After attending this class, participants should have a general understanding of how to identify areas of vulnerability, and have the basics for designing and implementing a secure network architecture.
Classroom Session
The BIG Security Picture
Standards & Organizations
ICS-CERT
NIST – Risk Management and the Security Process
IEC62443 – Perdue Model, Zones, and Conduits
Asset Identification and Vulnerabilities
Tools and Technologies
Education
Increasing Physical Security
Zones, Packet Filtering, and Next Generation Firewalls
Securing Network Hardware
Securing Remote Access
Securing Endpoints
Monitoring Inside and Out
Simple Network Management Protocol
SYSLOG
Security Information and Event Monitoring (SIEM)
Responding to and Recovering from a Cybersecurity Event