IoT Talent Consortium Logo IoT Talent Consortium
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Click anywhere outside to close

ICS Security Foundations – Cyber Security for ICS, Module 3: Protocols and Standards

The third module delves into ICS protocols and standards. The difference between a protocol and a standard is covered in detail. Then specific threats to different kinds of protocols are described. Those specific to ICS are discussed in depth. A learning activity reinforces your grasp of the various ICS protocols. Special attention is then given to securing ICS protocols. Specific standards for ICS are also discussed. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.

Completing this module is one of six steps toward earning the Internet of Things Talent Consortium’s badge in ICS Security Foundations.