Security is often sacrificed for interoperability with legacy systems and default security is often inadequate, so we will show you some easy fixes without the need for 3rd party solutions.
Networks are the life blood of any OT system; you will learn configurations to improve overall security maturity, especially when these are embedded into a design.
Whether a brown or green field site, security can often be improved ... once you know how.
Our approach is to provide you with a 'how to' toolkit, we will then explore these techniques practically within the labs.
Looking through the lens of a penetration tester, we will give you the inside view on how hackers can expose information. You will get an opportunity to practice using open-source tools to search for known vulnerabilities.
What sets this learning experience apart is practical application. We offer a unique opportunity to build your own secure by design system in our lab. This will ensure you leave with a solid understanding of how to put your learning into practice.
(Edinburgh) *On Site Delivery
A unique, specialised and blended learning approach, this course has been written by OT cyber security professionals for OT Engineers. You will benefit from years of experience in securing CNI, penetration testing, security audits, readiness assessments and project delivery.
It's fast paced; collect the nuggets of wisdom as we go!
Designed to meet the needs and experience level of Automation Engineers responsible for managing today’s connected world. The course also provides a good platform for aspiring OT security professionals.
A basic understanding of IT/OT governance, industrial networking, foundational knowledge in Microsoft Windows operating system(s) and awareness of Linux.
Labs are structured to allow those who are self sufficient to proceed at their own pace with optional modules.
SolutionsPT has a flexible approach to training. This course can be delivered at our offices in Cheadle or, if required, on-site at your premises.
Learning Outcome: Understand governance, standards and how this can influence system designs
Learning Outcome: Securing the network and mitigating threats
Learning Outcome: Spotlight into penetration testing. Explore how default/weak configuration can put systems at risk and how to remediate
Learning Outcome: Using built in tools, toolkits and configuration to make Microsoft Windows more secure
Learning Outcome: Practical application of learning throughout the course. Build a small network, securing devices along the way, applying defined security standards and modifying to meet project / business requirements.