Torrent details for "Udemy NIST SP 800 82 Revision 3 Guide to Operational Technolo" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.8 GB
Info Hash:
8C1B43ACB35E99AD8B6746D8461B13E812814050
Added By:
Added:
Aug. 14, 2025, 9:20 a.m.
Stats:
|
(Last updated: Aug. 14, 2025, 9:23 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1 -Trainer's Introduction.mp4 | 7.2 MB |
| 2 -Disclaimer.mp4 | 3.8 MB |
| 3 -What is NIST.mp4 | 4.7 MB |
| 4 -What is NIST SP 800-82 revision 3 and who should use it.mp4 | 8.4 MB |
| 5 -NIST SP800-82-r3 sections and course contents.mp4 | 11.3 MB |
| 1 -Operational Technology.mp4 | 5.4 MB |
| 10 -OT System Design Considerations - cont.mp4 | 6.2 MB |
| 11 -SCADA Systems.mp4 | 23.0 MB |
| 12 -SCADA Example.mp4 | 5.9 MB |
| 13 -Communication Topologies for SCADA.mp4 | 8.8 MB |
| 14 -SCADA Implementation Example.mp4 | 8.1 MB |
| 15 -SCADA Implementation for RAIL Monitoring & Controle.mp4 | 6.0 MB |
| 16 -DCS Systems.mp4 | 20.1 MB |
| 17 -DCS Example.mp4 | 15.2 MB |
| 18 -PLC Based Topologies.mp4 | 16.7 MB |
| 19 -PLC Control System Implementation Example.mp4 | 4.6 MB |
| 2 -Overview of OT.mp4 | 16.6 MB |
| 20 -BAS.mp4 | 7.9 MB |
| 21 -BAS Example.mp4 | 5.0 MB |
| 22 -PACS.mp4 | 12.3 MB |
| 23 -PACS Example.mp4 | 5.0 MB |
| 24 -Safety Systems.mp4 | 18.8 MB |
| 25 -Safety Systems Example.mp4 | 3.8 MB |
| 26 -OT vs IT.mp4 | 9.7 MB |
| 27 -IT vs OT cont.mp4 | 43.1 MB |
| 28 -Key Considerations for OT Security.mp4 | 28.4 MB |
| 29 -Industrial IoT and Cyber Security.mp4 | 4.2 MB |
| 3 -OT Evolution.mp4 | 29.3 MB |
| 30 -Rise of IIoT.mp4 | 1.9 MB |
| 31 -IIoT Architecture.mp4 | 11.4 MB |
| 32 -IIoT Applications and benefits.mp4 | 12.7 MB |
| 33 -Cyber threats to IIoT.mp4 | 8.4 MB |
| 34 -IIoT Vulnerabilities.mp4 | 10.8 MB |
| 35 -CSF for IIoT.mp4 | 8.0 MB |
| 36 -Best practices for IIoT Security.mp4 | 9.1 MB |
| 37 -Future of IIoT.mp4 | 4.9 MB |
| 4 -General Guidelines for effective OT Security.mp4 | 15.8 MB |
| 5 -OT Based Systems.mp4 | 34.4 MB |
| 6 -Examples of OT Dependent Sectors.mp4 | 32.3 MB |
| 7 -Examples of OT Dependent Sectors - cont.mp4 | 3.1 MB |
| 8 -Basic Operation of a OT System.mp4 | 12.8 MB |
| 9 -OT System Design Considerations.mp4 | 8.6 MB |
| 1 -Section 3 - Establish OT Cybersecurity Program.mp4 | 3.3 MB |
| 10 -Define OT Cybersecurity Strategy.mp4 | 16.8 MB |
| 11 -Develop OT Specific Policies and Procedures.mp4 | 18.3 MB |
| 12 -OT Cybersecurity Awareness Training.mp4 | 14.4 MB |
| 13 -Applying RMF for OT.mp4 | 16.2 MB |
| 14 -Establish Maintenance Tracking.mp4 | 9.0 MB |
| 15 -Develop Incident Response Capabilities.mp4 | 8.0 MB |
| 16 -Develop Recovery and Restoration Capabilities.mp4 | 20.6 MB |
| 2 -OT Cyber Security Program Development.mp4 | 18.7 MB |
| 3 -OT Security Program Charter.mp4 | 12.8 MB |
| 4 -OT Incidents Examples and Consequences.mp4 | 7.4 MB |
| 5 -OT Cyber Attacks - Examples.mp4 | 19.4 MB |
| 6 -Business case for OT Cybersecurity.mp4 | 4.7 MB |
| 7 -Business case for OT Cybersecurity - cont.mp4 | 28.7 MB |
| 8 -Establish OT Cybersecurity Governance.mp4 | 7.7 MB |
