[ WebToolTip.com ] Udemy - NIST SP 800-82 Revision 3 - Guide to Operational Technology
大小
1.81 GB
文件数
169
Info Hash:
8C1B43ACB35E99AD8B6746D8461B13E812814050
收录时间
2026-01-08 10:00:39
更新时间
2026-01-08 10:00:39
文件列表 (169)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction/1 -Trainer's Introduction.mp4
7.17 MB
~Get Your Files Here !/1 - Introduction/2 -Disclaimer.mp4
3.76 MB
~Get Your Files Here !/1 - Introduction/3 -What is NIST.mp4
4.74 MB
~Get Your Files Here !/1 - Introduction/4 -What is NIST SP 800-82 revision 3 and who should use it.mp4
8.35 MB
~Get Your Files Here !/1 - Introduction/5 -NIST SP800-82-r3 sections and course contents.mp4
11.33 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/1 -Operational Technology.mp4
5.43 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/10 -OT System Design Considerations - cont.mp4
6.18 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/11 -SCADA Systems.mp4
22.98 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/12 -SCADA Example.mp4
5.88 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/13 -Communication Topologies for SCADA.mp4
8.84 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/14 -SCADA Implementation Example.mp4
8.15 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/15 -SCADA Implementation for RAIL Monitoring & Controle.mp4
6.02 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/16 -DCS Systems.mp4
20.09 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/17 -DCS Example.mp4
15.24 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/18 -PLC Based Topologies.mp4
16.71 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/19 -PLC Control System Implementation Example.mp4
4.58 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/2 -Overview of OT.mp4
16.65 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/20 -BAS.mp4
7.94 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/21 -BAS Example.mp4
5.05 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/22 -PACS.mp4
12.27 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/23 -PACS Example.mp4
4.97 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/24 -Safety Systems.mp4
18.81 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/25 -Safety Systems Example.mp4
3.81 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/26 -OT vs IT.mp4
9.74 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/27 -IT vs OT cont.mp4
43.1 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/28 -Key Considerations for OT Security.mp4
28.4 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/29 -Industrial IoT and Cyber Security.mp4
4.21 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/3 -OT Evolution.mp4
29.3 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/30 -Rise of IIoT.mp4
1.91 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/31 -IIoT Architecture.mp4
11.4 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/32 -IIoT Applications and benefits.mp4
12.71 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/33 -Cyber threats to IIoT.mp4
8.45 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/34 -IIoT Vulnerabilities.mp4
10.79 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/35 -CSF for IIoT.mp4
7.96 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/36 -Best practices for IIoT Security.mp4
9.1 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/37 -Future of IIoT.mp4
4.95 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/4 -General Guidelines for effective OT Security.mp4
15.76 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/5 -OT Based Systems.mp4
34.45 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/6 -Examples of OT Dependent Sectors.mp4
32.3 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/7 -Examples of OT Dependent Sectors - cont.mp4
3.13 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/8 -Basic Operation of a OT System.mp4
12.8 MB
~Get Your Files Here !/2 - Section 2 - Operational Technology Overview/9 -OT System Design Considerations.mp4
8.6 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/1 -Section 3 - Establish OT Cybersecurity Program.mp4
3.27 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/10 -Define OT Cybersecurity Strategy.mp4
16.8 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/11 -Develop OT Specific Policies and Procedures.mp4
18.28 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/12 -OT Cybersecurity Awareness Training.mp4
14.36 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/13 -Applying RMF for OT.mp4
16.16 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/14 -Establish Maintenance Tracking.mp4
8.95 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/15 -Develop Incident Response Capabilities.mp4
7.99 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/16 -Develop Recovery and Restoration Capabilities.mp4
20.63 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/2 -OT Cyber Security Program Development.mp4
18.67 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/3 -OT Security Program Charter.mp4
12.79 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/4 -OT Incidents Examples and Consequences.mp4
7.42 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/5 -OT Cyber Attacks - Examples.mp4
19.43 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/6 -Business case for OT Cybersecurity.mp4
4.7 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/7 -Business case for OT Cybersecurity - cont.mp4
