Table of Contents
- Introduction and Recap of First Edition
- A Modern Look at the Industrial Control System Architecture
- The Industrial Demilitarized Zone
- Designing the ICS Architecture with Security in Mind
- Introduction to Security Monitoring
- Passive Security Monitoring
- Active Security Monitoring
- Industrial Threat Intelligence
- Visualizing, Correlating, and Alerting
- Threat Hunting
- Threat Hunt Scenario 1 – Malware Beaconing
- Threat Hunt Scenario 2 – Finding Malware and Unwanted Applications
- Threat Hunt Scenario 3 – Suspicious External Connections
- Different Types of Cybersecurity Assessments
- Industrial Control System Risk Assessments
- Red Team/Blue Team Exercises
- Penetration Testing ICS Environments
- Incident Response for the ICS Environment
- Lab Setup

