra jitexsubtra на форуме
Старожил
 
Регистрация: 03.12.2025
Сообщений: 10,818
По умолчанию Hardening Windows & Linux In Ics Environments


Hardening Windows & Linux In Ics Environments
Published 3/2026
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 2h 10m | Size: 2.87 GB
Practical Endpoint Security for OT: Patching, Whitelisting, Backup & Recovery in Industrial Control Systems
What you'll learn
Identify why traditional IT endpoint security fails in ICS/OT environments and adapt your approach accordingly
Apply CIS benchmarks and Group Policy hardening techniques to Windows-based HMIs, engineering workstations, and SCADA servers
Harden Linux and Unix systems used in ICS environments - including SSH lockdown, permission control, and service minimisation
Implement application whitelisting strategies that protect OT endpoints without disrupting operations
Design and execute a risk-based patch management programme with vendor coordination, testing, and compensating controls
Evaluate endpoint protection options - from traditional AV to EDR - against ICS-specific performance and safety constraints
Enforce removable media controls and USB security policies to close one of the most common OT attack vectors
Build robust backup and recovery procedures for PLC programmes, controller configurations, and golden images
Requirements
Basic understanding of IT networking concepts (TCP/IP, DNS, firewalls)
General familiarity with Windows and/or Linux operating systems
Awareness of what industrial control systems (ICS/SCADA) are - no deep OT experience required
No specialist cybersecurity certifications needed - this course builds from foundational principles
Description
This course contains the use of artificial intelligence.
Industrial control systems were never designed to be patched, updated, or hardened the way corporate IT endpoints are. Yet every unpatched HMI, every legacy Windows XP station still running a SCADA application, and every Linux-based historian with default SSH credentials represents a direct pathway to process disruption - or worse, a safety incident.
The gap is clear: IT security frameworks assume regular patching, endpoint detection, and frequent reboots. OT reality demands 24/7 uptime, vendor-locked configurations, and change windows measured in months, not days. Security professionals entering the OT space struggle to adapt their hardening playbooks to environments where a misconfigured Group Policy Object can shut down a compressor station, and a failed antivirus update can lock out a safety system.
This course bridges that gap. You will learn how to harden Windows and Linux endpoints in real ICS environments - not in theory, but through the practical constraints that define operational technology. From CIS benchmark adaptation for OT to risk-based patch management strategies that protect production, every lesson is built around the realities of Level 0-3 systems.
What makes this course different is its focus on the operational consequences of endpoint security decisions. You will understand why application whitelisting succeeds where traditional antivirus fails in OT, how to implement removable media controls without paralysing maintenance workflows, and how to build backup and recovery strategies that protect PLC programmes, not just file servers.
Built by an instructor with over 15 years of hands-on experience delivering major infrastructure projects across pipeline, gas compression, and process safety environments - with deep expertise in IEC 62443, functional safety, and real-world ICS architecture.
By the end of this course, you will have a practical, defensible approach to endpoint hardening that works within the constraints of industrial operations - not against them.
Enrol now and start protecting the endpoints that keep critical infrastructure running.
Who this course is for
OT engineers and technicians responsible for maintaining ICS endpoints in production environments
IT security professionals transitioning into ICS/OT cybersecurity roles
Blue team and SOC analysts extending their coverage to industrial networks
Control system integrators and vendors who need to harden systems before handover
Plant managers and operations leads who need to understand endpoint risk in their facilities
Anyone preparing for GICSP, ISA/IEC 62443, or similar ICS cybersecurity certifications


Ответить с цитированием