ICS (Industrial Control System) Cybersecurity Training
salesforensicacademy
579 views
22 slides
Jun 21, 2024
Slide 1 of 22
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
About This Presentation
ICS Cybersecurity training is intended for security professionals and control system designs in order to give them propelled cybersecurity aptitudes and learning in order to ensure the Industrial Control System (ICS) and keep their mechanical task condition secure against digital dangers.
Audience...
ICS Cybersecurity training is intended for security professionals and control system designs in order to give them propelled cybersecurity aptitudes and learning in order to ensure the Industrial Control System (ICS) and keep their mechanical task condition secure against digital dangers.
Audience:
Control engineers, integrators and architects
System administrators, engineers
Information Technology (IT) professionals
Security Consultants
Managers who are responsible for ICS
Researchers and analysts working on ICS security
Vendors, Executives and managers
Information technology professionals, security engineers, security analysts, policy analysts
Investors and contractors
Technicians, operators, and maintenance personnel
Size: 5 MB
Language: en
Added: Jun 21, 2024
Slides: 22 pages
Slide Content
ICS (Industrial Control System)
Security Audit Services
Call Us Today: +91 8437138319 , [email protected]
Our Clients
Radiant Solar Energies Pvt. Ltd. || TR Energy & Agro Pvt. Ltd. || Solux Energies
Audience:
Course designed for:
Control engineers & architects
System administrator , engineers
Information Technology (IT) professionals
Security Consultants
Managers who are responsible for ICS
Information Security Experts
Investors and contractors
Technicians, operators and maintenance personnel
Price: rs 8500/- Duration: 1 Month
ICS Cyber
Security Training
Forensic Academy
One Month Course
Call Us Today:
+918437138319
This exhaustive training gives you a point by point diagram of Industrial Control
System (ICS), regular system topologies and designs, diverse sort of dangers and
vulnerabilities to modern systems, and give your a well ordered method to
moderate the related dangers and keep up the security of your control system.
This course covers an assortment of topics in ICS Cybersecurity zone, for
example, ICS essentials, ICS security design, ICS vulnerabilities, ICS danger
insight, NERC Critical Infrastructure Protection (CIP), ICS chance administration
and ICS hazard appraisal. Moreover, you will find out about ICS inspecting and
evaluation, IEC 62443 standard for system security, ICS usage and advancement,
ICS occurrence reaction, ICS network assurance, ICS server insurance, SCADA
security approaches and standards, SCADA digital assaults discovery, and a
considerable measure of labs and hands on precedents.
Training Objectives
Understand fundamentals of Industrial Control Systems (ICS)
Recognize the security architecture for ICS
Identify different kinds of vulnerability in ICS network, remote devices,
software, routers, control servers etc.
Apply risk management techniques to ICS
Describe ICS Active Defense and Incident Response
Protect the ICS network from vulnerabilities
Understand different type of servers in ICS and protect them against attacks
Apply security standards to SCADA systems based on NIST SP 800-82
Detect different types of attacks to SCADA Systems
Tackle all the security challenges related to ICS cybersecurity
Training Outline
ICS cybersecurity training course consist of the following lessons, which can be
revised and tailored to the client’s need:
Fundamentals of Industrial Control System (ICS)
ICS Security Architecture
Common ICS Vulnerabilities
ICS Threat Intelligence
Risk Management and Risk Assessment
Network and System Security for ICS
Incident Response
Network Protection for ICS
ICS Server Protection
SCADA Security Policies and Standards
Detection of Cyber Attacks on SCADA Systems
Fundamentals of Industrial Control Systems (ICS):
Evolution of Industrial Control Systems (ICS)
Global Industrial Cyber Security Professional (GICSP)
ICS Industrial Sectors
Real-Time Operating Systems
SCADA Systems
ICS and IT Systems Security
System Operation
ICS Network Architecture
Network Design
Communication Protocols
ICS Security Architecture:
Network Segmentation and Segregation
