OT/ICS Cyber Security Training
Get Price Quote
Advanced OT/ICS Cyber Security training programs are designed for professionals who already have a basic understanding of OT/ICS cybersecurity and want to deepen their knowledge. These programs cover basic to advance complex topics such as risk assessment, network segmentation, secure configuration, and incident response. Participants also learn about the latest cybersecurity technologies and tools used to protect OT/ICS environments. Key Topics Covered: Basic introduction of DCS, PLC and SCADA Difference between IT and OT Cyber security ICS/SCADA Overview and Operation Network Architecture of DCS ICS Attacks Three way handshaking Concept CIA Triad Authentication and Authorization Access Control System Security Posture Purdue Model Networking Concepts (TCP/IP Model, CAM Table and Subnetting) OSI Model with Headers IPV4 Header, UDP/TCP Header IP Header Encapsulation and De-Encapsulation Process Analyzing Traffic with Protocol Analyzers NAT Defense in Depth Concept Types of Security Models Overview of IEC62443 Industrial Protocols (OPC, Modbus and Profibus) Hub, Switch and Router Fortinet Firewall Concepts IT Protocols (SMB, SNMP, HTTP, HTTPs, DHCP, ARP, APIPA) Virtual Private Network (VPN) Advanced threat detection and response techniques Security Posture Network segmentation and zoning in OT/ICS environments Secure configuration of DCS, PLC, and SCADA systems Incident response and recovery in OT/ICS environments Introduction to cybersecurity tools for OT/ICS Risk, Threat and Vulnerability Risk Assessment and Asset Management Tools used in OT for mitigate the risk of cyber attacks IDS/IPS deployment and configuration like Armis, Claroty, Nozomi, Drogos Types of alerts and analysis Secure Remote Access Solutions (Conventional and Third party solutions) Introduction of Firewalls, Policy and Procedures. End Point Security Patch Management Security Assessment and Hardening Concepts