From the course: Ethical Hacking: Hacking IoT Devices

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Pentesting OT systems

Pentesting OT systems

- [Instructor] Pentesting and operational technology environment involves a systematic approach to determine vulnerabilities. In this segment, we'll review the importance of testing and outline the unique characteristics of operational technology environments the team will need to understand prior to testing. The general scenario for testing an operational technology network will generally follow a process that is similar to any ethical hacking exercise, such as planning, gathering information, and assessing vulnerabilities. However, there are several key differences due to the unique characteristics and requirements of operational technology environments. As shown in this graphic, we can compare the differences between IT and OT. More specifically, information technology systems manage the flow of information and operational technology systems, control physical processes and critical infrastructure such as manufacturing, power plants, and water treatment facilities. Pentesting…

Contents