IE156: ICS410: ICS/SCADA Security Essentials

Size: px
Start display at page:

Download "IE156: ICS410: ICS/SCADA Security Essentials"

Transcription

1 IE156: ICS410: ICS/SCADA Security Essentials IE156 Rev.001 CMCT COURSE OUTLINE Page 1 of 6

2 Training Description: In this five-day intensive training, participants will develop and reinforce a common language and understanding of Industrial Control System (ICS) cybersecurity as well as the important considerations that come with cyber-to-physical operations within these environments. Instructor will demonstrate of PLC sample which contains physical inputs and outputs that will be programmed in class and mapped to an operator interface, or HMI, also created in class. This improved hardware-enabled approach provides the necessary cyber-to-physical knowledge that allows participants to better understand important ICS operational drivers and constraints that require specific safety protection, communications needs, system management approaches, and cybersecurity implementations. Essential terms, architectures, methodologies, and devices are all covered to build a common language for students from a variety of different roles. The course will discuss: An understanding of industrial control system components, purposes, deployments, significant drivers, and constraints. Hands-on lab learning experiences to control system attack surfaces, methods, and tools Control system approaches to system and network defense architectures and techniques Incident-response skills in a control system environment Governance models and resources for industrial cybersecurity professionals Training Objective: By the end of the training, participants will be able to: Run Windows command line tools to analyze the system looking for high-risk items Run Linux command line tools (ps, ls, netstat, ect) and basic scripting to automate the running of programs to perform continuous monitoring of various tools Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems Better understand various industrial control systems and their purpose, application, function, and dependencies on network IP and industrial communications Work with operating systems (system administration concepts for Unix/Linux and/or Windows operating systems) Work with network infrastructure design (network architecture concepts, including topology, protocols, and components) Better understand the systems' security lifecycle Better understand information assurance principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation) Use your skills in computer network defense (detecting host and network-based intrusions via intrusion detection technologies) Implement incident response and handling methodologies IE156 Rev.001 CMCT COURSE OUTLINE Page 2 of 6

3 Training Designed for: This course is intended for the range of individuals who work in, interact with, or can affect industrial control system environments, including asset owners, vendors, integrators, and other third parties. These personnel primarily come from four domains; IT (includes operational technology support), IT security (includes operational technology security), Engineering, Corporate, industry, and professional standards Training Program: DAY ONE: PRE-TEST ICS Overview Global Industrial Cybersecurity Professional (GICSP) Overview Overview of ICS Processes & Roles Industries Field Components Real-Time Operating Systems Programming Controllers Exercise: PLC Programming Supervisory Components Specialized Applications Master Servers Exercise: HMI Programming Types of ICS Systems DCS vs. SCADA IT & ICS Differences ICS Lifecycle Challenges Physical Security ICS Network Architecture Network Models Design Example Exercise: Architecting a Secure DCS DAY TWO: ICS Attack Surface Exercise: Information Leakage Attacks on HMIs and UIs Intro to SamuraiSTFU Exercise: Password Fuzzing Web Attacks Exercise: Authentication Bypass with SQL Injection Attacks on Control Servers IE156 Rev.001 CMCT COURSE OUTLINE Page 3 of 6

4 Attacks on Network Communications Exercise: Spoofing Modbus Attacks on Remote Devices Exercise: Analyzing Firmware Firmware Attacks DAY THREE: Defending ICS Servers and Workstations Windows in ICS Linux/Unix in ICS Updates and Patching Processes and Services Configuration Hardening Exercise: Bastille Linux Endpoint Defenses Exercise: Firewalls Automation and Auditing Exercise: Powershell Log Management Exercise: Windows Logs Databases and Historians DAY FOUR: Defending ICS Networks and Devices Network Fundamentals Ethernet TCP/IP Protocol Suite ICS Protocols over TCP/IP Exercise: Network Capture Analysis Enforcement Zone Devices Firewalls Unidirectional Gateways Honeypots Wireless in Control Systems Satellite Protocols Mesh Protocols Bluetooth and WiFi Defenses Exercise: Network Capture Forensics Field and Plant Floor Equipment Cryptography Fundamentals DAY FIVE: ICS Security Governance IE156 Rev.001 CMCT COURSE OUTLINE Page 4 of 6

