ICS (Industrial Control System) Cyber Security Training

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
SEC835 Database and Web application security Information Security Architecture.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lessons Learned in Smart Grid Cyber Security
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
הקריה למחקר גרעיני - נגב Nuclear Research Center – Negev (NRCN) Society of Electrical and Electronics Engineers in Israel (SEEEI) 2012 Eran Salfati, Amir.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Information Security tools for records managers Frank Rankin.
Critical Infrastructure Protection and the Role of the Next Generation Firewall Blaž Ivanc.
Cybersecurity - What’s Next? June 2017
Leverage What’s Out There
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
Big Data For Project & Program Managers
Critical Path Method (CPM) Training
Engineering Project Management Training
Leadership & Management Development
Mistake Proofing Training - Poka Yoke
Strategic Planning & Management Training
Systems Engineering Project Management
STRATEGIC Leadership Training
Leading High Performance Teams Training
Engineering Creativity Workshop
Look Ahead Schedule Training 2 Days Course From Tonex
Systems Thinking Training Course from Tonex Training
Operations Management Training Bootcamp
Patent Law Training for Engineers
Offshore Wind Farm Training.
Controller Area Network (CAN) Training
Machine Learning Training
PMI Certification Preparation Training Boot Camp
Leadership Training For Women
How To Become A Powerful Presenter
How to Deal with Difficult People Training
Contract Writing Training
Organizational Development (OD) Fundamentals Training
Performance Management Training
Offshore Wind Farm Training
Portfolio Management Fundamentals Training
Principles of Organization Management Training
Product Management Training
Power and Energy An Introduction to Electric Regulatory NERC,FERC,CARB CAISO,CEC & DoE
ICS Cyber Security Training
GSM & GPRS Security Training
5G Security Training
Project Management Essentials Training
Information Security & Risk Management Training
Cyber Threat Simulation
Threat Simulation & Modeling Training
Tactical Targeting Network Technology (TTNT) Classes
TTNT Training Program
Electricity Distribution Network Design Training & Courses
Mobile Networks Power Systems Training & Courses
Introduction To Power System Operation Training
Fundamentals of Synchronous Machines Training
Reactive Power Compensation And Voltage Control Training
Wholesale Electricity Marketing & Trading Fundamentals
MIL-1553 Training and MIL-STD-1553 Training
Software Testing
UAF (Unified Architecture Framework) Training
UAF Training, Hands-on Project Based Unified Architecture Framework (UAF) Crash Course
I have many checklists: how do I get started with cyber security?
UAF Seminar
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
National Cyber Security
Presentation transcript:

Cyber Security Training ICS (Industrial Control System) Cyber Security Training Call Us Today: TAKE THIS COURSE Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Fortune 500 companies certified.

Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services. Why Tonex ? --Presenting highly customized learning solutions is what we do. For over 30 years TONEX has worked with organizations in improving their understanding and capabilities in topics often with new development, design, optimization, regulations and compliances that, frankly, can be difficult to comprehend. --Ratings tabulated from student feedback post-course evaluations show an amazing 98 percent satisfaction score. --Reasonably priced classes taught by the best trainers is the reason all kinds of organizations from Fortune 500 companies to government’s most important agencies return for updates in courses and hands-on workshops

TAKE THIS COURSE Audience: Course designed for: Control engineers, integrators and architects System administrators, engineers Information Technology (IT) professionals Security Consultants Managers who are responsible for ICS Researchers and analysts working on ICS security Vendors, Executives and managers Information technology professionals, security engineers, security analysts, policy analysts Investors and contractors Technicians, operators, and maintenance personnel Price: $3, Length: 4 Days ICS (Industrial Control System) Cyber Security Training

ICS Cybersecurity training is intended for security professionals and control system designs in order to give them propelled cybersecurity aptitudes and learning in order to ensure the Industrial Control System (ICS) and keep their mechanical task condition secure against digital dangers. Tonex as a pioneer in security industry for more than 15 years is currently offering ICS Cybersecurity training which encourages you ensure your ICS in view of uncommon publication National Institute of Science and Technology (NIST) for control systems in light of Supervisory Control and Data Acquisition (SCADA), Distributed Control System (DCS) or the other control system configurations. TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Tonex has served the business and the scholarly community with top notch gatherings, classes, workshops and solely planned courses in cybersecurity region and is satisfied to inform professional colleagues about the ongoing far reaching training on ICS Cybersecurity. This exhaustive training gives you a point by point diagram of Industrial Control Systems (ICS), regular system topologies and designs, diverse sorts of dangers and vulnerabilities to modern systems, and gives you a well ordered method to moderate the related dangers and keep up the security of your control system. ICS has as of late connected in numerous businesses, for example, electric, water, wastewater, oil, gaseous petrol, compound, paper, sustenance, and discrete assembling. The reason is because of the various assault records in ICS with differing level of potential hazard and effect. This course covers an assortment of topics in ICS Cybersecurity zone, for example, ICS essentials, ICS security design, ICS vulnerabilities, ICS danger insight, NERC Critical Infrastructure Protection (CIP), ICS chance administration and ICS hazard appraisal. Moreover, you will find out about ICS inspecting and evaluation, IEC standard for system security, ICS usage and advancement, ICS occurrence reaction, ICS network assurance, ICS server insurance, SCADA security approaches and standards, SCADA digital assaults discovery, and a considerable measure of labs and hands on precedents. TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

