This course provides an in-depth exploration of Operational Technologies Security, focusing on the critical aspects of securing Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. Participants will learn to identify key components and functions of these systems, analyze common vulnerabilities, and evaluate the impact of cyber attacks on critical infrastructure. The course will also cover conducting risk assessments, integrating security solutions, and applying best practices to enhance resilience against cyber threats.

OT/ICS Certified Security Professional Prep

OT/ICS Certified Security Professional Prep

Instructor: InfoSec Institute Instructor
Access provided by DBS Bank
Recommended experience
Skills you'll gain
- Incident Response
- Risk Management
- Cyber Attacks
- Risk Analysis
- Operational Risk
- Infrastructure Security
- Operational Databases
- Security Testing
- Penetration Testing
- Hardening
- Cyber Security Strategy
- Risk Management Framework
- Data Security
- Security Controls
- Vulnerability Assessments
- Security Strategy
- Information Systems Security
- Cyber Security Assessment
- Control Systems
- Computer Security Incident Management
- Skills section collapsed. Showing 10 of 20 skills.
Details to know

Add to your LinkedIn profile
4 assignments
February 2026
See how employees at top companies are mastering in-demand skills

There are 4 modules in this course
Start with the building blocks of operational technology: learn how ICS and SCADA systems are structured, how components interact, and why their design shapes security decisions. This module grounds learners in real-world control-system topologies and use cases drawn from power, water, and manufacturing environments to show how attacks propagate from field devices to control centers.
What's included
15 videos1 assignment
Translate system knowledge into evaluative skills: learn structured approaches to assess risk, audit existing protocols, and determine where OT environments are most exposed. Through realistic scenarios and protocol comparisons, learners will practice identifying gaps that materially affect resilience and safety.
What's included
14 videos1 assignment
Move from analysis to action with hands-on guidance for hardening networks and devices: apply industry best practices, deploy controls that preserve data integrity and availability, and craft defender-centric strategies against insider and external threats. This module emphasizes practical controls that are deployable in live OT environments with minimal disruption.
What's included
11 videos1 assignment
Bring together detection, response, and strategy: learners will build monitoring and incident-response workflows, justify remediation priorities, and design a comprehensive security plan for automation systems. The module culminates in strategic recommendations and a capstone-style practical project that synthesizes technical and managerial decisions for critical infrastructure security.
What's included
11 videos1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






