OT/ICS Cyber Security Training
Get Price Quote
Advanced OT/ICS Cyber Security training programs are designed for professionals who already have a basic understanding of OT/ICS cybersecurity and want to deepen their knowledge. These programs cover basic to advance complex topics such as risk assessment, network segmentation, secure configuration, and incident response. Participants also learn about the latest cybersecurity technologies and tools used to protect OT/ICS environments.
Key Topics Covered:
Basic introduction of DCS, PLC and SCADA
Difference between IT and OT Cyber security
ICS/SCADA Overview and Operation
Network Architecture of DCS
ICS Attacks
Three way handshaking Concept
CIA Triad
Authentication and Authorization
Access Control System
Security Posture
Purdue Model
Networking Concepts (TCP/IP Model, CAM Table and Subnetting)
OSI Model with Headers
IPV4 Header, UDP/TCP Header
IP Header
Encapsulation and De-Encapsulation Process
Analyzing Traffic with Protocol Analyzers
NAT
Defense in Depth Concept
Types of Security Models
Overview of IEC62443
Industrial Protocols (OPC, Modbus and Profibus)
Hub, Switch and Router
Fortinet Firewall Concepts
IT Protocols (SMB, SNMP, HTTP, HTTPs, DHCP, ARP, APIPA)
Virtual Private Network (VPN)
Advanced threat detection and response techniques
Security Posture
Network segmentation and zoning in OT/ICS environments
Secure configuration of DCS, PLC, and SCADA systems
Incident response and recovery in OT/ICS environments
Introduction to cybersecurity tools for OT/ICS
Risk, Threat and Vulnerability
Risk Assessment and Asset Management
Tools used in OT for mitigate the risk of cyber attacks
IDS/IPS deployment and configuration like Armis, Claroty, Nozomi, Drogos
Types of alerts and analysis
Secure Remote Access Solutions (Conventional and Third party solutions)
Introduction of Firewalls, Policy and Procedures.
End Point Security
Patch Management
Security Assessment and Hardening Concepts