5 Information Assurance Foundations Data Classification Depth in Defense Security Policies Policy Hierarchy Policy Governance Contingency and Continuity Planning Risk Assessment and Auditing Risk Governance Calculating Risk Exercise: Attack Tree Analysis Password Management Incident Handling Six Steps Table Top Exercise Exercise: Incident Response Resources Course Conclusion POST-TEST and EVALUATION Training Requirement: The ICS410 Industrial Control System Security Essentials course consists of instruction and hands-on exercises. The exercises are designed to allow participants to put knowledge gained throughout the course into practice in an instructor-led environment. Participants will have the opportunity to install, configure, and use the tools and techniques that they have learned. Do not bring a regular production laptop for this training. When installing software, there is always a chance of breaking something else on the system. Participants should assume that all data could be lost. It is critical that participants have administrator access to the operating system and the ability to disable all security software installed. Changes may need to be made to personal firewalls and other host-based software in order for the labs to work. Laptop requirements include the following: 64-bit processor with 64-bit operating system VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs At least eight (8) GB of RAM At least fifty (50) GB of free hard drive space At least one USB port VMware Player 12, VMware Workstation 12, or VWware Fusion 8 installed BEFORE class. Other virtualization software such as Parallels or VirtualBox may work if the attendee is familiar with its functionality, however VMware should be pre-installed as a backup just in case IE156 Rev.001 CMCT COURSE OUTLINE Page 5 of 6

6 Access to an account with administrative permissions and the ability to disable all security software on their laptop such as Antivirus and/or firewalls if needed for the class If you are using Linux for your host machine, you will need ExFAT drivers installed for the USB drive Training Methodology: This interactive training course includes the following training methodologies as a percentage of the total tuition hours:- 30% Lectures, Concepts, Role Play 30% Workshops & Work Presentations, Techniques 20% Based on Case Studies & Practical Exercises 20% Videos, Software & General Discussions Pre and Post Test Training Certificate(s): Internationally recognized certificate(s) will be issued to each participant who completed the course. Training Fees: As per the course location - This rate includes participant s manual, hand-outs, buffet lunch, coffee/tea on arrival, morning & afternoon of each day. Training Timings: Daily Timings: 07:45-08:00 Morning Coffee / Tea 08:00-10:00 First Session 10:00-10:20 Recess (Coffee/Tea/Snacks) 10:20-12:20 Second Session 12:20-13:30 Recess (Prayer Break & Lunch) 13:30-15:00 Last Session For training registrations or in-house enquiries, please contact: Aisha Relativo: aisha@cmc-me.com Tel.: or Mob.: Training & Career Development Department IE156 Rev.001 CMCT COURSE OUTLINE Page 6 of 6

IT081: Administering Microsoft SQL Server 2012

IT081: Administering Microsoft SQL Server 2012 IT081: Administering Microsoft SQL Server 2012 IT081 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: In this course, participants will gain the knowledge and skills to maintain a Microsoft

More information

PM029: Project Management Professional (Preparation)

PM029: Project Management Professional (Preparation) PM029: Project Management Professional (Preparation) PM029 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: The overall aim of this course is to prepare participants for the Project Management

More information

IT088-3D: Advanced Microsoft Access

IT088-3D: Advanced Microsoft Access IT088-3D: Advanced Microsoft Access IT088-3D Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: Your training and experience using Microsoft Access has given you basic database management skills

More information

IE102: SCADA Programming, Maintenance & Troubleshooting

IE102: SCADA Programming, Maintenance & Troubleshooting IE102: SCADA Programming, Maintenance & Troubleshooting IE102 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This course is designed to provide a thorough understanding of the fundamental

More information

ME029: Certified Maintenance & Reliability Professional (CMRP)

ME029: Certified Maintenance & Reliability Professional (CMRP) ME029: Certified Maintenance & Reliability Professional (CMRP) ME029 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This interactive course covers Maintenance Reliability best practices

More information

IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting

IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting IE100: Siemens SIMATIC S7 Maintenance, Configuration & Troubleshooting IE100 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This course introduces to a Siemens integrated automation system.

