This course is one of a series of courses that are geared towards anyone who would like to learn more about ICS/SCADA/OT Protocols and ICS/SCADA/OT Cybersecurity. If you have a hunger to learn more about these protocols, and how to better monitor them, then this course is for you!
Specifically the course covers the background/history of the protocol, the threats related to the protocol, how to use Wireshark to analyze the protocol network traffic, it provides many resources to analyze and secure this protocol, and it also covers how to create Snort Intrusion Detection rules to detect and alert on specific ICS/SCADA/OT protocol network traffic. Monitoring ICS/SCADA/OT protocols can be very beneficial from a safety and a cybersecurity perspective because it will provide a better overall situational awareness of how this protocol is being used within your industrial environments. As an Industrial Process owner and operator, it is imperative to maintain situational awareness of your environment. It will also enable you to create a protocol network traffic baseline which can allow you to identify protocol network traffic anomalies over time. Overall this will help you understand more about the ICS/SCADA/OT protocol, and how to better monitor it from a safety and Cybersecurity perspective.