WoMaster Cyber security training video is available online
The training covers cybersecurity features hardware and software integrated protection mechanism, which applies the latest ASIC secure technology (L2-L7 packet classification), multi-level authentication, secure data transmission, encrypted key data, complete event logs/traps, operational errors prevention, and event logs, and operational errors exceeds IEC62443-4-2 Level 2 requirements to build the most secure systems for industrial applications.
Other topics included Advanced Port Based Security IEEE802.1 x MAB (MAC Authentication Bypass), which enables port-based access control, using a central authentication center such as TACACS+ / Radius, multi-level user passwords, and DHCP snooping.
The recorded videos from this IIoTcyber security training are now available online:
Part 1: www.youtube.com/watch?v=GdpnIJjdbXk
Part 2: www.youtube.com/watch?v=VAcCXne96NM&t=4s