SlideShare a Scribd company logo
4
Most read
9
Most read
10
Most read
SCADA Cybersecurity
https://www.tonex.com/training-courses/industrial-control-system-scada-cybersecurity-training/
Industrial Control System and SCADA Cybersecurity Training
Why Tonex ?
Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and
consulting services across a wide range of topics to Fortune 500 companies, government organizations,
universities and privately owned businesses from around the world.
Visit our Clients Page for a complete list of Tonex customers.
Who is TONEX for?
Tonex is for any organization in need of leading edge technology training. That includes:
Companies, from Fortune 500 to small businesses in all industries
Government agencies
Contractors and System Integrator
Defense and Military
Educational Institutes, Colleges and Universities
What types of courses are offered?
You name it, we provide it. Our courses are constantly updated to keep up with the latest technology, and we
continuously monitor business trends and world events to provide the most relevant subject matter anywhere.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Who Should Join This Training:
• IT and ICS cybersecurity personnel.
• Field support personnel and security operators.
• Auditors, vendors and team leaders.
• All individuals who need to understand the ICS and SCADA.
• Electric utility engineers working in electric industry security.
• System personnel working on system security.
• Independent system operator.
• Electric utility personnel who recently started career.
• Technicians, operators, and maintenance personnel.
• Investors and contractors.
• Managers, accountants, and executives of electric industry.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Industrial Control System (ICS) and SCADA Cybersecurity Training
Industrial Control System (ICS) and SCADA Cybersecurity preparing by TONEX will assist you with
supporting and shield your industrial control system to work in a risk free condition and strong
against developing cybersecurity dangers.
Digital assaults on basic foundations and industrial control systems particularly Supervisory
Control and Data Acquisition (SCADA) are ending up more typical for association and
governments. These sorts of assaults can extremely affect benefit, information honesty,
consistence and open wellbeing. Hence, it is required for each association to actualize a
cybersecurity way to deal with recognize chances and oversee them all together guarantee the
security of industrial control systems.
TONEX has been giving proficient classes, workshops, itemized courses and counseling
administrations in security territory since 1993 and has built up an exceptional structure which
has been turned out to be best for utility associations and partners.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Industrial Control System (ICS) and SCADA Cybersecurity preparing is composed by our experts in
cybersecurity and power system zone to utilize standard cybersecurity approaches that can be
actualized to ICS and SCADA which will keep going for significant lot of time.
Industrial Control System (ICS) and SCADA Cybersecurity preparing covers an assortment of topics
in ICS and SCADA cybersecurity, for example, essentials of ICS and SCADA, ICS and SCADA
vulnerabilities, chance administration basics, choosing and executing controls for ICS security,
ICS/SCADA system and gadget security, SCADA security program advancement, and remote
security connected to SCADA systems.
Our educators at TONEX will show you the basics of ISC and SCADA systems, part of ongoing
working systems, the distinction amongst SCADA and conveyed control systems (DCS), ICS and
SCADA systems, and correspondences in SCADA systems.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Learn about
• Common vulnerabilities in ICS and SCADA, how to detect the threats, how to find the source
of incidents, types of threats in SCADA/ICS networks, servers and mobile devices or web
attacks.
• By taking Industrial Control System (ICS) and SCADA Cybersecurity, you will learn different
approaches to manage the risk, assess the security, monitor the system and ensure the
physical security of ICS and SCADA systems in your organization.
• Learn specifically about security development for networks and mobile devices in SCADA and
ICS, wireless security of these industrial systems and protection against different types of
vulnerabilities.
• This course also offers a set of real-world case studies, hands on experiments and class
discussions in order to give you a clear idea about ICS and SCADA security, and makes you
prepared for challenges in your organization.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Audience:
Industrial Control System (ICS) and SCADA Cybersecurity preparing is a 3-day course intended for:
• IT and ICS cybersecurity staff
• Field bolster staff and security administrators
• Evaluators, merchants and group pioneers
• All people who need to understand the ICS and SCADA Protection ideas
• Electric utility architects working in electric industry security
• System faculty chipping away at system security
• System administrators and people in electric utility associations
• Free system administrator staff working with service organizations
• Electric utility work force who as of late began vocation required with ICS security.
• Experts, administrators, and support faculty who are or will work at electric service
organizations.
• Financial specialists and temporary workers who intend to make interests in electric industry
thinking about security standards.
• Administrators, bookkeepers, and officials of electric industry.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Training Objectives
Upon completion of Industrial Control System (ICS) and SCADA Cybersecurity training course, the
