Certified: The CompTIA SecOT+ Audio Course cover art

All Episodes

Certified: The CompTIA SecOT+ Audio Course — 89 episodes

#
Title
1

Episode 88 — Prepare for Incidents: Draft and Update IR Documentation That OT Can Use

2

Episode 87 — Execute Escalation and Notification: Internal, Government, and Regulator Expectations

3

Episode 86 — Plan Mutual Aid and Retainers: ISACs, Peer Support, and IRR Readiness

4

Episode 85 — Coordinate IT and OT During Incidents: Nuances, Authority, and Safety Priorities

5

Episode 84 — Address Overarching OT Incident Considerations: Cyber, Physical, Crisis, and Facilities

6

Episode 83 — Describe OT Incident Management Frameworks: PICERL and ICS4ICS With Clear Roles

7

Episode 82 — Apply a Collection Management Framework: What to Collect, How Often, and Why

8

Episode 81 — Map Assets to a CMDB: Attributes, Relationships, and Drift Control:

9

Episode 80 — Maintain Software Inventory and Map to Hardware: Visibility That Enables Decisions

10

Episode 79 — Capture Key Asset Attributes: Identity, Location, Ports, Ownership, Vendor, and Function

11

Episode 78 — Choose Discovery Methods Carefully: Passive, Active, and Manual Approaches in OT

12

Episode 77 — Operationalize Asset Management: Inventory Discovery, Creation, Validation, and Maintenance

13

Episode 76 — Implement Perimeter Controls: Fences, Barriers, and Access Governance for Facilities

14

Episode 75 — Use Surveillance and Inspection: Walkdowns, Video, Motion Detection, Spectrum Analysis

15

Episode 74 — Secure Rooms, Cabinets, and Cabling: IDFs, MDFs, and Exposure Reduction

16

Episode 73 — Apply Physical Security in OT: Badges, Readers, Biometrics, and Turnstiles

17

Episode 72 — Maintain Interoperability and Simplicity: Compatibility Without Expanding Attack Surface

18

Episode 71 — Build for Performance, Auditability, and Observability: Trust You Can Prove

19

Episode 70 — Engineer Compartmentalization and Criticality: Limiting Blast Radius Without Breaking Control

20

Episode 69 — Design for Operational Resilience: Endurance, Redundancy, High Availability, Recoverability

21

Episode 68 — Explain Secure OT Architectural Principles: Least Privilege, Determinism, and Defense in Depth

22

Episode 67 — Turn Telemetry Into Intelligence: Logs, Sessions, and Anomalies That Matter

23

Episode 66 — Operationalize Intel Data Types: IOCs, STIX, YARA, and Where They Fit in OT

24

Episode 65 — Identify OT Threat Vectors: Remote Access, Media, Supply Chain, and IT-to-OT Pivoting

25

Episode 64 — Analyze the OT Threat Landscape: Actor Motives, Capabilities, and Physical Consequences

26

Episode 63 — Learn from Indirect-Impact Events: Colonial Pipeline, SolarWinds, Maersk, AcidRain, CrowdStrike 2024, RTX

27

Episode 62 — Learn from Direct-Impact OT Events: Stuxnet, TRISIS, BlackEnergy, FrostyGoop, Industroyer

28

Episode 61 — Apply Threat Intelligence Frameworks: Diamond Model, ATT&CK for ICS, and Kill Chain

29

Episode 60 — Use the Intelligence Life Cycle: Collection, Analysis, Dissemination, and Feedback Loops

30

Episode 59 — Threat Intelligence Foundations: Intelligence Types and What Each One Delivers

31

Episode 58 — Monitor and Disposition Risk: Residuals, Audits, Reporting, Escalations, and Decisions

32

Episode 57 — Operate a Controls Calendar: Scheduling, Evidence, and Sustainable Compliance

33

Episode 56 — Track Inherited Risk and Maturity Indicators: What You Own Versus What You Inherit

34

Episode 55 — Control and Treat OT Risk: Controls Catalogs, Documentation, and Acceptance Criteria

35

Episode 54 — Understand OT Pen Tests and Adversarial Emulation: Safety Constraints and Value

36

Episode 53 — Conduct Architecture Reviews for OT Risk: Data Flows, Trust Boundaries, and Weak Links

37

Episode 52 — Choose Qualitative Versus Quantitative Risk: When Each Method Actually Helps

38

Episode 51 — Use Failure Mode and Criticality Thinking: Safety, Reliability, and Cascading Effects

39

Episode 50 — Evaluate Third-Party Risk: Integrators, Remote Support, and Shared Responsibility

40

Episode 49 — Assess Supply Chain Risk in OT: Hardware, Software, and Vendor Dependencies

41

Episode 48 — Apply Scenario-Based Risk Methods: Realistic Failure Paths and Meaningful Mitigations

42

Episode 47 — Identify OT Threat Surface: Vectors, Exposure, and Threat Actors in Context

43

Episode 46 — Scope OT Risk Assessments: Assets, Networks, and Boundaries You Can Defend

