- Overview of threat detection techniques and tools relevant to OT/ICS environments
- Understanding unique indicators of compromise (IOCs) and attack vectors in OT/ICS systems
- Implementing proactive threat mitigation strategies specific to OT/ICS infrastructures