attendees are able to:
• Understand fundamentals of Industrial Control Systems (ICS) and SCADA systems
• Understand vulnerabilities and attacks for ICS and SCADA
• Learn about attack architectures in SCADA and ICS
• Explain risk management procedures applied to SCADA and ICS
• Identify risks in SCADA and ICS systems and conduct risk assessment
• Apply physical protection principles to SCADA and ICS systems
• Learn about security standards applied to ICS and SCADA such as NIST, ISA and CPNI
• Learn different types of servers used in ICS and SCADA and apply security concepts to servers
• Explain the concept of security in SCADA/ICS networks and preventing the attacks to
networks in these structures
• Develop and deploy security programs for SCADA and ICS
• Understand the security related issues to the wireless system in SCADA and ICS
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Training Outline
Industrial Control System (ICS) and SCADA Cybersecurity training course consists of the following
lessons, which can be revised and tailored to the client’s need:
Fundamentals of ICS and SCADA
1. Industrial Control Systems Overview
2. Global Industrial Cybersecurity Professional (GICSP)
3. Roles and Responsibilities of ICS
4. Real-time Operating Systems
5. Programmable Logic Controllers (PLC)
6. Distributed Control Systems (DCS)
7. Supervisory Control and Data Acquisition (SCADA)
8. Master Servers
9. Industrial Computing Applications and SCADA Systems
10. Communication Protocols
11. Network Design
12. Types of SCADA Networks
13. SCADA Network Operations and Management
14. Communications Media and Signals
15. SCADA Reliability, Redundancy and Safety and more…
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
ICS/SCADA Vulnerabilities
• ICS Attack Architecture
• Attacks on Human Machine Interface (HMI)
• Attacks on User Interfaces
• Potential SCADA Vulnerabilities
• Policy and Procedure Vulnerabilities
• Platform Vulnerabilities
• Network Vulnerabilities
• SCADA Network Communication Attacks
• Standardized Protocols and Technologies
• Increased Connectivity
• Insecure and Rogue Connections
• Public Information
• Possible Incident Scenarios
• Sources of Incidents
• Documented Incidents
• Web Attacks
• ICS Server Attacks
• Attacks on ICS Remote Devices
• Firmware Attacks
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Risk Management Basics
• Risk and Industrial Control Systems
• Threat Identification
• Vulnerability Management
• Industrial Consequences of Vulnerabilities
• Risk Classification
• ICS Risk Assessment
• System and Services Acquisition
• Certification, Accreditation, and Security Assessments
• Operational Controls
• Personnel Security
• Physical and Environmental Protection
• Contingency Planning
• System and Information Integrity
• Incident Response
• Awareness and Training
• Identification and Authentication
• Audit and Accountability
• Asset Classification
• System and Communications Protection
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Selecting and Implementing Controls for ICS Security
• ICS Security Assessment
• ICS Vulnerability Assessment
• Configuration Assessment and Auditing
• Risk Reduction
• Standards and Security Controls Applied to ICS (NIST, ISA and CPNI)
• ICS Security Technologies
ICS/SCADA Server Security
• Different Server Types Used in ICS
• Windows Operating Systems in ICS
• Linux/Unix Operating Systems in ICS
• Endpoint Protection
• Automation and Auditing
• Log Management for ICS Servers
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
ICS
SCADA
Industrial Control System
Supervisory Control and Data Acquisition
ICS/SCADA Network and Device Security
• Fundamentals of Networks
• Ethernet, TCP/IP Protocol
• ICS Protocol Architectures
• Firewalls and Gateways
• Honeypots
• ICS Wireless Systems
• Satellite, Mesh, Wi-Fi, and Bluetooth Systems
• SCADA Security Network Architecture
• Firewalls and Logically Separated Control Network
• Network Segregation
• Specific SCADA Firewall Issues
• Data Historians
• Remote Support Access
• Multicast Traffic
• Single Points of Failure
• Redundancy and Fault Tolerance
• Preventing Man-in-the-Middle Attacks
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
SCADA Security Program Development and Deployment
• Business Case for Security
• Potential Consequences
• Key Components of the Business Case
• Resources for Building Business Case
• Presenting the Business Case to Leadership
• Developing a Comprehensive Security Program
Wireless Security Applied to SCADA
• Overview of Current Wireless Technologies
• 11, 802.15 and 802.16 Technologies
• Overview of Wireless Security
• WEP
• TKIP and the WPA/WPA2
• IEEE 802.11i
• Authentication, Encryption, and Integrity Methods
• Cellular/Mobile Interworking
• LTE application in SCADA
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
Hands On, Workshops, and Group Activities
• Labs
• Workshops
• Group Activities
Sample Workshops and Labs for Industrial Control Systems and SCADA Security
• ICS Risk Assessment Exercise
• ICS System Identification and Classification Case Study
• ICS Vulnerability Assessment and Compliance Auditing
• Risk Assessment Case Study for ICS and Selecting Security Controls
• Host Based Intrusion Prevention Systems
• Industrial Firewall Inspection Case
• Modbus Communication Network Attacks
• Incident Response and Risk Management Case Study
SCADA CYBERSECURITY
SCADA CYBERSECURITY TRAINING
Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience,
course length, pricing, course objectives, course outline, etc.
SCADA Cybersecurity Training
Request More Information
Industrial Control System and
SCADA Cybersecurity Training
https://www.tonex.com/training-courses/industrial-control-system-scada-cybersecurity-training/
SCADA Cybersecurity Training

