Course Description (2-Day)
This course will show students how to best protect and support their organization.s cyber security and risk mitigation/reduction strategies for the ICS environments. All students have the option to undertake the associated AMPG exam to qualify for the ‘Foundation Certificate in ICS Security Principles’.
Course Objectives
By the end of the course, participants will be familiar with:
- Identifying current and emerging threats to ICS environments
- Recognizing vulnerabilities within ICS environments
- Implementing actions to secure these environments and reduce risk
- Preparing for and managing cybersecurity incidents in ICS environments
Course Content
Part 1: Background
Part 2: Securing ICS
- An exploration of ICS terminology and a description of the elements involved
- What are the differences and similarities between IT and OT?
- What does your ICS Attack Surface look like?
- What Threats to your ICS exist?
- Where might your environment be vulnerable
- A discussion of ICS Security incidents
- An introduction to ICS Security risk
Part 2: Securing ICS
- What is the Purdue model and how does it work in reality?
- Securing legacy and existing systems
- How to plan to reduce the security risk to your ICS environments
- Security Incident identification
- Security Incident response
- Security Incident Recovery
- Planning and Preparation
- ICS Cyber Interactive exercise
Target Student
- Anyone new to cyber security in an ICS environment
- Non-ICS staff who need to understand ICS terminology and how it differs from their current roles
- If you are a professional working in an ICS environment including:
- Site/Asset Operators
- Procurement/Contract staff
- Supply chain staff Site/Asset IT Support engineers
- Site/Asset Physical Security/Facilities Manager staff
- Site/Asset Operators
Prerequisites
There are no pre-requisites other than a suitable device to participate in the online course. A handbook of supporting material will be provided.