IEC 62443 Standard, and implementation in the industrial control system (ICS). Technical controls, Levels & assessment. | Discount Coupon for Udemy Course
Last updated 10/2022Course Language EnglishCourse Caption English [Auto]Course Length 08:55:30 to be exact 32130 seconds!Number of Lectures 63
This course includes:
9 hours hours of on-demand video
Full lifetime access
Access on mobile and TV
Certificate of completion
58 additional resources
Details of IEC 62443 standard
Authentication and Authorization controls
Cybersecurity Controls for ICS/OT
Controls: DFA, Firewalls, VPN, PKI
Controls: Password, Biometric, Token
Zones, Conduits and Security Levels
Foundational requirements
Log management
High/Low level Risk assessment
Industrial use case for SL1-SL3
Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing, etc., all are now integrated with IT technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is a prime concern now. Most industries are now implementing these measures and mitigating risks.ICS systems comprise SCADA, DCS, PLC, and many more proprietary systems and protocols, designing a cybersecurity solution for these systems need the understanding of both OT-related applications and IT-related controls which can fit into these environments.In this course, we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. Some controls can be implemented, what could be a probable weakness, and what does industry assessment says about those prescribed cybersecurity controls as per 62443-3-3. This course also covers risk assessment based on 62443-3-2 for high-level and detailed risk assessment. Industry uses case for zoning, segmentation is also explained in the course to make it easier to understand.These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for critical infrastructure.Who this course is for:Control engineers, integrators, and architects who design or implement OT systemsSystem administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systemsSecurity consultants who perform security assessments and penetration testing of OT systemsCybersecurity managers who are responsible for OT systemsVendors that are developing products that will be deployed as part of an OT system
Course Content:
Sections are minimized for better readability, click the section title to view the course content
9 Lectures | 45:59
Introduction About Course
02:14
This is about the contents of course and moto behind the course, also what you will learn on the course.
Key IACS Roles
03:33
IEC 62443 Brief Overview
07:47
In this lecture we will learn about IEC 62443, In total, we will understand all segments of IEC 62443
Security Levels (SL0 to SL5)
08:39
In this lecture you will learn about several Security level which will be used in upcoming lectures or in your industry as well.
Levels of Control System (Contextual Model (L0-L4)
06:06
In this module you will learn about the levels of control system as per contextual model of 62443.
Maturity Levels
04:02
In this module we will see what are four maturity levels and how they are different from security levels.
Security Level types: Target, Achieved and Capability
04:43
In this module we will learn about types of security level as per standard.
Zone & Conduits
05:38
In this module we will learn about zones and conduits, which is basic of contextual model or any other as per standard.
Foundational requirements
03:17
In this chapter we will learn about foundational requirements for setting up or maintaining a IACS system
Security Level
1 question
2 Lectures | 16:13
What is in 62443-2-1 ?
07:06
About 62443-2-1, what is there in this requirement nd how to perceive the requirements of this standard?
What is in 62443-2-4?
09:07
About 62443-2-4 and how to understand the requirements, we also a will see the gradual link between some of the standards.
7 Lectures | 01:05:42
FR 1-Identification and Authentication
14:55
FR 2-Use Control
12:05
We will understand use control and its rationale , what is use control and privilege.
FR 3-System Integrity
14:24
FR 4-Data Confidentiality
03:31
FR 5-Restricted Data flow
05:49
We will learn about why network segmentation is required or how can we restrict data.
FR 6-Timely response to events
03:36
What are incidents and how to address this requirement
FR 7-Resource Availability
11:22
Availability is utmost important in industrial control system, that is why it is one of the foundational requirement.
Foundational Requirements
1 question
14 Lectures | 01:08:56
FR 1 - Identification and Authentication Control
02:39
Detailed Use Case Study for FR1
18:30
FR 2 -Use Control
02:57
Detailed Use Case Study for FR2
11:06
FR 3-System Integrity
02:52
Detailed Use Case Study FR-3
08:23
FR 4-Data Confidentiality
01:24
Detailed Use Case Study FR-4
02:06
FR 5-Restricted Data flow
02:40
Detailed Use Case Study FR-5
03:02
FR 6-Timely response to events
02:42
Detailed Use Case Study FR-6
01:25
FR 7-Resource Availability
02:58
Detailed Use Case Study FR-7
06:12
10 Lectures | 01:48:09
Authentication & Authorization Briefing
06:34
In this video you will see and understand the purpose and process of authentication and authorization. Please understand the authorization in brief.
Role Based Access Control
09:18
Password Authentication
16:42
This video will make you understand about the purpose and technical of password authentication in ICS/OT industry.
Challenge/response Authentication
10:23
What is CHAP and how it works? Please see to understand.
Physical Token Authentication
09:21
In this lecture you will learn about Physical token and its usage, strength and weakness of this solution, as per IEC 62443 standards.
Smart Card Authentication
12:47
In this lecture you will learn about Smart card usage in industrial control system and recommendations as per IEC 62443.
Biometric Authentication
11:25
In this lecture you will learn about Biometric usage in industrial control system and recommendations as per IEC 62443.
Location Based Authentication
10:04
In this lecture we will see how location based authentication can be incorporated in the Industrial control system.
Password Distribution & Management
15:45
In this video we will learn about importance of password management, types of password related attacks and types of OTP.
Device to Device Authentication
05:50
In this video we will see what is device to device authentication and how it can be implemented in industrial system.