| 9 -Building Cross Functional OT Security Team.mp4 | 29.8 MB |
| 1 -Understanding and Managing Risk in OT Environments.mp4 | 7.8 MB |
| 10 -Responding and Monitoring OT Risks.mp4 | 13.3 MB |
| 11 -Risk Monitoring in OT.mp4 | 11.5 MB |
| 12 -Supply Chain Risk Management for OT Systems.mp4 | 40.1 MB |
| 13 -Securing Safety-Critical OT Components.mp4 | 21.2 MB |
| 14 -Applying the NIST RMF to OT.mp4 | 9.7 MB |
| 15 -Prepare.mp4 | 5.7 MB |
| 16 -Categorize.mp4 | 4.7 MB |
| 17 -Select.mp4 | 10.9 MB |
| 18 -Implement.mp4 | 4.4 MB |
| 19 -Assess.mp4 | 10.3 MB |
| 2 -Evolving Landscape of OT Risk.mp4 | 9.3 MB |
| 20 -Authorize.mp4 | 5.9 MB |
| 21 -Monitor.mp4 | 11.7 MB |
| 3 -Organization Wide Risk Management Framework.mp4 | 9.6 MB |
| 4 -4 Step Risk Management Process.mp4 | 10.3 MB |
| 5 -Framing Risk in OT.mp4 | 15.3 MB |
| 6 -Risk Assessment Methodologies for OT.mp4 | 15.0 MB |
| 7 -Categorizing and Evaluate Risk Impact.mp4 | 14.5 MB |
| 8 -Common OT Vulnerabilities and Threats.mp4 | 13.6 MB |
| 9 -Non Digital Risk Management in OT.mp4 | 15.5 MB |
| 1 -OT Cybersecurity Architecture Overview.mp4 | 11.8 MB |
| 10 -Network Architecture.mp4 | 8.6 MB |
| 11 -Layer 4 - Hardware Security.mp4 | 10.0 MB |
| 12 -Layer 5 - Software Security.mp4 | 13.6 MB |
| 13 -Other Cybersecurity Strategy considerations.mp4 | 15.4 MB |
| 14 -OT Specific Recommendations.mp4 | 11.5 MB |
| 15 -OT Specific Recommendations cont.mp4 | 27.6 MB |
| 16 -Encrypted Network Communications and OT Security Best Practices.mp4 | 31.3 MB |
| 17 -Additional Cybersecurity Architecture Considerations.mp4 | 4.7 MB |
| 18 -Cyber related Safety considerations.mp4 | 10.8 MB |
| 19 -Availability considerations.mp4 | 11.9 MB |
| 2 -Cybersecurity Strategy for OT.mp4 | 11.5 MB |
| 20 -Geographically Distributed Systems.mp4 | 14.3 MB |
| 21 -Regulatory requirements and environmental considerations.mp4 | 24.8 MB |
| 22 -Field IO Security considerations.mp4 | 14.4 MB |
| 23 -Security considerations for IIoT.mp4 | 15.1 MB |
| 24 -IIoT Cybersecurity capability considerations.mp4 | 12.7 MB |
| 25 -Cybersecurity architecture models for OT and IIoT.mp4 | 11.1 MB |
| 26 -DCS based OT Systems - Layered Defense.mp4 | 7.0 MB |
| 27 -DCS Implementation Example.mp4 | 2.7 MB |
| 28 -Example - Defense in depth architecture for DCS.mp4 | 14.7 MB |
| 29 -DCS and PLC Based Systems with IIoT Integration.mp4 | 14.0 MB |
| 3 -Impacts of choosing a Cybersecurity Strategy.mp4 | 7.0 MB |
| 30 -Example - Architecture for DCS with IIoT.mp4 | 6.5 MB |
| 31 -SCADA based OT Environments Geographically Dispersed Security.mp4 | 14.6 MB |
| 32 -SCADA Systems example.mp4 | 5.4 MB |
| 33 -SCADA Security Architecture Example.mp4 | 12.6 MB |
| 4 -Defense-in-Depth Strategy.mp4 | 5.3 MB |
| 5 -Defense-in-Depth Architecture Capabilities.mp4 | 5.6 MB |
| 6 -Overview of Defense-in-Depth.mp4 | 3.6 MB |
| 7 -Layer 1 - Security Management.mp4 | 8.9 MB |
| 8 -Layer 2 - Physical Security.mp4 | 11.3 MB |
| 9 -Layer 3 - Network Security.mp4 | 13.1 MB |
| 1 -NIST CSF 2.0.mp4 | 6.2 MB |
| 10 -Key benefits of NIST CSF 2.0.mp4 | 10.6 MB |