More information

IT092: Implementing CISCO Data Center Unified Fabric

IT092: Implementing CISCO Data Center Unified Fabric IT092: Implementing CISCO Data Center Unified Fabric IT092 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: This intensive course covers all topics in the Cisco DCUFI v5 course, along with

More information

IE034: PLC & SCADA for Automation & Process Control

IE034: PLC & SCADA for Automation & Process Control IE034: PLC & SCADA for Automation & Process Control IE034 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: This course presents to give the participants the knowledge required in industrial

More information

EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination

EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination EE076: Load Flow Analysis, Short Circuit Calculations & Protection Coordination EE076 Rev.001 CMCT COURSE OUTLINE Page 1 of 6 Training Description: This course provides a comprehensive review of the fundamental

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

AL045: Laboratory Information Management System (LIMS)

AL045: Laboratory Information Management System (LIMS) AL045: Laboratory Information Management System (LIMS) AL045 Rev.001 CMCT COURSE OUTLINE Page 1 of 5 Training Description: A Laboratory Information Management System (LIMS) is computer software that is

More information

IT115: Oracle Database 12c Administration I

IT115: Oracle Database 12c Administration I IT115: Oracle Database 12c Administration I IT115 Rev.001 CMCT COURSE OUTLINE Page 1 of 12 Training Description: In this training, participants will focus on configuration on supported systems. Also, how

More information

IT100: Oracle Administration

IT100: Oracle Administration IT100: Oracle Administration IT100 Rev.001 CMCT COURSE OUTLINE Page 1 of 8 Training Description: Introduction to Oracle Administration and Management is a five-day course designed to provide Oracle professionals

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

PMP085 PMP Program: Planning and Implementing Project Management Office (PMO)

PMP085 PMP Program: Planning and Implementing Project Management Office (PMO) PMP085 PMP Program: Planning and Implementing Project Management Office (PMO) H.H. Sheikh Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: Over the last

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

Training Fees 4,250 US$ per participant for Public Training includes Materials/Handouts, tea/coffee breaks, refreshments & Buffet Lunch

Training Fees 4,250 US$ per participant for Public Training includes Materials/Handouts, tea/coffee breaks, refreshments & Buffet Lunch Training Title PLC & SCADA SYSTEMS Training Duration 5 days Training Venue and Dates REF IC012 PLC & SCADA Systems 5 04-08 Feb $4,250 Abu Dhabi, UAE Training Fees 4,250 US$ per participant for Public Training

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Training on CREST Practitioner Security Analyst (CPSA)

Training on CREST Practitioner Security Analyst (CPSA) 1 Training on CREST Practitioner Security Analyst (CPSA) Objectives This programme introduces to you to the CPSA, CREST Practitioner Security Analyst, and certification. This instructor led course covers

More information

Industrial Control Systems November 18, 2015

Industrial Control Systems November 18, 2015 Industrial Control Systems November 18, 2015 ABOUT SANS - TRAINING SANS provides intensive, hands-on, immersion training Highest quality 70+ courses covering basic security skills to cutting edge topics

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic

More information

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Training Venue and Dates September, 2019 $4,000 Dubai, UAE PLC & SCADA Systems Trainings will be conducted in any of the 5 star hotels.

Training Venue and Dates September, 2019 $4,000 Dubai, UAE PLC & SCADA Systems Trainings will be conducted in any of the 5 star hotels. Training Title PLC & SCADA SYSTEMS Training Duration 5 days Training Venue and Dates 5 15-19 September, 2019 $4,000 Dubai, UAE PLC & SCADA Systems Trainings will be conducted in any of the 5 star hotels.

More information

LATEST/ADVANCED COMMUNICATION PROTOCOLS USED IN SCADA SYSTEMS

LATEST/ADVANCED COMMUNICATION PROTOCOLS USED IN SCADA SYSTEMS Training Title LATEST/ADVANCED COMMUNICATION PROTOCOLS USED IN SCADA SYSTEMS Training Duration 5 days Training Date Latest/Advanced Communication Protocols used in SCADA Systems 5 1-5 June $3,750 Dubai,

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

"Charting the Course to Your Success!" Securing.Net Web Applications Lifecycle Course Summary

Charting the Course to Your Success! Securing.Net Web Applications Lifecycle Course Summary Course Summary Description Securing.Net Web Applications - Lifecycle is a lab-intensive, hands-on.net security training course, essential for experienced enterprise developers who need to produce secure.net-based