This is last for authorization and authentication, will continue next modules in next course, please keep on checking for next courses by me.
Authenticator
1 question
3 Lectures | 48:28
Network Firewalls
21:26
In this video you will understand about the types of network firewalls and differences between them. The recommendation and industry assessment of these firewalls.
Host Based Firewalls
14:13
In this video you will understand about the types of host based firewalls. The recommendation and industry assessment of these firewalls.
Virtual Local Area Networks (VLAN)
12:49
In this video you will learn about VLANS and what security benefit it will bring to the infrastructure.
Boundary Protection
2 questions
3 Lectures | 35:53
Virtual Private Networks (VPN)
14:59
In this video you will learn about virtual private networks and types of VPN protocols.
Symmetric Key Encryption
09:58
In this chapter we will learn about symmetric key encryption and how it works and very simplified explanation.
Public Key Encryption
10:56
In this chapter we will learn about public key encryption and how it works and very simplified explanation.
3 Lectures | 37:13
Log Auditing Utilities
14:30
In this chapter we will learn about the log management methods, log collection and what we want to achieve.
Virus and Malicious Code Detection
09:45
In this chapter we will learn about the virus detection system, what make a VDS effective.
Intrusion Detection Systems
12:58
Types of Intrusion detection system and how to implement to get maximum out of it.
7 Lectures | 40:46
How to implement
07:11
In this chapter we will learn about the basic process to start a cybersecurity program in industrial environment, like fist steps i.e how to start.
Flowchart for Risk Assessment
05:32
Basic flowchart of the activities of the high level risk and detailed risk assessments.
ZCR 1: Identification of SuC
02:26
This will explain identification of system under consideration.
ZCR 2: High Level Risk Assessment
02:57
About High level risk assessment of the premises and IACS inventory.
ZCR 3 : Partition of SuC in zones and conduits
12:57
In this chapter we will learn about the type of zones based on the functionalities, communication and other aspects.
ZCR 4: Detailed Risk Assessment
04:18
In this chapter we will learn what to include in the detailed cybersecurity risk assessment.
ZCR 5: Document Cybersecurity requirements, assumptions and constraints
05:25
We will learn about documentation, threat analysis and pitfalls of risk assessment.
5 Lectures | 01:08:11
Security Level 1
19:41
In this chapter we will learn about the cybersecurity requirements and techniques to achieve SL1 in an industrial environment with a illustrative use case architecture.
Security Level 2
11:35
In this chapter we will learn about the cybersecurity requirements and techniques to achieve SL2 in an industrial environment with a illustrative use case architecture.
Security Level 3
11:39
In this chapter we will learn about the cybersecurity requirements and techniques to achieve SL3 in an industrial environment with a illustrative use case architecture.
Use case for Industrial Firewall
19:05
This is a use case of industrial firewall implementation and needs to achieve integrity of firewall to prevent API or Configuration management interface. In this use case, we have checked the required foundational requirements for required security level.
About availability of 62443 Standards
06:11
4.34
(78 course ratings)
1
1/78
2
3/78
3
7/78
4
25/78
5
44/78
JOIN OUR WHATSAPP GROUP TO GET LATEST COUPON AS SOON AS UPDATED
If you like to get inspired by great web projects, you should check out Made with Javascript. If you have a project that you wish to share with the world, feel free to submit your project on Made with Javascript Club website.
Free Online Tools And Converters for your use
URL Encoder
Input a string of text or a URL and encode the entered string
FAQ: Udemy Free course Most frequent questions and answers
Does Udemy offer Free Udemy coupons?
Yes, Udemy is the largest online education platform, with the broadest selection of video-on-demand courses and qualified instructors available to meet your needs. At theprogrammingbuddy.club we curate the latest udemy coupons, their expiry, and the number of uses left of these udemy coupons.
How to get free Udemy courses?
There are two ways to get free Udemy courses:
Go to udemy.com and search for your desired course category. Then select free from the filter options.
You can also get paid courses for free if you have a coupon. You can head to theprogrammingbuddy.club, where you can get a daily udemy paid course for free.
How to get Udemy Certificates for free?
Udemy offers certification on completion of each course. In order to receive a certificate of completion from Udemy, you need to complete your course 100%. There is a simple hack, you can open a video and jump on the timeline to complete a lecture.
To download the certificate from Udemy, you need to head over to your account on a desktop browser. Udemy certificates can't be accessed on the mobile app.
Do Udemy courses expire?
No, once you enroll, you will have lifetime access to the course. You can complete the course on your schedule.
Why are the Udemy instructors giving away free Udemy Coupons?
Every instructor has worked for hours on each of their courses. As new courses get launched, the instructors have no way to get their course in front of an audience to get some feedback. So, instructors share free coupons for their courses to get feedback from the students. We attheprogrammingbuddy.club work with these instructors to get their courses available to our buddies.
Is Udemy safe to use?
Yes, payments on Udemy are safe. It is no different than paying for other services on an application or website and inputting your payment information before receiving your goods. Just be sure to keep your account secure, do not share your udemy accounts.
Can Udemy courses get you a job?
Earning a skill is more valuable than earning a job these days. Skills are your most valuable asset. They can help you qualify for jobs you want and get promoted to more advanced positions within your organization. Unfortunately, it is difficult for many people to balance taking courses with work and family obligations. We have had many students, who have taken just Udemy courses, started a job as well as started freelancing with the skills they have learned.