Industrial incidents don’t behave like IT incidents since containment and recovery decisions can have real safety and production consequences. This path teaches you how to prepare for, detect, contain, and recover from cyber events in OT environments with minimal operational disruption. You’ll build OT-specific playbooks, practice evidence collection (PCAPs, logs, historian data), and work through realistic scenarios like ransomware or unauthorized remote access. The goal is to help you respond calmly and effectively in the first critical hours while coordinating with operations, engineering, and leadership.
Program catalogue

OT devices and software are increasingly connected which means security needs to be designed in, not bolted on after deployment. This path is for engineers and security practitioners who want to build or evaluate OT products securely, including embedded systems, industrial gateways, sensors, and control software. You’ll cover secure development practices, threat modeling for industrial use cases, firmware and update security, SBOM and vulnerability response workflows, and practical robustness testing. By the end, you’ll be better equipped to ship resilient OT products and reduce security risk for downstream operators.

Most OT organizations need a safe, repeatable way to understand risk, prioritize fixes, and validate defenses without “breaking the plant.” This path focuses on practical OT security assessments: scoping and rules of engagement, asset discovery and architecture review, OT-safe testing techniques, vulnerability management in constrained environments, and how to turn findings into remediation plans that operations will actually implement. It also includes guidance on when OT pentesting makes sense, how to do it responsibly, and what should be tested in a lab versus production. The result is a clear, defensible assessment approach you can use in real facilities.

Start here if you want a solid, practical foundation in how OT systems work and how to secure them without breaking operations. This path covers the essentials of industrial environments: Purdue-style architectures, common OT assets (PLCs, HMIs, historians), core networking concepts, and the OT-specific “do’s and don’ts” that come with safety and uptime constraints. You’ll learn the building blocks behind segmentation, secure remote access, asset visibility, and basic monitoring so you can confidently participate in OT security work whether you’re new to OT or coming from an IT background.
