OT/ICS-SOC/SIEM Design and Implementation on Microsoft Azure


Published 11/2022
Created by Sourabh Suman
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch


Genre: eLearning | Language: English | Duration: 41 lectures (4h 46m) | Size: 3.42 GB
Create your own full functional SOC in Azure cloud ! It is simple and cheap as well, don’t get scared of word Azure!
What you’ll learn
Design SIEM/SOC for ICS Environment
Working on Azure for deploying ICS machines and SOC lab
Complete end to end log integration and visualization
IDS/IPS Solution deployment and visualization
Requirements
Basic Industrial Software Knowledge Windows Server, Workstation
Prior experience in ICS required
Understands SIEM Solution
Intent for learning is much required
Description
After three theoretical courses, I introduce you to one of the full practical courses for OT/ICS SIEM/SOC solution creation.This course is totally practical, in all chapters we are installing, configuring, or deploying something on machines located in azure infrastructure, and it’s simple, I promise.We will cover some key concepts of ICS Cybersecurity from end-to-end deployment which are as follows:Security information and event management (SIEM): Elasticsearch-Logstash-Kibana (ELK Stack)SIEM Dashboarding/ Query: KibanaNOC- Network Monitoring/ Operations Dashboarding: GrafanaEDR/HIDS – Endpoint Detection and Response/ Host Intrusion Detection: WazuhLog Management: Beats/Sysmon (Log collector for Windows Event logs and more)Asset Management: OSQuery – FleetDMEndpoint Visibility: Sysmon Malware Detection: Strelka Firewall: pfsense (Firewall)IPS-Intrusion Prevention System: Snort Based Nmap for network-based queriesVulnerability Management: Using NessusActive Directory- Windows ServerWSUS-Windows Server Update ServicesModbus CommunicationDNP3 communicationOPC Server-Client CommunicationAnd this is a dynamic list, and with time keeps on updating and increasing to increase coverage.The environment is deployed on Azure with the cheapest region and minimum resource requirements. All the steps are guided and well explained so that you can follow and create your own ICS SOC easily. after doing this course you will have a good understanding of cybersecurity technologies that are in use in the ICS landscape as well as in the overall industrial control system environment.  You can run all types of tests and simulate this environment, you can also install applications from your organization to test in a similar mode.
Who this course is for
Control engineers, integrators, and architects who design or implement OT systems
System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
Security consultants who perform security assessments and penetration testing of OT systems
Researchers and analysts who are trying to have hands-on experience
Engineers who need practical understanding of systems
Vendors that are developing products that will be deployed as part of an OT system
Homepage

https://www.udemy.com/course/ics-soc-siem/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM

DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM

Links are Interchangeable – No Password – Single Extraction