Security Considerations for Test System Integrations
This course prepares engineers with resources on the industry security regulations that must be followed to ensure test system security. After completing this course you will be able to identify different standards and frameworks used in government and industry to protect systems from security threats.
Duration
- 4 lessons | 1.5 hours
Audience
- System Integrators, Software Engineers, and Hardware Engineers working in industries sensitive to security threats. Engineers are being requested to comply with security regulations for the systems they develop or integrate with.
Course Objectives
- Create awareness of the test system security regulations and know when to apply those regulations to your systems.
- Review the considerations to ensure that your system will be securely deployed.
- Identify frameworks that can be applied to your test systems to ensure compliance with the test system regulations.
Prerequisites
None
Hardware and Software
NI Online Training courses are best utilized on systems meeting minimum requirements for best performance. Use the following guidelines:
Software
- N/A
Hardware
Use simulated hardware where applicable or the list below as a reference if you want to program and test the hardware-related exercises:
- N/A
Milestone
-
Lesson List
Exploring What Makes a Secure Development Environment
RequiredLesson
| Duration: 20 minutesIdentify security requirements for compliance and explore principles for secure test system development.Exploring Frameworks for Product Security
RequiredLesson
| Duration: 25 minutesOverview of the recommendations stated in NIST Special Publications 800-218, 800-37, and 800-53, using them as a reference point for defining a secure software development framework and identifying recommendations for mitigating software vulnerabilities.Analyze System Design Requirements for Security Compliance
RequiredLesson
| Duration: 25 minutesAcknowledge security requirements for typical test systems integrations, explore OT system operations, architectures, and components, and consider OT system design considerations.Accessing Security Resources
RequiredLesson
| Duration: 23 minutesCreate awareness of different sources of information and services to stay on top of test system security.