From the course: Ethical Hacking: Hacking IoT Devices
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Pentesting OT systems
From the course: Ethical Hacking: Hacking IoT Devices
Pentesting OT systems
- [Instructor] Pentesting and operational technology environment involves a systematic approach to determine vulnerabilities. In this segment, we'll review the importance of testing and outline the unique characteristics of operational technology environments the team will need to understand prior to testing. The general scenario for testing an operational technology network will generally follow a process that is similar to any ethical hacking exercise, such as planning, gathering information, and assessing vulnerabilities. However, there are several key differences due to the unique characteristics and requirements of operational technology environments. As shown in this graphic, we can compare the differences between IT and OT. More specifically, information technology systems manage the flow of information and operational technology systems, control physical processes and critical infrastructure such as manufacturing, power plants, and water treatment facilities. Pentesting…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.