Boundary Protection
Firewalls
Logically Separated Control Network
General Firewall Policies for ICS
Recommended Firewall Rules for Specific Services
Network Address Translation (NAT)
Specific ICS Firewall Issues
Unidirectional Gateways
Single Point of Failure
Authentication and Authorization
Monitoring, Logging and Auditing
Incident Detection, Response and System recovery
Common ICS Vulnerabilities:
Network Segmentation and Segregation
Boundary Protection
Firewalls
Logically Separated Control Network
General Firewall Policies for ICS
Recommended Firewall Rules for Specific Services
Network Address Translation (NAT)
Specific ICS Firewall Issues
Unidirectional Gateways
Single Point of Failure
Authentication and Authorization
Monitoring, Logging and Auditing
Incident Detection, Response and System recovery
ICS Threat Intelligence
ICS Active Defense and Incident Response
Intelligence Life Cycle and Threat Intelligence
ICS Information Attack Surface
External ICS Threat Intelligence
Internal ICS Threat Intelligence
NERC Critical Infrastructure Protection (CIP):
Introduction to CIP
NERC Functional Mode
NERC Reliability Standards
CIP History
Cyber System Categorization
Security Management Controls
CIP Processes
Audit Follow Up
CIP Industry Activities
Standards Process
Risk Management and Risk Assessment:
Risk and Manufacturing Systems
Common ICS Vulnerabilities
Threat Identification
Vulnerability Management
Industrial Consequences
Risk Classification
Risk Management Process
ICS Information Security Risk Assessment Safety
Physical Impacts of ICS Incidents
Physical Disruption of ICS Process
SCADA RISK System
ICS Auditing and Assessment:
Security Audits
Security Assessments
System Characterization
Asset Classification
Vulnerability Assessment
Configuration Assessment and Auditing
Network and System Security for ICS:
Security Feedback Loop
Security Assurance
Threat/Risk Assessment
Classes of Attackers
Management Challenges
Cybersecurity Assurance Standards
Assurance Matrix
Development Assurance
Integration Assurance
Operational Assurance
ICS Incident Response:
Incident Response and Digital Forensics
Incident Response ICS Team
Collecting Evidence
Source of Forensic Data in ICS Network
Time-Critical Analysis
Maintaining and Restoring Operations
Performing ICS Incident Response Procedures
Identifying the threat in Distributed Control Systems (DCS)
Network Protection for ICS:
Fundamentals of ICS Network
Ethernet
TCP/IP Protocol Suite
ICS Protocols Over TCP/IP
Firewalls
Unidirectional Gateways
Honeypots
Wireless in Control Systems
Satellite Protocols
Mesh Protocols
Bluetooth and WiFi
Field and Plant Floor Equipment
ICS Server Protection
ICS Windows Systems
ICS Linux/Unix Systems
Updates and patching
Processes and Services
Configuration Hardening
Endpoint Protection
Automation and Auditing
Log Management
Database and Historians
SCADA Security Policies and Standards:
SCADA Organizations and Information Architecture
SCADA Data Categorization and Ownership
Data Security in SCADA
Platform Security
Communication/ Personnel Security
Configuration Management
Audit
Applications
Physical Security
Manual Operations
SCADA Asset Protection
Steps to SCADA Cybersecurity Improvements
Detection of Cyber Attacks on SCADA Systems
Application Layers Attacks
Transport Layer Attacks
Network Layer Attacks
Modbus Protocol Attack
DNP3 Attacks
ICCP Server Attacks
OPC Server Attacks
TCP/IP Attacks
SCADA Vulnerability Scanning
Hands On, Workshops and Group Activities:
Labs
Workshops
Group Activities
Sample Workshops and Labs for ICS Cybersecurity Training:
Preliminary ICS Risk Assessment Exercise
ICS System Identification and Classification Hands On
Vulnerability Assessment Case Study
ICS Risk Assessment Experience
Incident Response Workshop
Live Attack Demonstration - hacker’s Perspective
Hacking the power Grid
Designing a SCADA Security Policy
Analyzing Modbus TCP Network Traffic with a Sniffer
Cybersecurity Training Seminars
Cybersecurity used to be thought of as a specialized, niche occupation. But with the
advance of cybercrimes over the past few years, just about everyone with access to a
laptop , desktop or mobile device has had to do something to protect their electronic
data.
Cybersecurity Diploma
IoT Security
Risk Management Framework Training
Wireless Security Training
website: https://www.forensicacademy.in/