By taking the ICS Cybersecurity training by Tonex you will find out about the existence cycle of ICS usage, ICS arrangements and systems, ICS chance administration framework steps, get to control, possibility arranging, and episode reaction. The ICS Cybersecurity course by Tonex is an intuitive course with a great deal of class exchanges and activities expecting to give you a helpful asset to ICS cybersecurity. In the event that you are an IT professional who represent considerable authority in ICS Cybersecurity and need to approve your abilities, you will profit the introductions, precedents, contextual investigations, exchanges, and individual exercises upon the consummation of the ICS Cybersecurity training and will set yourself up for your vocation. Find out about the basics of ICS Cybersecurity all through recognizing vulnerabilities of ICS, diverse sorts of assaults to Human Machine Interface (HMI) and User Interface (UI), web assaults, assaults on remote gadgets and network vulnerabilities. Our instructors at Tonex will assist you with mastering every one of the ICS Cybersecurity plan strategies by presenting the hazard administration framework, chance evaluation methods, episode reaction, constant monitoring, SCADA security change, and network security approaches for ICS. At last, the ICS Cybersecurity training will present an arrangement of labs, workshops and gathering exercises of true contextual investigations in order to set you up to handle all the related ICS Cybersecurity challenges. TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Audience Control engineers, integrators and architects who will be designing a secure ICS System administrators, engineers who secure ICS Information Technology (IT) professionals who administer, patch or secure ICS Security Consultants who perform security assessment and penetration testing of ICS Managers who are responsible for ICS Senior managers want to understand or apply ICS cybersecurity program to their control system Researchers and analysts working on ICS security Vendors who will develop products for ICS Executives and managers of ICS Cybersecurity area Information technology professionals, security engineers, security analysts, policy analysts Investors and contractors who plan to make investments in ICS industry. Technicians, operators, and maintenance personnel who are or will be working on ICS Cybersecurity projects TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Training Objectives Understand fundamentals of Industrial Control Systems (ICS) Recognize the security architecture for ICS Identify different kinds of vulnerabilities in ICS network, remote devices, software, or control servers Learn about active defense and incident response for ICS Learn the essentials for NERC Critical Infrastructure Protection (CIP) Understand policies and procedures for NERC critical infrastructure protection (CIP) List strategies for NERC CIP version 5/6 Apply risk management techniques to ICS Describe ICS Active Defense and Incident Response Describe techniques for defending against the new ICS threat matrix Assess and audit risks for ICS Apply IEC standard to network and system security of ICS Implement the ICS security program step by step Protect the ICS network from vulnerabilities Understand different types of servers in ICS and protect them against attacks Apply security standards to SCADA systems based on NIST SP Detect different types of attacks to SCADA systems Tackle all the security challenges related to ICS cybersecurity TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Training Outline ICS Cybersecurity training course consists of the following lessons, which can be revised and tailored to the client’s need: Fundamentals of Industrial Control Systems (ICS) ICS Security Architecture Common ICS Vulnerabilities ICS Threat Intelligence NERC Critical Infrastructure Protection (CIP) Risk Management and Risk Assessment ICS Auditing and Assessment IEC 62443: Network and System Security for ICS Implementation of ICS Security Program Development ICS Incident Response Network Protection for ICS ICS Server Protection SCADA Security Policies and Standards Detection of Cyber Attacks on SCADA Systems TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Fundamentals of Industrial Control Systems (ICS): Evolution of Industrial Control Systems (ICS) Global Industrial Cybersecurity Professional (GICSP) ICS Industrial Sectors ICS Operation and Components ICS Design Consideration Real-Time Operating Systems Programming Controllers SCADA Systems Distributed Control System Programmable Logic Controller ICS and IT Systems Security Distributed Control System (DCS) versus Supervisory Control and Data Acquisition (SCADA) Supervisory Components (Master Servers) System Operation Communication Protocols ICS Network Architecture ICS Lifecycle Challenges Network Design TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

ICS Security Architecture: Network Segmentation and Segregation Boundary Protection Firewalls Logically Separated Control Network General Firewall Policies for ICS Recommended Firewall Rules for Specific Services Network Address Translation (NAT) Specific ICS Firewall Issues Unidirectional Gateways Single Point of Failure Authentication and Authorization Monitoring, Logging and Auditing Incident Detection, Response and System Recovery TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Common ICS Vulnerabilities: Vulnerabilities Inherent in the ICS Product Vulnerabilities Caused by Installation, Configuration and Management of ICS Poor Network Design Issues ICS Software Security Threats Access Controls ICS Attack Surface Attacks on Human Machine Interface (HMI) and User Interface (UI) Attacks on Network Communications Attacks on Remote Devices Authentication Issues Attacks on Control Servers Web Attacks Data Authenticity Cryptographic Issues Credential Management Issues Network Vulnerabilities TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

