Cyber Security Training Videos
This cyber security training series provides a practical approach to the basic concepts of security for industrial networks. With the growing use of Ethernet and Internet connectivity with plant-floor systems, the opportunities for cyber criminals to invade your systems have grown by leaps and bounds. Presenter Matthew E. Luallen begins with the nature of cyber threats, considers why security is important, simulates an attack, offers defensive strategies, and ongoing practices for safer systems.
This program is aimed primarily at users coming from the industrial side who are responsible for plant-floor networks. Its basic training can provide a general strategic direction for practitioners, plus it can serve as a foundation for more advanced instruction. When using the videos in combination with the quizzes, you can receive PDHs for continuing education.
Total series running time, approximately 110 minutes.
About the presenter
Matthew E. Luallen is co-founder and president of CYBATI, a critical infrastructure and control system cyber security awareness and education company. Mr. Luallen has written, consulted and trained extensively on process control and SCADA security issues. He continues to work with electric utilities throughout the U.S. and Canada with the NERC CIP reliability standards. Prior to incorporating CYBATI, Luallen was a co-founder of Encari and still serves as the president of Sph3r3. Luallen also served as an Information Security Network Engineer and Architect at Argonne National Laboratory. Luallen holds a B.S. in Industrial Engineering from the University of Illinois at Urbana-Champaign, and a M.S. in Computer Science from National Technological University. He also serves as adjunct faculty for DePaul University's capstone cyber security and control system courses, as an 13-year CCIE and certified instructor for Cisco Systems, and as a certified instructor for the SANS Institute. He is also the author of a new hands-on, control system cybersecurity course promoted by CYBATI.
Cyber Security Training Videos
A very fast paced look at many types of hardware and software involved in security efforts, including keyboard sniffers, Ethernet routers, smart phones, and all sorts of common network devices. It may seem a bit overwhelming, but...
What are the ways that cyber criminals get into industrial networks? How can you find the vulnerabilities in your systems? There are all sorts of entrance strategies that hackers use. Once you understand these, you can begin to...
Open source intelligence (OSINT) and social engineering are techniques that hackers use to get information about your networks with the intent of finding weaknesses. Some are technical, but others may be efforts to get your...
Why is security important, and what is going on in the defensive arms race? What are the effects of intrusions? Many intrusions are relatively minor, but what is the worst case for your facility if a hacker gets past the defenses?
What types of security controls you should put in place, from an operational, physical, and cyber standpoint, including concepts of defense-in-depth. Your efforts have to include all these for maximum effectiveness.
How do you protect the range of devices that serve as hosts, everything from terminal units to PLCs? This process begins by identifying all those things on your networks that are cyber assets using appropriate qualification...
What security controls should you install on your cyber assets, both in your plant or enterprise level? Considers patches, applications, account management, threat indicators, physical access, and more.
What are the cyber security vulnerabilities unique to industrial networking environments? Much industrial equipment is not well hardened against intrusion, so with that in mind, what can we do to reinforce our defenses?
As you work with equipment vendors, how do you analyze those companies and determine their mindset relative to security? Some companies are better than others, so how can you make that determination? A few simple questions can...
How do you determine where you are on the security spectrum? Without an effective plan, such an evaluation can be painfully difficult and leave you no better off. Some simple guidelines can keep you on track.