| 2 -What is NIST CSF 2.0.mp4 | 4.3 MB |
| 3 -Goals of the framework.mp4 | 11.4 MB |
| 4 -Structure of NIST CSF 2.0.mp4 | 4.1 MB |
| 5 -Core Functions.mp4 | 8.0 MB |
| 6 -CSF Profiles.mp4 | 8.7 MB |
| 7 -Implementation Tiers.mp4 | 10.9 MB |
| 8 -Categories Per Function.mp4 | 7.8 MB |
| 9 -Practical Implementation.mp4 | 12.4 MB |
| 1 -NIST CSF for OT.mp4 | 3.3 MB |
| 10 -Protect Identity Management and Access Control.mp4 | 4.9 MB |
| 11 -Protect Identity Management and Access Control - cont.mp4 | 17.1 MB |
| 12 -Protect Identity Management and Access Control - cont.mp4 | 10.2 MB |
| 13 -Protect Network Segmentation and Isolation.mp4 | 9.8 MB |
| 14 -Protect Awareness and Training.mp4 | 7.6 MB |
| 15 -Protect Data Security.mp4 | 9.1 MB |
| 16 -Protect Information Protection Processes and Procedures.mp4 | 14.5 MB |
| 17 -Protect Change Management.mp4 | 7.9 MB |
| 18 -Protect Response and Recovery Plans and Testing.mp4 | 11.8 MB |
| 19 -Protect Secure Maintenance.mp4 | 7.5 MB |
| 2 -The 5 core functions.mp4 | 6.8 MB |
| 20 -Protect Protective Technology.mp4 | 5.8 MB |
| 21 -Protective Security Controls.mp4 | 9.2 MB |
| 22 -Protect Wireless Communications.mp4 | 12.0 MB |
| 23 -Protect Remote Access.mp4 | 12.0 MB |
| 24 -Protect Flaw Remediation and Patch Management.mp4 | 10.1 MB |
| 25 -Detect Anomalies and Events.mp4 | 9.8 MB |
| 26 -Detect Continuous Monitoring.mp4 | 9.5 MB |
| 27 -Detect Detection Processes.mp4 | 9.1 MB |
| 28 -Respond Incident Response and Planning.mp4 | 8.3 MB |
| 29 -Respond Communications.mp4 | 10.0 MB |
| 3 -OT vs IT key difference.mp4 | 4.2 MB |
| 30 -Respond Analysis and Mitigation.mp4 | 8.2 MB |
| 31 -Recover Restoration Planning.mp4 | 16.7 MB |
| 32 -Recovery Communications and Improvements.mp4 | 11.4 MB |
| 33 -Key Takeaways.mp4 | 13.8 MB |
| 4 -Identify Asset Management.mp4 | 16.2 MB |
| 5 -Identify Business Environment.mp4 | 9.8 MB |
| 6 -Identify Governance.mp4 | 8.6 MB |
| 7 -Identify Risk Assessment.mp4 | 5.4 MB |
| 8 -Identify Risk Management Strategy.mp4 | 7.0 MB |
| 9 -Identify Supply Chain Risks.mp4 | 5.2 MB |
| 1 -Case Study - ICSOT Security in an Oil and Gas Company using NIST SP 800-82-r3.mp4 | 7.2 MB |
| 2 -Current Environment and Key Challenges.mp4 | 3.8 MB |
| 3 -Why the Program.mp4 | 6.1 MB |
| 4 -Risk Assessment and Threat Modeling.mp4 | 4.6 MB |
| 5 -Application of NIST SP 800-82-r3 Guidelines.mp4 | 8.2 MB |
| 6 -Execution Challenges vs Mitigations.mp4 | 4.6 MB |
| 7 -Outcome.mp4 | 3.3 MB |
| 8 -Conclusion and Recommendations.mp4 | 7.5 MB |
| 1 - NIST CSF 2.0 Excel file.html | 52 bytes |
| 1 - NIST SP 800-82-r3 Guide.html | 54 bytes |
| 1 -NIST.pdf | 8.2 MB |
| 1 -csf2.xlsx | 128.6 KB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
936.8 MB
[0
/
2]
2023-06-01
| Uploaded by freecoursewb | Size 936.8 MB | Health [ 0 /2 ] | Added 2023-06-01 |
-
3.7 GB
[43
/
39]
2023-10-24
| Uploaded by freecoursewb | Size 3.7 GB | Health [ 43 /39 ] | Added 2023-10-24 |
NOTE
SOURCE: Udemy NIST SP 800 82 Revision 3 Guide to Operational Technolo
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