ICS Threat Intelligence: ICS Active Defense and Incident Response Intelligence Life Cycle and Threat Intelligence ICS Information Attack Surface External ICS Threat Intelligence Internal ICS Threat Intelligence TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

NERC Critical Infrastructure Protection (CIP): Introduction to CIP NERC Functional Mode NERC Reliability Standards CIP History CIP-002: Cyber System Categorization CIP-003: Security Management Controls CIP Processes Audit Follow Up CIP Industry Activities Standards Process TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Risk Management and Risk Assessment: Risk and Manufacturing Systems Common ICS Vulnerabilities Threat Identification Vulnerability Management Industrial Consequences Risk Classification Introduction to Risk Management Process Special Consideration for ICS Risk Assessment ICS Information Security Risk Assessment Safety Physical Impacts of ICS Incidents Physical Disruption of ICS Process Non-Digital Aspect of ICS into Impact Evaluations Propagation of Impact to Connected Systems TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

ICS Auditing and Assessment: Security Audits Security Assessments System Characterization Asset Classification Vulnerability Assessment Configuration Assessment and Auditing TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

IEC 62443: Network and System Security for ICS: Security Feedback Loop Security Assurance Threat/Risk Assessment Classes of Attackers Management Challenges Cybersecurity Assurance Standards Assurance Matrix Development Assurance Integration Assurance Operational Assurance TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Implementation of ICS Security Program Development: Business Case for Security Defining the Scope of Security Program Defining ICS-Specific Security Policies and Procedures Implementing ICS Security Risk Management Framework Categorizing ICS Systems and Network Assets Selecting ICS Security Controls Performing Risk Assessment Techniques Implementing Security Controls Continuous Monitoring of Control Systems Access Control Security Assessment and Authorization Contingency Planning Identification and Authentication Incident Response Privacy controls Penetration Testing TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

ICS Incident Response: Incident Response and Digital Forensic Incident Response ICS Team Collecting Evidence Source of Forensic Data in ICS Network Time-Critical Analysis Maintaining and Restoring Operations Performing ICS Incident Response Procedures Identifying the threat in Distributed Control Systems (DCS) TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Network Protection for ICS: Fundamentals of ICS Network Ethernet TCP/IP Protocol Suite ICS Protocols Over TCP/IP Firewalls Unidirectional Gateways Honeypots Wireless in Control Systems Satellite Protocols Mesh Protocols Bluetooth and WiFi Field and Plant Floor Equipment TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

ICS Server Protection: ICS Windows Systems ICS Linux/Unix Systems Updates and Patching Processes and Services Configuration Hardening Endpoint Protection Automation and Auditing Log Management Database and Historians TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

SCADA Security Policies and Standards: SCADA Organization and Information Architecture SCADA Data Categorization and Ownership Data Security in SCADA Platform Security Communication/ Personnel Security Configuration Management Audit Applications Physical Security Manual Operation SCADA Asset Protection NIST SP Standard Steps to SCADA Cybersecurity Improvements TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Detection of Cyber Attacks on SCADA Systems: Application Layers Attacks Transport Layer Attacks Network Layer Attacks Modbus Protocol Attack DNP3 Attacks ICCP Server Attacks OPC Servers Attack TCP/IP Attack SCADA Vulnerability Scanning TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

TONEX TRAINING ICS Cyber Security Training 4 Days Course Call Us Today: TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Hands On, Workshops and Group Activities: Labs Workshops Group Activities Sample Workshops and Labs for ICS Cybersecurity Training: Preliminary ICS Risk Assessment Exercise ICS System Identification and Classification Hands On ICS Vulnerability Assessment Case Study ICS Compliance Audit Case Study Detailed ICS Risk Assessment Experience Selecting ICS Security Controls Experiment Summary of Aurora Hardware Mitigation Projects Workshop Incident Response Workshop Live Attack Demonstration- Hacker’s Perspective Hacking the Power Grid Designing a SCADA Security Policy Analyzing Modbus TCP Network Traffic with a Sniffer Configuration of Modbus TCP Firewall TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training

Cybersecurity Training Seminars Cybersecurity used to be thought of as a specialized, niche occupation. But with the advance of cybercrimes over the past few years, just about everyone with access to a laptop, desktop or mobile device has had to do something to protect their electronic data. Cybersecurity Foundation Iot Security Risk Management Framework Training Wireless Security Training

Contact Tonex Training Expert Dallas, TX: 1400 Preston Rd., Suite 400 Plano, Texas Tel: Washington, DC: 1025 Connecticut Ave, NW Suite 1000 Washington, DC Tel: International: Fax: Visit Tonex website

TAKE THIS COURSE ICS (Industrial Control System) Cyber Security Training