This course provides an in-depth exploration of Operational Technologies Security, focusing on the critical aspects of securing Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Participants will learn to identify key components and functions of these systems, analyze common vulnerabilities, and evaluate the impact of cyber attacks on critical infrastructure. The course will also cover conducting risk assessments, integrating security solutions, and applying best practices to enhance resilience against cyber threats.

OT/ICS Certified Security Professional Prep
访问权限由 New York State Department of Labor 提供
您将获得的技能
- Data Security
- Security Strategy
- Security Controls
- Hardening
- Continuous Monitoring
- Infrastructure Security
- Penetration Testing
- Information Systems Security
- Computer Security Incident Management
- Incident Response
- Operational Databases
- Risk Analysis
- Security Testing
- Operational Risk
- Control Systems
- Cyber Security Strategy
- Cyber Attacks
- Risk Management
- Risk Management Framework
- Vulnerability Assessments
- 技能部分已折叠。显示 8 项技能,共 20 项。
要了解的详细信息

添加到您的领英档案
4 项作业
February 2026
了解顶级公司的员工如何掌握热门技能

该课程共有4个模块
Start with the building blocks of operational technology: learn how ICS and SCADA systems are structured, how components interact, and why their design shapes security decisions. This module grounds learners in real-world control-system topologies and use cases drawn from power, water, and manufacturing environments to show how attacks propagate from field devices to control centers.
涵盖的内容
15个视频1个作业
Translate system knowledge into evaluative skills: learn structured approaches to assess risk, audit existing protocols, and determine where OT environments are most exposed. Through realistic scenarios and protocol comparisons, learners will practice identifying gaps that materially affect resilience and safety.
涵盖的内容
14个视频1个作业
Move from analysis to action with hands-on guidance for hardening networks and devices: apply industry best practices, deploy controls that preserve data integrity and availability, and craft defender-centric strategies against insider and external threats. This module emphasizes practical controls that are deployable in live OT environments with minimal disruption.
涵盖的内容
11个视频1个作业
Bring together detection, response, and strategy: learners will build monitoring and incident-response workflows, justify remediation priorities, and design a comprehensive security plan for automation systems. The module culminates in strategic recommendations and a capstone-style practical project that synthesizes technical and managerial decisions for critical infrastructure security.
涵盖的内容
11个视频1个作业
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







