Loading search index...
Fundamentals
001-099
โผ
-
Document 001IT vs OT -
Document 010The Purdue Model -
Document 020PLC Fundamentals -
Document 030HMI and SCADA Fundamentals -
Document 040Safety Instrumented Systems -
Document 050OT Terminology and Glossary -
Document 060OT System Lifecycle -
Document 070Industrial Network Fundamentals -
Document 075Historian Systems -
Document 080RTU Basics
Standards & Compliance
100-199
โผ
-
Document 100OT Security Standards Overview -
Document 110Introduction to IEC 62443 -
Document 111NIST SP 800-82 -
Document 120IEC 62443 Security Levels -
Document 130NERC CIP Standards -
Document 140EU NIS2 Directive -
Document 145EU Cyber Resilience Act
Protocols & Technologies
200-299
โผ
-
Document 200Modbus Protocol -
Document 201OPC UA -
Document 202DNP3 Protocol -
Document 203EtherNet/IP Protocol -
Document 204PROFINET Protocol -
Document 205BACnet Protocol -
Document 206IEC 61850 Protocol -
Document 207S7comm Protocol
Architecture & Design
300-399
โผ
-
Document 300OT Network Segmentation -
Document 301Secure Remote Access -
Document 302Industrial DMZ Design -
Document 303Zone & Conduit Model -
Document 304Data Diodes -
Document 305Wireless in OT Environments -
Document 306OT Cloud Connectivity -
Document 307Industrial Firewalls -
Document 308Zero Trust for OT -
Document 309Purdue Model Limitations
Threats & Attacks
400-499
โผ
-
Document 400OT Security Incidents -
Document 410Stuxnet -
Document 411Ukraine Power Grid Attacks -
Document 412TRITON / TRISIS -
Document 413Industroyer / CrashOverride -
Document 414Colonial Pipeline Attack -
Document 415Oldsmar Water Treatment Attack -
Document 420OT Attack Vectors -
Document 421Cyber Kill Chain for OT -
Document 422OT Supply Chain Attacks -
Document 423Ransomware in OT Environments
Detection & Monitoring
500-599
โผ
-
Document 500OT Network Monitoring -
Document 510OT Asset Discovery -
Document 520Intrusion Detection for OT -
Document 530SIEM for OT Environments -
Document 540Anomaly Detection in OT -
Document 560OT Security Operations Center
Incident Response
600-699
โผ
-
Document 600OT Incident Response -
Document 610OT Forensics -
Document 620OT Containment Strategies -
Document 630OT Recovery Procedures -
Document 650OT Tabletop Exercises
Assessments
700-799
โผ
-
Document 700OT Risk Assessment -
Document 710OT Penetration Testing -
Document 720OT Vulnerability Management -
Document 730OT Security Audits -
Document 740OT Security Maturity Models -
Document 750Industrial Security Testbeds
Solutions & Tools
800-899
โผ
-
Document 810Application Whitelisting & System Lockdown -
Document 820Network Access Control for OT -
Document 830Endpoint Protection for OT -
Document 835Endpoint Protection Platforms -
Document 840Secure Removable Media Handling -
Document 841Secure IT/OT File Transfer -
Document 850OT Backup and Recovery -
Document 860OT Patch Management -
Document 870Encryption in OT Environments -
Document 880Privileged Access Management -
Document 890Device Management in OT -
Document 895Security Awareness Training for OT