More information

Hands-On CompTIA A+ Essentials / Practical Application Certification

Hands-On CompTIA A+ Essentials / Practical Application Certification Hands-On Hands-On CompTIA A+ Essentials / Practical Application Certification Course Description This course meets the NEW DoD Directive 8140 requirements. Will Department of Defense (DoD) Directive 8140

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure

More information

ADVANCED. Protection Co-ordination. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E

ADVANCED. Protection Co-ordination. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E ADVANCED Protection Co-ordination H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: Distribution Networks are designed to serve loads in a

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

IT Foundations Networking Specialist Certification with Exam

IT Foundations Networking Specialist Certification with Exam IT Foundations Networking Specialist Certification with Exam MSIT113 / 200 Hours / 12 Months / Self-Paced / Materials Included Course Overview: Gain hands-on expertise in CompTIA A+ certification exam

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Improving SCADA System Security

Improving SCADA System Security Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen - Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security

More information

Entry Level Assessment Blueprint Computer Networking Fundamentals

Entry Level Assessment Blueprint Computer Networking Fundamentals Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment safety and maintenance

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

Cyber Security for Process Control Systems ABB's view

Cyber Security for Process Control Systems ABB's view Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control

More information

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students

More information

Addressing Cyber Threats in Power Generation and Distribution

Addressing Cyber Threats in Power Generation and Distribution Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems

More information

REF IC012 PLC & SCADA Systems Feb $4,250 Abu Dhabi, UAE

REF IC012 PLC & SCADA Systems Feb $4,250 Abu Dhabi, UAE Training Title PLC & SCADA SYSTEMS Training Duration 5 days Training Venue and Dates REF IC012 PLC & SCADA Systems 5 05 09 Feb $4,250 Abu Dhabi, UAE Training Fees 4,250 US$ per participant for Public Training

More information

SANS SCADA and Process Control Europe Rome 2011

SANS SCADA and Process Control Europe Rome 2011 SANS SCADA and Process Control Europe Rome 2011 Ian Buffey Director International Services Industrial Defender ibuffey@industrialdefender.com A Holistic Approach Planning, training and governance Cybersecurity

More information

Practical SCADA Cyber Security Lifecycle Steps

Practical SCADA Cyber Security Lifecycle Steps Practical SCADA Cyber Security Lifecycle Steps Standards Certification Jim McGlone CMO, Kenexis Education & Training Publishing Conferences & Exhibits Bio Jim McGlone, CMO, Kenexis GICSP ISA Safety & Security

More information

IMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led

IMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IMPLEMENTING A DESKTOP INFRASTRUCTURE Course: 20415A Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This 5-day instructor-led course provides you with

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018 Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018 Cybersecurity Opportunities Cybercrime Costs Security Spending Cybersecurity Ventures: Cybersecurity Market

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding

More information

ADVANCED MS. Access. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E

ADVANCED MS. Access. H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E ADVANCED MS Access H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: This advanced Microsoft Access training course will build on your existing

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Copyright 2016. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint

More information

Cybersecurity Training

Cybersecurity Training Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with

More information

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP

More information

Connectivity 101 for Remote Monitoring Systems

Connectivity 101 for Remote Monitoring Systems Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Implementing Desktop Application Environments

Implementing Desktop Application Environments Implementing Desktop Application Environments Course # Exam: Prerequisites Technology: Delivery Method: Length: 20416 70-416 20415 Windows Server Instructor-led (classroom) 5 Days Overview About this Course

More information

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting Hands-On WAN: Design - Deployment - Performance - Troubleshooting Course Description This highly intense, vendor neutral, Hands-On 5-day course provides an in depth exploration of Wide Area Networking

More information

PRACTICAL NETWORK DEFENSE VERSION 1

PRACTICAL NETWORK DEFENSE VERSION 1 PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

GUIDE. MetaDefender Kiosk Deployment Guide

GUIDE. MetaDefender Kiosk Deployment Guide GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect

More information

ISDP 2018 Industry Skill Development Program In association with

ISDP 2018 Industry Skill Development Program In association with ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the

More information

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS Can You Answer These Questions? 1 What s my company s exposure to the latest industrial cyber threat? Are my plants