28.68 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/8 -Establish OT Cybersecurity Governance.mp4
7.68 MB
~Get Your Files Here !/3 - Section 3 - OT Cybersecurity Program Development/9 -Building Cross Functional OT Security Team.mp4
29.76 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/1 -Understanding and Managing Risk in OT Environments.mp4
7.84 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/10 -Responding and Monitoring OT Risks.mp4
13.29 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/11 -Risk Monitoring in OT.mp4
11.5 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/12 -Supply Chain Risk Management for OT Systems.mp4
40.1 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/13 -Securing Safety-Critical OT Components.mp4
21.21 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/14 -Applying the NIST RMF to OT.mp4
9.69 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/15 -Prepare.mp4
5.73 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/16 -Categorize.mp4
4.68 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/17 -Select.mp4
10.92 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/18 -Implement.mp4
4.42 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/19 -Assess.mp4
10.3 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/2 -Evolving Landscape of OT Risk.mp4
9.29 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/20 -Authorize.mp4
5.94 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/21 -Monitor.mp4
11.66 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/3 -Organization Wide Risk Management Framework.mp4
9.6 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/4 -4 Step Risk Management Process.mp4
10.34 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/5 -Framing Risk in OT.mp4
15.28 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/6 -Risk Assessment Methodologies for OT.mp4
15.05 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/7 -Categorizing and Evaluate Risk Impact.mp4
14.47 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/8 -Common OT Vulnerabilities and Threats.mp4
13.63 MB
~Get Your Files Here !/4 - Section 4- Risk Management for OT/9 -Non Digital Risk Management in OT.mp4
15.53 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/1 -OT Cybersecurity Architecture Overview.mp4
11.78 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/10 -Network Architecture.mp4
8.56 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/11 -Layer 4 - Hardware Security.mp4
10 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/12 -Layer 5 - Software Security.mp4
13.61 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/13 -Other Cybersecurity Strategy considerations.mp4
15.4 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/14 -OT Specific Recommendations.mp4
11.54 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/15 -OT Specific Recommendations cont.mp4
27.56 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/16 -Encrypted Network Communications and OT Security Best Practices.mp4
31.28 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/17 -Additional Cybersecurity Architecture Considerations.mp4
4.7 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/18 -Cyber related Safety considerations.mp4
10.8 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/19 -Availability considerations.mp4
11.91 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/2 -Cybersecurity Strategy for OT.mp4
11.53 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/20 -Geographically Distributed Systems.mp4
14.28 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/21 -Regulatory requirements and environmental considerations.mp4
24.83 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/22 -Field IO Security considerations.mp4
14.42 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/23 -Security considerations for IIoT.mp4
15.11 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/24 -IIoT Cybersecurity capability considerations.mp4
12.75 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/25 -Cybersecurity architecture models for OT and IIoT.mp4
11.09 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/26 -DCS based OT Systems - Layered Defense.mp4
6.97 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/27 -DCS Implementation Example.mp4
2.7 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/28 -Example - Defense in depth architecture for DCS.mp4
14.66 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/29 -DCS and PLC Based Systems with IIoT Integration.mp4
14.03 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/3 -Impacts of choosing a Cybersecurity Strategy.mp4
6.98 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/30 -Example - Architecture for DCS with IIoT.mp4
6.49 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/31 -SCADA based OT Environments Geographically Dispersed Security.mp4
14.63 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/32 -SCADA Systems example.mp4
5.42 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/33 -SCADA Security Architecture Example.mp4
12.55 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/4 -Defense-in-Depth Strategy.mp4
5.28 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/5 -Defense-in-Depth Architecture Capabilities.mp4
5.59 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/6 -Overview of Defense-in-Depth.mp4
