Training Programs Designed To Counter Industrial Cybersecurity Threats
Due to the potential impact of an attack on the physical safety of communities, employees or customers, ICS /SCADA security is an even higher priority than for traditional IT systems. Cyber criminals have already developed malware threats such as Triton/TRISIS and Stuxnet that can disrupt industrial Operation Technology (OT).
The ICS/SCADA Cyber Security Training Course is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network.
You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set, you will look at the best practices and recommendations when it comes to bridging the air gap. You will learn a systematic process of intrusion and malware analysis. Once you have the process for analysis mastered, you will be introduced to the digital forensic process and how to respond to incidents when a breach is detected.
The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network architectures from attacks. Students will learn to think like a malicious hacker to defend their organizations.
ICS/SCADA teaches powerful methods to analyze risks possessed by network infrastructure in IT and corporate spaces. Once your foundation or basic concepts are clear, you will learn a systematic process of intrusion and malware analysis. After this, you will learn about digital forensic process and incident response techniques upon detecting a breach.
This course is designed for IT professionals who manage or direct their organization’s IT infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.
About the Exam
SCADA Systems personnel.
Business System Analysts who support SCADA interfaces.
System Administrators, Engineers, and other IT professionals who are administering, patching, securing SCADA, and/or ICS.
Security Consultants who are performing security assessments of SCADA and/or ICS.
Prerequisites
Linux operating system fundamentals, including basic command line usage.
Conceptual knowledge of programming/scripting.
Solid grasp of essential networking concepts (OSI model, TCP/IP, networking devices, and transmission media).
Understanding of basic security concepts (e.g., malware, intrusion detection systems, firewalls, and vulnerabilities).
Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.
Brochure
The ICS/SCADA Cyber Security Training Course is a hands-on training that teaches the foundation of security and defending architectures from attacks. Students will learn to think like a hacker to protect their organizations from attacks commonly conducted against ICSs.
This is only an overview of ICS/SCADA and what you will learn.
For complete information, download the brochure now.
The Executive Management Program includes the complete Certified Project Manager (CPM) course, including exam, as well as the Cybersecurity Risk Management Workshop, Certified Secure Computer User, (100 Seat license) and 1 free “Aware” license that enables you to run a phishing simulation to test your company’s user awareness.
Certified Project Management
C|PM
Learn to process raw and unstructured data and how to provide insights that impact your business decisions. Learn when and how to apply certain methodologies in your projects for guaranteed success
Risk Management
R|M
This risk management course is specifically designed to guide a CISO in defining and implementing a risk management approach within an IS program. The course introduces the student to the most common approaches and practices used by organizations worldwide. It is not intended to cover risk outside of the IS enterprise (including financial and business risks).
Certified Secure Computer User
C|SCU
Up to 100-user license of EC-Council’s Certified Secure Computer User course This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks and social engineering.
EC-Council: Aware
Being a CISO and managing a security program means understanding and implementing end user training. This is where Aware comes in! Our phishing simulations mimic real-life attack scenarios that teach your employees to spot phishing scams and avoid the hefty cost of a data breach.
"*" indicates required fields
Certified Chief Information Security Officer (C|CISO)
Ready to enroll
We have a range of learning packages to meet your needs.