This course shows participants how to conduct a risk evaluation and address the results of their findings using risk actions appropriate to the situation. Participants will also have the opportunity to see the impact realized ICS threats have in real-life scenarios.
To access this course you must purchase "Advanced Series: Course 1 - Cyber Security Vulnerabilities" that gives access to the entire Introductory Series.