[ DevCourseWeb.com ] Udemy - Industrial SCADA and ITOT from Cyber Security and Zero Trust
大小
664.44 MB
文件数
58
Info Hash:
22176A8269930EAAE91A0D8DFDD4800EBADD9D64
收录时间
2026-01-10 03:05:40
更新时间
2026-01-10 03:05:40
文件列表 (58)
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. Introduction/1. Introduction and About me, the trainer.mp4
23.02 MB
~Get Your Files Here !/1. Introduction/1.1 LinkedIn Profile.html
116 B
~Get Your Files Here !/10. Platform Backup/1. Platform Backup.mp4
11.32 MB
~Get Your Files Here !/11. Best Practices/1. Sandboxing.mp4
9.18 MB
~Get Your Files Here !/11. Best Practices/2. Air Gapped Systems.mp4
14.58 MB
~Get Your Files Here !/11. Best Practices/2.1 Stuxnet on Wikipedia.html
98 B
~Get Your Files Here !/11. Best Practices/3. PKI and Certification Authorities.mp4
4 MB
~Get Your Files Here !/11. Best Practices/4. Physical Security.mp4
25.81 MB
~Get Your Files Here !/11. Best Practices/5. Procedures and Protocols.mp4
5.42 MB
~Get Your Files Here !/12. Closing Thoughts/1. This is Just the Beginning.mp4
4.01 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/1. Overview on SCADA and Cyber Security.mp4
25.86 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/2. Components of SCADA platform.mp4
17.92 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/3. SCADA vs ITOT.mp4
17.93 MB
~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/4. Standards.mp4
8.38 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/1. Basic concepts when you plan the design of an ITOT.mp4
8.08 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/2. Redundancy.mp4
16.76 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/3. Single point of failure examples.mp4
7.55 MB
~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/4. How to use maintenance windows for redundant units.mp4
24.49 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/1. CIA Triad.mp4
3.62 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/2. Zero trust and defense in depth.mp4
7.99 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/3. Least privilege - using LDAP and Active Directory.mp4
14.06 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/4. Multi-factor authentication (MFA).mp4
13.37 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/5. Endpoints.mp4
7.6 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/6. 802.1x Network Protocol.mp4
16.81 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/7. Network access control.mp4
6.17 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/8. Defense-in-depth.mp4
14.13 MB
~Get Your Files Here !/4. Cyber Security for a SCADA system/9. Encryption.mp4
28.58 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/1. Network Segmentation.mp4
5.17 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/10. Remote Devices and Industrial Communication Protocols.mp4
9.65 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/2. Segmentation Based on Role.mp4
7.92 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/3. Segmentation Based on Risk.mp4
14.51 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/4. Computer Network Switches.mp4
15.72 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/5. Computer Network Firewalls.mp4
7.19 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/6. IPSIDS.mp4
8.05 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/7. Encryption.mp4
8.77 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/8. Remote Access.mp4
21.74 MB
~Get Your Files Here !/5. Computer Network Design and Considerations/9. VPN and Corporate Access.mp4
9.66 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/1. Physical servers.mp4
17.56 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/2. Cloud servers.mp4
13.14 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/3. Virtualization layer.mp4
11.38 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/4. Operating Systems.mp4
5.18 MB
~Get Your Files Here !/6. Servers and Other Infrastructure/5. Other Infrastructure.mp4
7.95 MB
~Get Your Files Here !/7. Securing The Platform/1. Defense In Depth.mp4
19.85 MB
~Get Your Files Here !/7. Securing The Platform/2. Patching.mp4
13.8 MB
~Get Your Files Here !/7. Securing The Platform/3. Fighting Malware.mp4
8.59 MB
~Get Your Files Here !/7. Securing The Platform/4. Out Of Band Connections.mp4
5.67 MB
~Get Your Files Here !/7. Securing The Platform/5. Centralized Management and Control.mp4
7.04 MB
~Get Your Files Here !/7. Securing The Platform/6. Securing Common Network Protocols.mp4
13.93 MB
~Get Your Files Here !/7. Securing The Platform/7. Vulnerability Testing and Assessment.mp4
15.54 MB
~Get Your Files Here !/8. Logging and monitoring/1. Monitoring.mp4
21.1 MB
~Get Your Files Here !/8. Logging and monitoring/2. Asset Management and Inventory.mp4
7.97 MB
~Get Your Files Here !/8. Logging and monitoring/3. Syslog.mp4
12.39 MB
~Get Your Files Here !/9. Data Analysis/1. Mirror Traffic and Network Taps.mp4
13.35 MB
~Get Your Files Here !/9. Data Analysis/2. NetFLOW and SFLOW.mp4
8.07 MB
~Get Your Files Here !/9. Data Analysis/3. Decrypting traffic for analysis.mp4
8.21 MB
~Get Your Files Here !/9. Data Analysis/4. SIEM.mp4
8.67 MB
~Get Your Files Here !/Bonus Resources.txt
386 B