SCADA & Cyber Security for Critical Infrastructure Protection

Rating:
1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5
Loading...
Please Log in or register to rate

SCADA & Cyber Security for Critical Infrastructure Protection

BIS1079

Training Class for SCADA & Cyber Security for Critical Infrastructure Protection & Access Management

Recommended Participants
  • Engineers involved with design, maintenance of critical plants
  • Operators dealing with renewable and other power technology plants
  • People involved with desalination and chemical process plants
  • Managers interested upgrading their technical knowledge
Training Options

Note: The exact content for each session to be defined based on list of participants

  • Parts A+B for people interested in SCADA education only
  • Parts B+C for people having SCADA knowledge and want cyber upgrade
  • Parts A+B+C for people interested in the full program
Course Topics

Part A: Introduction to SCADA Technology 

  • Principles of SCADA Architecture and Applications
  • Field Control units PLC, RTU, IED, IoT
  • I/O cards and Remote I/Os
  • Human Machine Interface (HMI)
  • SCADA-Data Communication
  • Complementing SCADA components
  • Sensors and Field Control Devices
  • Principles of PLC configuration

Part B: Introduction to SCADA-Cyber Security (1 Day)

  • Introduction to SCADA system Security Vulnerabilities
  • Difference between SCADA and IT systems
  • Brief introduction on security architectures
  • Principles of Encryption and Authentication
  • Cyber Defense measures for SCADA Systems
  • Anomaly detection, Defense in Depth, etc.
  • Principal operation of IDS, IPS, SIEM, DMZ, etc.
  • Remote access for maintenance and support
  • External and Internal attacking of SCADA systems
  • MitM, DOS, DDoS, Cyber resiliency, GPS spoofing
  • Security assessment, regulations, best practices
  • Principles of Access and Identity management
  • 21 steps to enhance Cyber security defense

Part C: Identity and Access management (1 Day)
Note: This part is mandatory section for CISSP Certification

  • Physical and logical access control
  • Identification and authentication of people and devices
  • IaaS – Identity as a service (e.g. cloud service providers)
  • 3rd party Identity service (on-premises solutions)
  • Cyber attack on Access Control systems
  • Identity and access provisioning lifecycle
© Copyright - Skilit - Site by Dweb