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

CSWAE Certified Secure Web Application Engineer

CSWAE Certified Secure Web Application Engineer CSWAE Certified Secure Web Application Engineer Overview Organizations and governments fall victim to internet based attacks every day. In many cases, web attacks could be thwarted but hackers, organized

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

T22 - Industrial Control System Security

T22 - Industrial Control System Security T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

ADVANCED SCADA CONTROL SYSTEMS

ADVANCED SCADA CONTROL SYSTEMS Training Title ADVANCED SCADA CONTROL SYSTEMS Training Duration 5 days Training Venue and Dates Advanced SCADA Control System 5 08 12 Sep $3,750 Abu Dhabi, UAE In any of the 5 star hotel. The exact venue

More information

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich

RIPE RIPE-17. Table of Contents. The Langner Group. Washington Hamburg Munich RIPE RIPE-17 Table of Contents The Langner Group Washington Hamburg Munich RIPE Operations Technology Management Plan (MP-17) 0.1 Purpose... 4 0.2 Process Overview... 4 0.3 Implementation Scope... 5 0.4

More information

Course Fees: 850 euro

Course Fees: 850 euro In conjuction with: Prishtinë: 19.02.2015. Offer: 2M Consulting & PECB, ISO 27001:2013 Lead Auditor Training Lecturer: Msc. CMC, Lekë Zogaj, Master ISO/IEC ISO 27001:2013 Convenient ISMS Lead Auditor Training

More information

Firewalls (IDS and IPS) MIS 5214 Week 6

Firewalls (IDS and IPS) MIS 5214 Week 6 Firewalls (IDS and IPS) MIS 5214 Week 6 Agenda Defense in Depth Evolution of IT risk in automated control systems Security Domains Where to put firewalls in an N-Tier Architecture? In-class exercise Part

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience

More information

2018 Cyber Mission Training Course Catalog

2018 Cyber Mission Training Course Catalog 2018 Cyber Mission Training Catalog 7740 Milestone Parkway, Suite 150 Hanover, Maryland 21076 2018 copyrighted by the KeyW Corp. All rights reserved. KeyWCorp.com/cyber-mission-training TABLE OF CONTENTS

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

Kaspersky Industrial Cybersecurity Training Program

Kaspersky Industrial Cybersecurity Training Program Kaspersky Lab ICS CERT Kaspersky Lab ICS CERT Kaspersky Industrial Cybersecurity Training Program Training with Kaspersky Lab ICS CERT Courses 2018 2019 Table of Contents Courses 2018 2019 1 Intro Our

More information

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4) Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT

More information

System Wide Awareness Training. your cyber vulnerabilities. your critical control systems

System Wide Awareness Training. your cyber vulnerabilities. your critical control systems Standards Certification Education & Training Publishing Conferences & Exhibits your cyber vulnerabilities your critical control systems Early- Bird Discount Save $250 when you register by 15 December!

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom WEAT Webinar Who Goes There? Access Control in Water/Wastewater Siemens AG 2018. siemens.com/ruggedcom ACCESS CONTROL WEBINAR TABLE OF CONTENTS TOPIC Why Access Control? Risks If Not Used Factors of Authentication

More information

Training for the cyber professionals of tomorrow

Training for the cyber professionals of tomorrow Hands-On Labs Training for the cyber professionals of tomorrow CYBRScore is a demonstrated leader in professional cyber security training. Our unique training approach utilizes immersive hands-on lab environments

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information

Course Description. Audience. Prerequisites. Skills Taught. Module Title. Duration. Course Outline :: CompTIA A+ Certification ::

Course Description. Audience. Prerequisites. Skills Taught. Module Title. Duration. Course Outline :: CompTIA A+ Certification :: Module Title Duration : Course CompTIA : CompTIA A+ Certification : 5 days Course Description CompTIA's A+ certification is the industry standard for validating the foundational skills needed by today's

More information

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist CLOUD SECURITY SPECIALIST Certification Cloud Security The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms,

More information

Edge Foundational Training

Edge Foundational Training Edge Foundational Training Give your team the tools to get up and running with Edge Edge Foundational Training provides the tools and information needed to start using Edge whether in the cloud or on premises.

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information