3.58 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/7 -Layer 1 - Security Management.mp4
8.88 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/8 -Layer 2 - Physical Security.mp4
11.26 MB
~Get Your Files Here !/5 - Section 5 - OT Cyber Security Architecture/9 -Layer 3 - Network Security.mp4
13.11 MB
~Get Your Files Here !/6 - Overview of NIST CSF/1 -NIST CSF 2.0.mp4
6.19 MB
~Get Your Files Here !/6 - Overview of NIST CSF/10 -Key benefits of NIST CSF 2.0.mp4
10.63 MB
~Get Your Files Here !/6 - Overview of NIST CSF/2 -What is NIST CSF 2.0.mp4
4.28 MB
~Get Your Files Here !/6 - Overview of NIST CSF/3 -Goals of the framework.mp4
11.39 MB
~Get Your Files Here !/6 - Overview of NIST CSF/4 -Structure of NIST CSF 2.0.mp4
4.15 MB
~Get Your Files Here !/6 - Overview of NIST CSF/5 -Core Functions.mp4
7.95 MB
~Get Your Files Here !/6 - Overview of NIST CSF/6 -CSF Profiles.mp4
8.72 MB
~Get Your Files Here !/6 - Overview of NIST CSF/7 -Implementation Tiers.mp4
10.92 MB
~Get Your Files Here !/6 - Overview of NIST CSF/8 -Categories Per Function.mp4
7.76 MB
~Get Your Files Here !/6 - Overview of NIST CSF/9 -Practical Implementation.mp4
12.39 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/1 -NIST CSF for OT.mp4
3.34 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/10 -Protect Identity Management and Access Control.mp4
4.94 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/11 -Protect Identity Management and Access Control - cont.mp4
17.14 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/12 -Protect Identity Management and Access Control - cont.mp4
10.15 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/13 -Protect Network Segmentation and Isolation.mp4
9.77 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/14 -Protect Awareness and Training.mp4
7.55 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/15 -Protect Data Security.mp4
9.08 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/16 -Protect Information Protection Processes and Procedures.mp4
14.46 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/17 -Protect Change Management.mp4
7.89 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/18 -Protect Response and Recovery Plans and Testing.mp4
11.79 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/19 -Protect Secure Maintenance.mp4
7.51 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/2 -The 5 core functions.mp4
6.8 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/20 -Protect Protective Technology.mp4
5.78 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/21 -Protective Security Controls.mp4
9.24 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/22 -Protect Wireless Communications.mp4
11.99 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/23 -Protect Remote Access.mp4
12.01 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/24 -Protect Flaw Remediation and Patch Management.mp4
10.07 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/25 -Detect Anomalies and Events.mp4
9.79 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/26 -Detect Continuous Monitoring.mp4
9.48 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/27 -Detect Detection Processes.mp4
9.09 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/28 -Respond Incident Response and Planning.mp4
8.25 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/29 -Respond Communications.mp4
9.99 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/3 -OT vs IT key difference.mp4
4.24 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/30 -Respond Analysis and Mitigation.mp4
8.17 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/31 -Recover Restoration Planning.mp4
16.66 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/32 -Recovery Communications and Improvements.mp4
11.43 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/33 -Key Takeaways.mp4
13.84 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/4 -Identify Asset Management.mp4
16.17 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/5 -Identify Business Environment.mp4
9.81 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/6 -Identify Governance.mp4
8.59 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/7 -Identify Risk Assessment.mp4
5.44 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/8 -Identify Risk Management Strategy.mp4
7.01 MB
~Get Your Files Here !/7 - Section 6 - Applying NIST CSF to OT/9 -Identify Supply Chain Risks.mp4
5.16 MB
~Get Your Files Here !/8 - Case Study/1 -Case Study - ICSOT Security in an Oil and Gas Company using NIST SP 800-82-r3.mp4
7.23 MB
~Get Your Files Here !/8 - Case Study/2 -Current Environment and Key Challenges.mp4
3.84 MB
~Get Your Files Here !/8 - Case Study/3 -Why the Program.mp4
6.07 MB
~Get Your Files Here !/8 - Case Study/4 -Risk Assessment and Threat Modeling.mp4
4.61 MB
~Get Your Files Here !/8 - Case Study/5 -Application of NIST SP 800-82-r3 Guidelines.mp4
8.2 MB
~Get Your Files Here !/8 - Case Study/6 -Execution Challenges vs Mitigations.mp4
4.62 MB
~Get Your Files Here !/8 - Case Study/7 -Outcome.mp4
3.31 MB
~Get Your Files Here !/8 - Case Study/8 -Conclusion and Recommendations.mp4
7.54 MB
~Get Your Files Here !/9 - Resources/1 - NIST CSF 2.0 Excel file.html
52 B
~Get Your Files Here !/9 - Resources/1 - NIST SP 800-82-r3 Guide.html
54 B
~Get Your Files Here !/9 - Resources/1 -NIST.pdf
8.19 MB
~Get Your Files Here !/9 - Resources/1 -csf2.xlsx
128.61 KB
~Get Your Files Here !/Bonus Resources.txt
70 B