ICS/SCADA Version 1 eBook w/ iLabs + ECC Exam Voucher (w/ Remote Proctoring Service)

ICS/SCADA Version 1 eBook w/ iLabs + ECC Exam Voucher (w/ Remote Proctoring Service)

  • $999.00
    Unit price per 


Important Discount Information:

Extensive discounts are offered through the EC-Council Academia partner program to students and faculty within the network. In result, this item is available at the following rate to qualified students:

$538.00

For more information, please visit www.eccouncil.org/academia. Thank you!

___

THIS PURCHASE INCLUDES AUTOMATIC EXAM ELIGIBILITY AND AN OFFICIAL EC-COUNCIL EXAM VOUCHER!

As an academic student, when purchasing this bundle you completely bypass the standard exam eligibility process. You are no longer required to apply to attempt an EC-Council exam, submit an application, pay an application fee, list references, or prove work experience. This is all waived once you purchase EC-Council's official and authorized content!

 

PLATFORMS

eBook & iLabs:

Exam Voucher w. Remote Proctor:

 

COURSE OUTLINE

Module 1:  Introduction to ICS/SCADA Network Defense

Module 2:  TCP/IP 101

Module 3:  Introduction to Hacking

Module 4:  Vulnerability Management

Module 5:  Standards and Regulations for Cybersecurity

Module 6:  Securing the ICS Network

Module 7:  Bridging the Air Gap

Module 8:  Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)


COURSE DESCRIPTION

Due to the potential impact of an attack on the physical safety of communities, employees or customers, ICS /SCADA security is an even higher priority than for traditional IT systems. Cyber criminals have already developed malware threats such as Triton/TRISIS and Stuxnet that can disrupt industrial Operation Technology (OT). The ICS/SCADA Cyber Security Training Course is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network. Course Description You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set, you will look at the best practices and recommendations when it comes to bridging the air gap. You will learn a systematic process of intrusion and malware analysis. Once you have the process for analysis mastered, you will be introduced to the digital forensic process and how to respond to incidents when a breach is detected