Hirose: Connecting the future
  Print this Page   Send to a Friend  

Cyber security training videos


Cyber security training videos

Over the last decade, addressing and resolving the growing threat for closed industrial IoT networks to be accessed and influenced over the public Internet has become the main priority for industrial automation and system control integrators. In February 2018, WoMaster held Cyber Security training for its partners to demonstrate how they can provide a complete protection of IIoT network according to ISASecure - IEC 62443-4-2.

The training covers cyber security features hardware and software integrated protection mechanism, which applies the latest ASIC secure technology (L2-L7 packet classification), multi-level authentication, secure data transmission, encrypted key data, complete event logs/traps, operational errors prevention, and event logs, and operational errors exceeds IEC62443-4-2 Level 2 requirements to build most secure systems for industrial applications.

Other topics included Advanced Port Based Security IEEE802.1 x MAB (MAC Authentication Bypass), which enables port-based access control, using a central authentication center such as TACACS+/Radius, multi-level user passwords, and DHCP snooping.

The recorded videos from this IIoT cyber security training are now available online:
Part 1: www.youtube.com/watch?v=GdpnIJjdbXk
Part 2: www.youtube.com/watch?v=VAcCXne96NM&t=4s



Analog Devices: Time Sensitive Networking
DINSpace fiber optic and Cat 6 patch panels
ICP DAS at SecuTech Thailand
Japan IT Week Autumn

Get Social with us:

© 2010-2018 Published by IEB Media GbR · Last Update: 18.12.2018 · 31 User online · Privacy Policy · Contact Us