IoT Talent Consortium Logo IoT Talent Consortium
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Click anywhere outside to close

ICS Security Foundations – Cyber Security for ICS, Module 5: Myths and Worst Case Scenarios

The fifth and final content module teases apart the key myths that are still predominant in IT and OT circles. Most of the focus is on enumerating and describing each myth and the fallacies behind it. A learning activity reinforces your grasp of the main myths and the realities that are actually at play. Special attention is then given ICS security worst case scenarios. Specific contrasts between the wrong and right ways to implement and manage ICS security are discussed. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.

Completing this module is one of six steps toward earning the Internet of Things Talent Consortium’s badge in ICS Security Foundations.

Security