More Related Content

PPTX
Information Security Management System ISO/IEC 27001:2005
PPTX
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
PPTX
Usulanuntukwg1danwg2dandata28 feb2017
PDF
Iso27001- Nashwan Mustafa
PPSX
Isms Implementer Course Module 1 Introduction To Information Security
PDF
CyCron 2016
PPT
Introduction to Information System Security
PPS
ISO 27001 2013 isms final overview
Information Security Management System ISO/IEC 27001:2005
Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016
Usulanuntukwg1danwg2dandata28 feb2017
Iso27001- Nashwan Mustafa
Isms Implementer Course Module 1 Introduction To Information Security
CyCron 2016
Introduction to Information System Security
ISO 27001 2013 isms final overview

What's hot (20)

PDF
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
PDF
Reports on Industrial Control Systems’ Cyber Security
PDF
Industrial Control Cyber Security Europe 2015
PPTX
All you wanted to know about iso 27000
PDF
ISO/IEC 27001:2013 An Overview
PDF
A to Z of Information Security Management
PPT
information security management
PPT
4 System For Information Security
PDF
Cyber Security Management
PPTX
Information security management system
PPT
5 Standards And Recommendations For Information Security On Internet
PPT
ISO 27001 - Information Security Management System
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PPTX
Know more about exin unique information security program
PDF
Industrial Control Security USA Sacramento California Oct 13/14
DOC
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
PDF
Cloud assisted io t-based scada systems security- a review of the state of th...
PDF
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
PPTX
Usulan untuk wg1 dan wg2 serta kualitas data pada kaminfo 12 agustus 2015
PDF
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
Iidss 2017 sarwono sutikno arwin sumari (cps in defense)
Reports on Industrial Control Systems’ Cyber Security
Industrial Control Cyber Security Europe 2015
All you wanted to know about iso 27000
ISO/IEC 27001:2013 An Overview
A to Z of Information Security Management
information security management
4 System For Information Security
Cyber Security Management
Information security management system
5 Standards And Recommendations For Information Security On Internet
ISO 27001 - Information Security Management System
ISO 27001 - Information security user awareness training presentation - part 3
Know more about exin unique information security program
Industrial Control Security USA Sacramento California Oct 13/14
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Cloud assisted io t-based scada systems security- a review of the state of th...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
Usulan untuk wg1 dan wg2 serta kualitas data pada kaminfo 12 agustus 2015
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
Ad

Similar to SCADA Cybersecurity Training (20)

