OT/ICS-SOC/SIEM Design and Implementation on Microsoft Azure
17
November
2022Published 11/2022Created by Sourabh SumanMP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English | Duration: 41 lectures (4h 46m) | Size: 3.42 GB
Design SIEM/SOC for ICS Environment
Working on Azure for deploying ICS machines and SOC lab
Complete end to end log integration and visualization
IDS/IPS Solution deployment and visualization
Basic Industrial Software Knowledge Windows Server, Workstation
Prior experience in ICS required
Understands SIEM Solution
Intent for learning is much required
After three theoretical courses, I introduce you to one of the full practical courses for OT/ICS SIEM/SOC solution creation.
This course is totally practical, in all chapters we are installing, configuring, or deploying something on machines located in azure infrastructure, and it's simple, I promise.We will cover some key concepts of ICS Cybersecurity from end-to-end deployment which are as follows:Security information and event management (SIEM): Elasticsearch-Logstash-Kibana (ELK Stack)SIEM Dashboarding/ Query: KibanaNOC- Network Monitoring/ Operations Dashboarding: GrafanaEDR/HIDS - Endpoint Detection and Response/ Host Intrusion Detection: WazuhLog Management: Beats/Sysmon (Log collector for Windows Event logs and more)Asset Management: OSQuery - FleetDMEndpoint Visibility: Sysmon Malware Detection: Strelka Firewall: pfsense (Firewall)IPS-Intrusion Prevention System: Snort Based Nmap for network-based queriesVulnerability Management: Using NessusActive Directory- Windows ServerWSUS-Windows Server Update ServicesModbus CommunicationDNP3 communicationOPC Server-Client CommunicationAnd this is a dynamic list, and with keeps on updating and increasing to increase coverage.The environment is deployed on Azure with the cheapest region and minimum resource requirements. All the steps are guided and well explained so that you can follow and create your own ICS SOC easily. after doing this course you will have a good understanding of cybersecurity technologies that are in use in the ICS landscape as well as in the overall industrial control system environment. You can run all types of tests and simulate this environment, you can also install applications from your organization to test in a similar mode.
Control eeers, integrators, and architects who design or implement OT systems
System administrators, eeers, and other information technology (IT) professionals who administer, patch, or secure OT systems
Security consultants who perform security assessments and penetration testing of OT systems
Researchers and analysts who are trying to have hands-on experience
Eeers who need practical understanding of systems
Vendors that are developing products that will be deployed as part of an OT system
HomePage:
https://anonymz.com/https://www.udemy.com/course/ics-soc-siem/
DOWNLOAD
1dl.net
https://1dl.net/xzfsedt9qcur/f6dY8Os6__OTICSSOCSI.part1.rar.html
https://1dl.net/81gh72qqm1mm/f6dY8Os6__OTICSSOCSI.part2.rar.html
https://1dl.net/mfgpfkf3a4rr/f6dY8Os6__OTICSSOCSI.part3.rar.html
https://1dl.net/7v56xl70snbk/f6dY8Os6__OTICSSOCSI.part4.rar.html
rapidgator.net
https://rapidgator.net/file/7eb4b455451670a613a18ef97378f9de/f6dY8Os6__OTICSSOCSI.part1.rar.html
https://rapidgator.net/file/02d725a5d7c89c5f16e006aed189d924/f6dY8Os6__OTICSSOCSI.part2.rar.html
https://rapidgator.net/file/3b96ff826bcd4c2289c07f087988718e/f6dY8Os6__OTICSSOCSI.part3.rar.html
https://rapidgator.net/file/8f065812ee8480c5c4ecae511468c5a6/f6dY8Os6__OTICSSOCSI.part4.rar.html
Note:
Only Registed user can add comment, view hidden links and more, please register now
Only Registed user can add comment, view hidden links and more, please register now