Cyber Risk Awareness for Operational Technology  

OT

A customizable course to enable your workforce with the expertise to safeguard critical operations and proactively prevent breaches in industrial sectors, leading to strengthened security and optimized operations. 

Audience
Learning Time
Employees and Contractors
30-35 minutes
Create a free account

About this course

This course provides an understanding of OT systems and essential cybersecurity practices to protect them from potential cyber threats and vulnerabilities effectively. 

1
Section 1: Introduction to OT

What is OT? 

What is ICS? 

What is SCADA? 

Common industrial sectors using OT systems 

OT vs. IT domain 

IT-OT convergence 

What is OT cybersecurity? 

Importance of OT cybersecurity 

2

Section 2: OT Threat Landscape  

This section provides examples of real case studies and associated risks regarding the data breach under OT. Also, the section makes employees aware of the security threats related to OT systems. 

OT security breaches – Real case studies 

Security threats to OT systems  

Malware infiltration via removable media 

Malware infection via the Internet and intranet 

Insider threats 

DDoS attacks and IoT botnets 

OS system vulnerabilities 

AI exploitation vulnerabilities 

3

Section 3: Cybersecurity Best Practices for OT Systems  

This section provides the best practices employees can adopt to protect themselves from potential threats. Also, it defines OT security incidents and emphasizes the need to report them promptly. 

Securing physical premises 

Safe usage of email and internet for OT systems 

Safe usage of removable media devices for OT systems 

Securing access credentials

What is an OT security incident?

Report security incidents and suspicious activities 

4

Section 4: Summary and Assessment

This section summarizes the key takeaways from this course. Also, an assessment towards the end to test the knowledge level and understanding. 

Summary

Assessment

Frequently Asked Questions

Customize this Course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Book a Demo

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

You may also like