Industrial ICS/OT Cybersecurity A to Z as per NIST 800-82

Industrial ICS/OT Cybersecurity A to Z as per NIST 800-82

Industrial ICS/OT Cybersecurity A to Z as per NIST 800-82

Best ICS/OT Cyber Security course on this platform! Gain a strong foundation in Cyber Security based on NIST guidelines.

Language: english

Note: 4.4/5 (8 notes) 342 students

Instructor(s): Sourabh Suman

Last update: 2022-08-30

What you’ll learn

  • About NIST 800-82
  • NIST 800-82 complete explanation
  • OT security risk management .
  • Guidance on applying the Cybersecurity Framework to OT systems
  • Applying the Risk Management Framework to OT systems
  • Defense in Depth Architecture
  • OT Security capabilities and tools
  • Development and deployment of an OT cybersecurity program



  • Basic Industrial Software Knowledge Like DCS/SCADA/PLC/RTU etc
  • No programming knowledge required
  • Basic understanding of ICS/OT environment
  • No prior experience required
  • Architecture awareness of OT systems



Industrial cybersecurity based on the NIST guidelines. OT is critical to the operation of critical infrastructures, which are often highly interconnected, mutually dependent systems. It is important to note that while federal agencies operate many of the nation’s critical infrastructures, many others are privately owned and operated.

This course is created after thoroughly understanding and practically implementing in the OT environment, so this 6-hour course is summarised version of the NIST 800-82 standard. It will help to understand what it contains and how it should be understood. So, following are the basic topics which we will cover in this course:


2. About Cybersecurity program development

3. Risk Management for OT systems

4. OT Cybersecurity Architecture

5. Cybersecurity Framework

6. OT Security capabilities and tools

After finishing this course, you will have following understanding:

1. Good grasp of NIST 800-82 Standard

2. What technologies are required for securing a OT infrastructure.

3. What is cybersecurity framework

4. What to do to achieve defense in depth architecture

5. Why cybersecurity program is required and how to set up

6. Feel confident about referring standards in professional discussions

7. Will help in cracking interviews

This course provides guidance for establishing secure operational technology (OT) while addressing OT’s unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical environment (or manage devices that interact with the physical environment). These systems and devices detect or cause a direct change through monitoring and/or control of devices, processes, and events.


Who this course is for

  • Control engineers, integrators, and architects who design or implement OT systems
  • System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
  • Security consultants who perform security assessments and penetration testing of OT systems
  • Managers who are responsible for OT systems
  • Senior management who need to better understand risk for OT systems as they justify and apply an OT cybersecurity program
  • Researchers and analysts who are trying to understand the unique security needs of OT systems
  • Vendors that are developing products that will be deployed as part of an OT system


Course content

  • Introduction
    • Introduction
  • OT Overview
    • OT Based system and their interdependencies
    • SCADA Systems
    • Distributed Control Systems
    • Programmable Logic Controller Based Topologies
    • Building Automation Systems
    • Physical Access Control Systems
    • Safety Systems
    • Industrial Internet of Things
  • OT Cybersecurity Program Development
    • OT Cybersecurity Program
    • Establish Charter for OT Cybersecurity program
    • Benefits of OT Cybersecurity Program
    • OT Cybersecurity Program Content
  • Risk Management for OT Systems
    • Managing OT Security Risk
    • Framing OT Risk
    • Assessing Risk
    • Responding to Risk
    • Monitoring Risk
    • Applying Risk Management Framework
    • Prepare
    • Categorize
    • Select
    • Implement
    • Assess
    • Authorize
    • Monitor
  • OT Cybersecurity Architecture
    • Defense in Depth Architecture
    • Layer-1 Security Management
    • Layer-2 Physical Security
    • Layer-3 Network Security
    • Network Architecture
    • Centralized Logging
    • Network Monitoring
    • Zero trust architecture
    • Layer-4 Hardware Security
    • Layer-5 Software Security
    • Additional Considerations
    • Distributed Control System (DCS)-Based OT Systems
    • DCS/PLC-Based OT with IIoT
    • SCADA-Based OT Environments
  • Applying the Cybersecurity Framework to OT
    • Identify
    • Asset Management (ID.AM)
    • Governance (ID.GV)
    • Risk Assessment (ID.RA)
    • Risk Management strategy (ID.RM)
    • Supply Chain Risk Management (ID.SC)
    • Protect
    • Identity Management and Access Control (PR.AC)
    • Logical Access Controls (PR.AC)
    • Physical Access Controls (PR.AC-2)
    • Network Segmentation and Isolation (PR.AC-5)
    • User, Device, and Asset Authentication (PR.AC-7
    • Awareness and Training (PR.AT)
    • Data Security (PR.DS)
    • Information Protection Processes and Procedures (PR.IP)
    • Least Functionality (PR.IP1)
    • Configuration Change Control (Configuration Management) (PR.IP-3)
    • Backups (PR.IP-4)
    • Physical Operating Environment (PR.IP-5)
    • Response and Recovery Plans (PR.IP-9) and Response and Recovery Plan Testing
    • Maintenance (PR.MA)
    • Protective Technology (PR.PT)
    • Detect
    • Anomalies and Events (DE.AE)
    • Security Continuous Monitoring (DE.CM)
    • Network Monitoring (DE.CM-1
    • System Use Monitoring (DE.CM-1 and DE-CM-3)
    • Malicious Code Detection (DE.CM-4)
    • Vulnerability Scanning (DE.CM-8)
    • Detection Process (DE.DP)
    • Respond
    • Response Planning (RS.RP)
    • Response Communications (RS.CO)
    • Response Analysis (RS.AN)
    • Response Mitigation (RS.MI)
    • Response Improvements (RS.IM)
    • Recover
    • Recovery Planning/Improvements/Communication
  • OT Security Capabilities and Tools
    • Segmentation-Firewall
    • Segmentation-Unidirectional Gateways
    • Segmentation-VLAN
    • Segmentation-Software Defined Networking
    • Network Monitoring/SIEM-BAD/DLP
    • Network Monitoring/SIEM-Deception & Digital Twin
    • Data Security- Immutable storage/Hashing
    • Data Security-Digital Signatures/Remote Access
  • Summary & Conclusion
    • What we learnt?


Industrial ICS/OT Cybersecurity A to Z as per NIST 800-82Industrial ICS/OT Cybersecurity A to Z as per NIST 800-82

Time remaining or 731 enrolls left


Don’t miss any coupons by joining our Telegram group 

Udemy Coupon Code 100% off | Udemy Free Course | Udemy offer | Course with certificate