44

Episode 45 — Model Likelihood and Consequence: Risk Variables That Drive Real Decisions

45

Episode 44 — Explain OT Risk Assessment Frameworks: NIST and ISA/IEC Approaches in Practice

46

Episode 43 — Produce OT Documentation That Works: Policies, Processes, Standards, and SOPs

47

Episode 42 — Determine Asset Criticality: What Fails First, What Hurts Most, and Why

48

Episode 41 — Build Training and Awareness for OT Teams: Competence Without Chaos

49

Episode 40 — Measure OT Security With Purpose: Metrics, Measures, and What They Really Signal

50

Episode 39 — Use MOUs and SOWs Correctly: Scope, Responsibilities, and Deliverable Discipline

51

Episode 38 — Define OT SLAs: Internal Versus External Expectations That Protect Uptime

52

Episode 37 — Build OT Service Agreements: Procurement Requirements and What MSAs Must Cover:

53

Episode 36 — Manage Stakeholders in OT: Trust, Communication, and Change Acceptance

54

Episode 35 — Use the RACI Model in OT: Clear Ownership Across Engineering, Ops, and Security

55

Episode 34 — Develop Practical Roadmaps: Sequencing Improvements Without Production Disruption

56

Episode 33 — Benchmark OT Security Progress: Baselines, Targets, and Evidence That Holds Up

57

Episode 32 — Build a Cybersecurity Program in OT: Risk Levels, Registry, and Maturity Assessment

58

Episode 31 — Navigate Legal and Regulatory Drivers: Compliance Pressure and Non-Compliance Fallout

59

Episode 30 — Prioritize Safety Outcomes: Loss of Life, Environmental Harm, and Reliability Expectations

60

Episode 29 — Translate OT Business Impact: Financial, Reputational, Quality, and Operational Consequences

61

Episode 28 — Balance Security Versus Operations: Governance Structures and Decision Authorities

62

Episode 27 — Align OT Security to Business Objectives: Risk Appetite, Continuity, and Recovery

63

Episode 26 — Explain OT GRC Value: Security That Supports Operations, Not Fights Them

64

Episode 25 — Understand Privatized Backbones and Autonomous Systems: Security and Resilience Impacts

65

Episode 24 — Place OT Workloads in Cloud and Edge: Public, Private, Hybrid, and Vendor Services

66

Episode 23 — Evaluate AI in OT Security: ML, Generative AI, and Operational Risk Tradeoffs

67

Episode 22 — Use Containers, SDN, and Middleware in OT: Benefits, Risks, and Failure Modes

68

Episode 21 — Apply Modern OT Patterns: Virtual Machines, Hypervisors, Switching, and Virtual PLCs

69

Episode 20 — Manage Legacy OT Hardware and Ports: Physical Exposure, Protocol Limits, and Access

70

Episode 19 — Compare Legacy OT Constraints: Embedded, Proprietary, RTOS, and General-Purpose OSs

71

Episode 18 — Operate OT Wireless Reliably: VHF, AIS, VSAT, M-Bus, 802.15.4, and 802.11

72

Episode 17 — Handle Building Automation Networks: BACnet, KNX, and Profinet in Mixed Environments

73

Episode 16 — Use OPC DA and OPC UA Safely: Data Exchange, Trust, and Interoperability

74

Episode 15 — Engineer Ethernet OT Communications: EtherCAT, Modbus TCP, and CIP/EtherNet/IP

75

Episode 14 — Secure Serial Protocol Reality: Modbus RTU, Profibus, Data Highway Plus, and DNP3

76

Episode 13 — Work with Serial OT Communications: RS-232, RS-485, and Practical Limitations

77

Episode 12 — Track I/Os, Watchdogs, Timers, Current Values, and Tags Without Confusion

78

Episode 11 — Master Process Variables and Set Points: How Control Loops Behave Under Stress

79

Episode 10 — Explain Control Logic Foundations: Ladder Logic, FBD, Structured Text, and SFC

80

Episode 9 — Recognize Stand-Alone Systems and Networks Across Critical Infrastructure Sectors

81

Episode 8 — Distinguish ICS System Types: DCS, SCADA, SIS, MES, and Localized Control Networks

82

Episode 7 — Classify OT Workstations and Data Systems: Engineers, Operators, Historians, Portables

83

Episode 6 — Identify OT Device Roles: Sensors, Actuators, Controllers, PLCs, HMIs, and RTUs

84

Episode 5 — Explain OT Versus IT: Convergence, Responsibilities, and Operational Constraints

85

Episode 4 — Run a Job Safety Analysis in OT: Briefings, Outbriefs, and Safe Work Controls

86

Episode 3 — Apply OT Jobsite Safety: Hazards, PPE, and Lockout/Tagout Done Right

87

Episode 2 — Execute a Spoken Study Plan and Exam-Day Mental Model for SecOT+ Success

88

Episode 1 — Decode the SecOT+ SOT-001 Blueprint, Scoring, Policies, and Question Styles

89

Welcome to Certified: The CompTIA SecOT+ Audio Course