PPTX
ICS (Industrial Control System) Cybersecurity Training
PDF
ICS (Industrial Control System) Cybersecurity Training
PPTX
SCADA Security Training
PDF
SCADA and Control Systems Security Summit
PDF
Cybersecurity For Industrial Control Systems Scada Dcs Plc Hmi And Sis 1st Ed...
PDF
How to Get into ICS Security byChris Sistrunk
PPTX
Hacker Halted 2016 - How to get into ICS security
PDF
Using The Isaiec 62443 Standard To Secure Your Control Systems Course Ic32e O...
PDF
Nist 800 82
DOCX
6000 Broken Sound Parkway, NW Suite 300, Boca Raton, FL 3348.docx
PDF
115.pdf
PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
PDF
TI Safe ICS Cybersecurity Training
PDF
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
DTS Solution - SCADA Security Solutions
PPTX
Ics presentation
PPTX
BSidesAugusta 2015 - How to get into ICS security
PDF
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
PDF
RSAC 2016: How to Get into ICS Security
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
SCADA Security Training
SCADA and Control Systems Security Summit
Cybersecurity For Industrial Control Systems Scada Dcs Plc Hmi And Sis 1st Ed...
How to Get into ICS Security byChris Sistrunk
Hacker Halted 2016 - How to get into ICS security
Using The Isaiec 62443 Standard To Secure Your Control Systems Course Ic32e O...
Nist 800 82
6000 Broken Sound Parkway, NW Suite 300, Boca Raton, FL 3348.docx
115.pdf
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
TI Safe ICS Cybersecurity Training
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
DTS Solution - SCADA Security Solutions
Ics presentation
BSidesAugusta 2015 - How to get into ICS security
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
RSAC 2016: How to Get into ICS Security
Ad

More from Tonex (20)

PPTX
5G AI & Digital Twins Training Course
PPTX
MBSE for Dod, Digital Engineering Training
PPTX
Engineering Project Management Training, Learn the PMI keys, Project manageme...
PPTX
Revenue Assurance (RA), Telecom RA Training Course
PPTX
5G Systems Engineering Training
PPTX
Root Cause Analysis Training
PPTX
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
PPTX
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
PPTX
Cybersecurity Hands-On Training
PPTX
Bluetooth Low Energy BLE, Hands-On Training
PPTX
Learn how manufacturers use root cause analysis, rca training for manufacturers
PPTX
Spacecraft MBSE-SysML, Hands-On Training
PPTX
CBRS
PPTX
C Programming and Coding Standards, Learn C Programming
PPTX
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
PPTX
Cyber Security Certificate Training
PPTX
Electronic Warfare Threat Modeling and Simulation Training
PPTX
Join Business Writing Skills Training and Write clear
PPTX
Conflict Management Training, Learn The Causes Of Conflict
PPTX
Big Data for Project and Program Managers
5G AI & Digital Twins Training Course
MBSE for Dod, Digital Engineering Training
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Revenue Assurance (RA), Telecom RA Training Course
5G Systems Engineering Training
Root Cause Analysis Training
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Cybersecurity Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
Learn how manufacturers use root cause analysis, rca training for manufacturers
Spacecraft MBSE-SysML, Hands-On Training
CBRS
C Programming and Coding Standards, Learn C Programming
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Cyber Security Certificate Training
Electronic Warfare Threat Modeling and Simulation Training
Join Business Writing Skills Training and Write clear
Conflict Management Training, Learn The Causes Of Conflict
Big Data for Project and Program Managers

Recently uploaded (20)

PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Internet___Basics___Styled_ presentation
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Database Information System - Management Information System
PPTX
artificial intelligence overview of it and more
PPTX
Introduction to Information and Communication Technology
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificialintelligenceai1-copy-210604123353.pptx
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Tenda Login Guide: Access Your Router in 5 Easy Steps
presentation_pfe-universite-molay-seltan.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Internet___Basics___Styled_ presentation
Job_Card_System_Styled_lorem_ipsum_.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Database Information System - Management Information System
artificial intelligence overview of it and more
Introduction to Information and Communication Technology
Paper PDF World Game (s) Great Redesign.pdf
artificialintelligenceai1-copy-210604123353.pptx
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Module 1 - Cyber Law and Ethics 101.pptx
Sims 4 Historia para lo sims 4 para jugar
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
newyork.pptxirantrafgshenepalchinachinane
isotopes_sddsadsaadasdasdasdasdsa1213.ppt

