Course outline

Sale!

Securing Industrial IoT Networks with Cisco Technologies (ISECIN) v1.0

Course Code: ISECIN Topics: ,

US$1,500.00 US$1,230.00

13 Learning Credits

This course provides the foundation you need to succeed with the industrial IoT. You will learn how to lead and secure high-visibility IIoT enabled infrastructure projects, and gain critical insight into IoT-enabled industries such as manufacturing, energy, oil and gas, utilities, and process control.

Share it:

FacebookTwitterGoogle PlusLinkedinEmail

Access Duration: 365 Days

Grace Period: 30 Days

Share it:

FacebookTwitterGoogle PlusLinkedinEmail

What you’ll learn in this course

The Securing Industrial IoT Networks with Cisco Technologies (ISECIN) v1.0 course provides the foundation you need to succeed with the industrial IoT. You will learn how to lead and secure high-visibility IIoT enabled infrastructure projects, and gain critical insight into IoT-enabled industries such as manufacturing, energy, oil and gas, utilities, and process control. You will also learn about IIoT architectures as well as their security requirements, frameworks, and regulations. In addition, you study security protocols, vulnerabilities, and how to protect your network from those vulnerabilities.

The IIoT offers tremendous opportunity for innovation and productivity, but in an increasingly complex world, IIoT devices cannot protect themselves. When industrial networks converge with enterprise networks, and the volume of connected devices grows every day, security professionals must understand the characteristics and security exposures of critical IIoT-enabled infrastructures.

Course duration

  • Instructor-led training: 5 days in the classroom with hands-on lab practice
  • Virtual instructor-led training: Not available
  • E-learning: Equivalent of 5 days of instruction with hands-on lab practice

How you’ll benefit

This course will help you:

  • Secure and defend your network 24×7 in challenging industrial environments where national security, human safety, and high availability can be paramount
  • Guide your enterprise through the convergence of Information and Operational Technologies (IT/OT Convergence)
  • Gain leading edge career skills for new, high demand job roles and responsibilities in the emerging field of IIoT

Who should enroll

IT and senior OT professionals currently responsible for network or OT security who are expanding their roles into IIoT initiatives.

IT Job Roles
  • Security engineer
  • Security operations
  • Security analyst
  • Systems and solution architects
  • Systems integrators
  • Senior OT engineers
OT Job Roles
  • Plant security professionals
  • Security operations

Technology areas

  • IoT
  • Security

Objectives

After taking this course, you should be able to:

  • Understand convergent enterprise and industrial IoT architecture, components and applications
  • Contrast enterprise IT and industrial OT security
  • Define layered security requirements from the network edge to the core, and from access to applications layer
  • Protect endpoints and communications as well as data at rest and in motion
  • Comply with standards and regulations for auditing requirements
  • Understand protocols, applications and IPv6 for IIoT
  • Identify vulnerabilities and threats
  • Address common implementation issues
  • Assess, monitor, and detect vulnerabilities
  • Walk through IIoT attacks
  • Adopt best practices in design principles and process for securing and segmenting IIoT networks
  • Apply the converged security model for the broader industry: manufacturing, utilities, transportation, O&G
  • Secure and monitor the IIoT framework with next generation security products and tools

Prerequisites

  • College or advanced technical degrees with several years of experience in IT or OT
  • Solid understanding of IP networking and industrial protocols
  • Cisco CCNA® Security level of knowledge
  • Lesson 1: Describing Converged Enterprise and Industrial IoT Networks, Architectures, and Frameworks
  • Lesson 2: Describing Industrial IoT Network Security Requirements
  • Lesson 3: Describing Protocols Used in Converged Enterprise and Industrial IoT Networks
  • Lesson 4: Analyzing IoT Vulnerabilities
  • Lesson 5: Exploiting Vulnerabilities in Industrial IoT Networks
  • Lesson 6: Describing the Process of Securing Industrial IoT Networks
  • Lesson 7: Hardening Devices in Industrial IoT Networks
  • Lesson 8: Implementing Network Infrastructure Security in Industrial IoT Networks
  • Lesson 9: Describing the Characteristics of Cisco NGFWs in Industrial IoT Networks
  • Lesson 10: Securing Communications in Industrial IoT Networks Using Basic Cisco NGFW and Cisco NGIPS Features
  • Lesson 11: Implementing Advanced Security Features on NGFW and NGIPS in Industrial IoT Networks
  • Lesson 12: Using the Cisco TrustSec Solution in Industrial IoT Networks
  • Lesson 13: Implementing VPN Solutions in Industrial IoT Networks
  • Lesson 14: Describing the Industrial IoT Network Framework and Regulations
  • Lesson 15: Bonus Content: Describing Physical Security in Industrial IoT Networks
  • Lesson 16: Bonus Content: Monitoring Industrial IoT Networks
  • Discovery 1: Explore an Industrial IoT Network
    • FASTLab 1: Explore Industrial IoT Network Components and Identify Their Security Requirements
  • Discovery 2: Analyze Layer 2 and Layer 3 Network Protocol Traffic in an Industrial IoT Network
  • Discovery 3: Analyze Operations Technology Protocol Traffic
  • Discovery 4: Explore Assets and Detect Vulnerabilities in an Industrial IoT Network
  • Discovery 5: Insert a Rogue Device
  • Discovery 6: Implement an Attack Against OT Assets
    • FASTLab 2: Analyze Attacks Against IoT Networks
    • FASTLab 3: Classify Assets and Identify Relationships Between Assets in Industrial IoT Network
  • Discovery 7: Implement Device Hardening on Industrial Network Devices
  • Discovery 8: Explore Network Infrastructure Security Features on Cisco Industrial Ethernet Switches
  • Discovery 9: Explore Network Infrastructure Security Features on Cisco Industrial Ethernet Switches 2
  • Discovery 10: Implement Cisco NGFWs in Routed Mode and in Transparent Mode in an Industrial IoT Network
  • Discovery 11: Implement Access Control for Network Segments
  • Discovery 12: Implement a Cisco FirePOWER Module with Basic Settings
  • Discovery 13: Implement Advanced Access Control and OT Application Inspection for Network Segments
  • Discovery 14: Implement IEEE 802.1X on Industrial Switches
  • Discovery 15: Implement SGTs on Industrial Switches
  • Discovery 16: Implement a Remote-Access VPN to Manage Industrial IoT Networks
  • Discovery 17: Explore Industrial IoT Network Components and Identify the Applicable Security Standards and Regulations
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial