IoT Talent Consortium Logo IoT Talent Consortium
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Click anywhere outside to close

ICS Security Foundations – Cyber Security for ICS, Module 2: Threats to ICS

The second module  addresses threats to ICS. The difference between a threat and a vulnerability is covered in depth. Then specific threats to different operating environments are elaborated. Those specific to Information Technology (IT) are discussed in depth. This is followed by a review of the situational differences unique to Operational Technology (OT) settings. A learning activity centers on your ability to distinguish between the major kinds of IT and OT threats. Special attention is given to attacks against different configurations of industrial control systems. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.

Completing this module is one of six steps toward earning the Internet of Things Talent Consortium’s badge in ICS Security Foundations.