SCADA Cybersecurity Training

  • 2. Why Tonex ? Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services across a wide range of topics to Fortune 500 companies, government organizations, universities and privately owned businesses from around the world. Visit our Clients Page for a complete list of Tonex customers. Who is TONEX for? Tonex is for any organization in need of leading edge technology training. That includes: Companies, from Fortune 500 to small businesses in all industries Government agencies Contractors and System Integrator Defense and Military Educational Institutes, Colleges and Universities What types of courses are offered? You name it, we provide it. Our courses are constantly updated to keep up with the latest technology, and we continuously monitor business trends and world events to provide the most relevant subject matter anywhere. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 3. Who Should Join This Training: • IT and ICS cybersecurity personnel. • Field support personnel and security operators. • Auditors, vendors and team leaders. • All individuals who need to understand the ICS and SCADA. • Electric utility engineers working in electric industry security. • System personnel working on system security. • Independent system operator. • Electric utility personnel who recently started career. • Technicians, operators, and maintenance personnel. • Investors and contractors. • Managers, accountants, and executives of electric industry. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 4. Industrial Control System (ICS) and SCADA Cybersecurity Training Industrial Control System (ICS) and SCADA Cybersecurity preparing by TONEX will assist you with supporting and shield your industrial control system to work in a risk free condition and strong against developing cybersecurity dangers. Digital assaults on basic foundations and industrial control systems particularly Supervisory Control and Data Acquisition (SCADA) are ending up more typical for association and governments. These sorts of assaults can extremely affect benefit, information honesty, consistence and open wellbeing. Hence, it is required for each association to actualize a cybersecurity way to deal with recognize chances and oversee them all together guarantee the security of industrial control systems. TONEX has been giving proficient classes, workshops, itemized courses and counseling administrations in security territory since 1993 and has built up an exceptional structure which has been turned out to be best for utility associations and partners. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 5. Industrial Control System (ICS) and SCADA Cybersecurity preparing is composed by our experts in cybersecurity and power system zone to utilize standard cybersecurity approaches that can be actualized to ICS and SCADA which will keep going for significant lot of time. Industrial Control System (ICS) and SCADA Cybersecurity preparing covers an assortment of topics in ICS and SCADA cybersecurity, for example, essentials of ICS and SCADA, ICS and SCADA vulnerabilities, chance administration basics, choosing and executing controls for ICS security, ICS/SCADA system and gadget security, SCADA security program advancement, and remote security connected to SCADA systems. Our educators at TONEX will show you the basics of ISC and SCADA systems, part of ongoing working systems, the distinction amongst SCADA and conveyed control systems (DCS), ICS and SCADA systems, and correspondences in SCADA systems. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 6. Learn about • Common vulnerabilities in ICS and SCADA, how to detect the threats, how to find the source of incidents, types of threats in SCADA/ICS networks, servers and mobile devices or web attacks. • By taking Industrial Control System (ICS) and SCADA Cybersecurity, you will learn different approaches to manage the risk, assess the security, monitor the system and ensure the physical security of ICS and SCADA systems in your organization. • Learn specifically about security development for networks and mobile devices in SCADA and ICS, wireless security of these industrial systems and protection against different types of vulnerabilities. • This course also offers a set of real-world case studies, hands on experiments and class discussions in order to give you a clear idea about ICS and SCADA security, and makes you prepared for challenges in your organization. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 7. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 8. Audience: Industrial Control System (ICS) and SCADA Cybersecurity preparing is a 3-day course intended for: • IT and ICS cybersecurity staff • Field bolster staff and security administrators • Evaluators, merchants and group pioneers • All people who need to understand the ICS and SCADA Protection ideas • Electric utility architects working in electric industry security • System faculty chipping away at system security • System administrators and people in electric utility associations • Free system administrator staff working with service organizations • Electric utility work force who as of late began vocation required with ICS security. • Experts, administrators, and support faculty who are or will work at electric service organizations. • Financial specialists and temporary workers who intend to make interests in electric industry thinking about security standards. • Administrators, bookkeepers, and officials of electric industry. