0345 4506120

Industrial Control Systems Security Introduction

This one day introductory course provides valuable insight into the weaknesses and vulnerabilities within common Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments. We will discuss infamous and more recent critical infrastructure cyber-attack case studies and the vital lessons learnt. Identify systems that are discoverable and understand suitable countermeasures, threats and ICS technical controls.

Audience

This course is aimed at operational / engineering teams, IT staff and security practitioners working in public and private sectors who are looking to gain and insight and awareness of the security vulnerability exposure and defensive countermeasures for industrial control systems.

  Reset

Learning Objectives

  •   Control systems – closed loop systems
  •   ICS logic systems – relay, ladder, programmable systems
  •   ICS security
  •   Control system vulnerabilities and weaknesses
  •   ICS technical security controls
  •   Discoverable systems - countermeasures
  •   Governance and standards

Pre-Requisites

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.

Course Content

Module 1 – Introduction to ICS and SCADA

Introduce concepts and function of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA)

  •   Control systems  
    •     Closed loop systems
  •   ICS  
    •     Relay logic
    •     Programmable logic controllers
    •     PLC Programming
    •     Sequential function charts
    •     Ladder logic
    •     ICS Network protocols
  •   SCADA
  •   ICS Security

Module 2 – Introduction to Industrial Control Systems Security

  •   When control systems go wrong
  •   Critical national infrastructure (CNI)  
    •     Centre for the protection of national infrastructure (CPNI)
  •   Vulnerable systems
  •   Case study – STUXNET, Black Energy
  •   Not all ICS systems are designed with security in mind
  •   ICS common vulnerabilities
  •   Visible & discoverable ICS systems
  •   Risk management
  •   Defence in depth modified Purdue Model
  •   Typical ICS technical security controls
  •   Governance regulations
  •   Security standards

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include