Securing Industrial IoT Networks with Cisco Technologies V1.0 (ISECIN)

Image

Securing Industrial IoT Networks with Cisco Technologies V1.0 (ISECIN)

What you’ll learn in this course

The Securing Industrial IoT Networks with Cisco Technologies V1.0 (ISECIN) solves the shortage of security professionals and the additional vulnerabilities with IoT enabled infrastructures. “Securing Industrial IoT Networks with Cisco Technologies” (ISECIN) aims to narrow this talent gap and upskill security professionals to secure and defend critical IoT enabled infrastructures such as utilities, transportation, and smart cities.

How you’ll benefit

This course will help you:

· Secure and defend your network 24×7 in challenging industrial environments where national security, human safety, and high availability can be paramount

· Guide your enterprise through the convergence of Information and Operational Technologies (IT/OT convergence)

· Gain leading-edge career skills for new, high-demand job roles and responsibilities in the emerging field of IIoT

Who should enroll

The main audience for this course is the following: People with positions such as

· Security Engineer

· Security Operations

· Security Analysts

· Systems, Solutions Architects

· System Integrators

· Senior OT Engineers

Course Prerequisites

It is recommended, but not required, to have the following skills and knowledge before attending this course:

· IP Networking Basics: INICS, ICND1 equivalent

· OT Networking Basics: ICINS, IMINS or IMINS2

· Network Security Basics: IINS or CCNA Security equivalent

Course Objectives

After taking this course, you should be able to:

· Understand the convergent enterprise and industrial IoT architecture, components and applications

· Contrast enterprise IT vs. industrial OT security

· Define layered security requirements from the network edge to the core, and from access to applications layer

· Protect endpoints, communications as well as data at rest and in motion

· Compliance to standards and regulations and auditing

· Understand protocols, applications and IPv6 for IIoT

· Identify vulnerabilities and threat

· Familiarize with common implementation issues

· Assess, monitor and detect vulnerabilities

· Walk through IIoT attacks

· Adopt best practices in design principles and process for securing and segmenting IIoT networks

· Application of the converged security model for the broader industry: manufacturing, utilities, transportation, O&G

· Secure and monitor/detect the IIoT framework with next generation security products and tools

Course outline

· Lesson 1: Describing Converged Enterprise and Industrial IoT Networks, Architectures, and Frameworks

· Lesson 2: Describing Industrial IoT Network Security Requirements

· Lesson 3: Describing Protocols Used in Converged Enterprise and Industrial IoT Networks

· Lesson 4: Analyzing IoT Vulnerabilities

· Lesson 5: Exploiting Vulnerabilities in Industrial IoT Networks

· Lesson 6: Describing the Process of Securing Industrial IoT Networks

· Lesson 7: Hardening Devices in Industrial IoT Networks

· Lesson 8: Implementing Network Infrastructure Security in Industrial IoT Networks

· Lesson 9: Describing the Characteristics of Cisco NGFWs in Industrial IoT Networks

· Lesson 10: Securing Communications in in Industrial IoT Networks Using Basic Cisco NGFW and Cisco NGIPS Features

· Lesson 11: Implementing Advanced Security Features on NGFW and NGIPS in Industrial IoT Networks

· Lesson 12: Using the Cisco TrustSec Solution in Industrial IoT Networks

· Lesson 13: Implementing VPN Solutions in Industrial IoT Networks

· Lesson 14: Describing the Industrial IoT Network Framework and Regulations

· Lesson 15: Bonus Content: Describing Physical Security in Industrial IoT Networks

· Lesson 16: Bonus Content: Monitoring Industrial IoT Networks

Lab outline

Discovery 1: Explore an Industrial IoT Network

· FASTLab 1: Explore Industrial IoT Network Components and Identify Their Security Requirements

· Discovery 2: Analyze Layer 2 and Layer 3 Network Protocol Traffic in an Industrial IoT Network

· Discovery 3: Analyze Operations Technology Protocol Traffic

· Discovery 4: Explore Assets and Detect Vulnerabilities in an Industrial IoT Network

· Discovery 5: Insert a Rogue Device

· Discovery 6: Implement an Attack Against OT Assets

· FASTLab 2: Analyze Attacks Against IoT Networks

· FASTLab 3: Classify Assets and Identify Relationships Between Assets in Industrial IoT Network

· Discovery 7: Implement Device Hardening on Industrial Network Devices

· Discovery 8: Explore Network Infrastructure Security Features on Cisco Industrial Ethernet Switches

· Discovery 9: Explore Network Infrastructure Security Features on Cisco Industrial Ethernet Switches 2

· Discovery 10: Implement Cisco NGFWs in Routed Mode and in Transparent Mode in an Industrial IoT Network

· Discovery 11: Implement Access Control for Network Segments

· Discovery 12: Implement a Cisco FirePOWER Module with Basic Settings

· Discovery 13: Implement Advanced Access Control and OT Application Inspection for Network Segments

· Discovery 14: Implement IEEE 802.1X on Industrial Switches

· Discovery 15: Implement SGTs on Industrial Switches

· Discovery 16: Implement a Remote-Access VPN to Manage Industrial IoT Networks

· Discovery 17: Explore Industrial IoT Network Components and Identify the Applicable Security Standards and Regulations

Duration

Instructor-led training: (5) days

Price

To consult

Cisco Learning Credits

To consult

INSTRUCTOR

Image

Lectures
Duration
Skill level
Language
Students
Certificate

CURRICULUM

SECTION 1: INTRODUCTION TO HANDSTANDS

Parents, students and community members are invited to attend this meeting, which discusses educational issues at the high school and its middle and elementary schools. Schools in the Kerrington cluster are: Aldiger, Caramba, Chesterfield, Cutterey, Fraiser, Johnson, Antonio, Lorney Winston, Ramos, and Westford secondary schools

Download pdf Download doc
Share
Apúntate al curso AHORA

Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies.

ACEPTAR
Aviso de cookies