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 9. Training Objectives Upon completion of Industrial Control System (ICS) and SCADA Cybersecurity training course, the attendees are able to: • Understand fundamentals of Industrial Control Systems (ICS) and SCADA systems • Understand vulnerabilities and attacks for ICS and SCADA • Learn about attack architectures in SCADA and ICS • Explain risk management procedures applied to SCADA and ICS • Identify risks in SCADA and ICS systems and conduct risk assessment • Apply physical protection principles to SCADA and ICS systems • Learn about security standards applied to ICS and SCADA such as NIST, ISA and CPNI • Learn different types of servers used in ICS and SCADA and apply security concepts to servers • Explain the concept of security in SCADA/ICS networks and preventing the attacks to networks in these structures • Develop and deploy security programs for SCADA and ICS • Understand the security related issues to the wireless system in SCADA and ICS SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 10. Training Outline Industrial Control System (ICS) and SCADA Cybersecurity training course consists of the following lessons, which can be revised and tailored to the client’s need: Fundamentals of ICS and SCADA 1. Industrial Control Systems Overview 2. Global Industrial Cybersecurity Professional (GICSP) 3. Roles and Responsibilities of ICS 4. Real-time Operating Systems 5. Programmable Logic Controllers (PLC) 6. Distributed Control Systems (DCS) 7. Supervisory Control and Data Acquisition (SCADA) 8. Master Servers 9. Industrial Computing Applications and SCADA Systems 10. Communication Protocols 11. Network Design 12. Types of SCADA Networks 13. SCADA Network Operations and Management 14. Communications Media and Signals 15. SCADA Reliability, Redundancy and Safety and more… SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 11. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 12. ICS/SCADA Vulnerabilities • ICS Attack Architecture • Attacks on Human Machine Interface (HMI) • Attacks on User Interfaces • Potential SCADA Vulnerabilities • Policy and Procedure Vulnerabilities • Platform Vulnerabilities • Network Vulnerabilities • SCADA Network Communication Attacks • Standardized Protocols and Technologies • Increased Connectivity • Insecure and Rogue Connections • Public Information • Possible Incident Scenarios • Sources of Incidents • Documented Incidents • Web Attacks • ICS Server Attacks • Attacks on ICS Remote Devices • Firmware Attacks SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 13. Risk Management Basics • Risk and Industrial Control Systems • Threat Identification • Vulnerability Management • Industrial Consequences of Vulnerabilities • Risk Classification • ICS Risk Assessment • System and Services Acquisition • Certification, Accreditation, and Security Assessments • Operational Controls • Personnel Security • Physical and Environmental Protection • Contingency Planning • System and Information Integrity • Incident Response • Awareness and Training • Identification and Authentication • Audit and Accountability • Asset Classification • System and Communications Protection SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 14. Selecting and Implementing Controls for ICS Security • ICS Security Assessment • ICS Vulnerability Assessment • Configuration Assessment and Auditing • Risk Reduction • Standards and Security Controls Applied to ICS (NIST, ISA and CPNI) • ICS Security Technologies ICS/SCADA Server Security • Different Server Types Used in ICS • Windows Operating Systems in ICS • Linux/Unix Operating Systems in ICS • Endpoint Protection • Automation and Auditing • Log Management for ICS Servers SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 15. SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc. ICS SCADA Industrial Control System Supervisory Control and Data Acquisition
  • 16. ICS/SCADA Network and Device Security • Fundamentals of Networks • Ethernet, TCP/IP Protocol • ICS Protocol Architectures • Firewalls and Gateways • Honeypots • ICS Wireless Systems • Satellite, Mesh, Wi-Fi, and Bluetooth Systems • SCADA Security Network Architecture • Firewalls and Logically Separated Control Network • Network Segregation • Specific SCADA Firewall Issues • Data Historians • Remote Support Access • Multicast Traffic • Single Points of Failure • Redundancy and Fault Tolerance • Preventing Man-in-the-Middle Attacks SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 17. SCADA Security Program Development and Deployment • Business Case for Security • Potential Consequences • Key Components of the Business Case • Resources for Building Business Case • Presenting the Business Case to Leadership • Developing a Comprehensive Security Program Wireless Security Applied to SCADA • Overview of Current Wireless Technologies • 11, 802.15 and 802.16 Technologies • Overview of Wireless Security • WEP • TKIP and the WPA/WPA2 • IEEE 802.11i • Authentication, Encryption, and Integrity Methods • Cellular/Mobile Interworking • LTE application in SCADA SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 18. Hands On, Workshops, and Group Activities • Labs • Workshops • Group Activities Sample Workshops and Labs for Industrial Control Systems and SCADA Security • ICS Risk Assessment Exercise • ICS System Identification and Classification Case Study • ICS Vulnerability Assessment and Compliance Auditing • Risk Assessment Case Study for ICS and Selecting Security Controls • Host Based Intrusion Prevention Systems • Industrial Firewall Inspection Case • Modbus Communication Network Attacks • Incident Response and Risk Management Case Study SCADA CYBERSECURITY SCADA CYBERSECURITY TRAINING Learn about Industrial Control System and SCADA Cybersecurity Training and courses audience, course length, pricing, course objectives, course outline, etc.
  • 20. Request More Information Industrial Control System and SCADA Cybersecurity Training https://www.tonex.com/training-courses/industrial-control-system-scada-cybersecurity-training/