Loading

Cybersecurity Fundamentals in an OT Environment

分享:

EmailEmail
PrintPrint
  • 课程编号: CYB101-EL
  • 类型: e-Learning
  • 技术: Network and Cybersecurity Courses
  • 类别: Understand
  • 持续时间: 5小时
E-Learning Course Catalog

Course Purpose

This course will cover operational technology (OT) cybersecurity terms, modern operation technologies that exist today, the history of OT, and integration between the Information Technology (IT) and OT in modern organizations.

​This course is suitable for those who are IT cybersecurity professionals, IT technicians, OT professionals, and more technological employee who often hear about cyber attacks on operational technology.


Prerequisites

There are no prerequisites.

Who Should Attend

OT professionals and technicians who need to understand the impact of cybersecurity on their systems should attend this course.

Objectives

  • Introduction to Cybersecurity in the OT Environment
  • Identify the OT Infrastructure Role in Cybersecurity
  • Explain OT Topologies and the Purdue Model
  • Identify Communication Protocols Used in the OT Environment 
  • Identify Cybersecurity Threats in the OT Environment
  • Identify IT and OT Cybersecurity Differences
  • Explain OT Cybersecurity Best Practices
  • Describe OT Cybersecurity Standards and Regulations
  • Identify OT Cybersecurity Stakeholders
  • Explain and Manage Cybersecurity Supply Chain Risks

Ready to talk to a Training Enrollment Specialist?

How to Buy

To purchase training products or to learn more about our training solutions, please contact your local sales office or distributor.

How to Get Support

Need help with course selection, workstation options or more?
Please contact training services.

background texture grey gradient
  1. Chevron LeftChevron Left Rockwell Automation 主页 Chevron RightChevron Right
  2. Chevron LeftChevron Left 支持 Chevron RightChevron Right
  3. Chevron LeftChevron Left 员工发展培训服务 Chevron RightChevron Right
  4. Chevron LeftChevron Left Learning+ 订阅式在线学习课程 Chevron RightChevron Right
  5. Chevron LeftChevron Left Cybersecurity Fundamentals in an OT Environment Chevron RightChevron Right
请更新您的Cookies偏好以继续.
此功能需要Cookies来增强您的体验。请更新您的系统偏好以允许使用这些Cookies:
  • 社交媒体Cookies
  • 功能Cookies
  • 性能 Cookies
  • 市场营销Cookies
  • 所有Cookies
您可以随时更新您的系统偏好。如需了解更多信息,请参阅我们的 {0} 隐私政策
CloseClose