Enrollment options

(Lab) Using lessons learned from successfully attacking the power plant, learn how to harden the ICS network with firewalls, monitoring systems, and intrusion detection systems.. After completing this chapter, users will be able to:

• Monitor network flows
• Install and monitor an inline network intrusion detection system
• Investigate DNS exfiltration traffic
• Use Fortiphyd Logic's LogicWatch product to monitor the ICS network
• Write basic network firewall rules

Hours: 1.0
Self enrollment (Student)
Self enrollment (Student)