Cybersecurity for Industrial Control Systems Course
All you need to know about ICSs and their vulnerabilities.
Why do you and your company need trained professionals in Cybersecurity for Industrial Control Systems?
Identify and establish control over critical infrastructures
The Dell Annual Threat Report recently announced a 100% increase in SCADA attacks in 2014, compared to 2013. It further forecasts growing security challenges in 2015, due to unreported data breaches and the aging industrial machinery infrastructure.
Save money and time by preventing cyber attacks
You need to be able to identify security risks and prevent attacks. Many of the individuals responsible for auditing, installing, or operating industrial control systems are aware of the need for cyber security, yet they are not prepared for it.
Stay informed about the latest advancements in IT security
You need to have relevant, mission-critical information and get updates related to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Control (DCS) and other Industrial Control Systems (ICS).
How the Cybersecurity for Industrial Control Systems Course solves these problems for you
Be prepared and in control over ICS vulnerabilities, by having trained professionals on your team.
This course will teach you how to secure or "blue team" the ICS architecture, and will include extensive demonstrations that will be used to reinforce the selection and implementation of security controls relating specifically to ICS. You will explore how ICSs support critical infrastructures, the differences in deployments of ICSs, and ICS vulnerabilities.
Differences in Deployments of ICSs
Explore how ICSs support critical infrastructures, the differences in deployments of ICSs, and the need to understand ICS vulnerabilities.
Influence of Common IT Components on ICS
Understand the parts of IT networks, how ICSs work, and the influence of IT elements on control system cybersecurity and their unique security issues.
Common ICS Components
Discover traditional ICS architectures and learn the nomenclature used in ICSs, how the systems work, and their requirements for functionality.
Cybersecurity within IT and ICS Domains
Explore cybersecurity differences between IT and ICSs: why they are different, specifically in the areas of communications, operations, and support.
Understand the risk equation and its components: threats, vulnerabilities, and consequences. See attackers’ methodology for compromising a system.
Current Trends (Threats and Vulnerabilities)
Study mainstream, organized, and terrorist/nation state threats; and DHS programs that assist asset owners and vendors in identifying ICS vulnerabilities.
Determining the Impacts of a Cybersecurity Incident
Risk is a function of threat, vulnerability, and consequence. Identify events that lead to disruptions, loss of view, loss of control, and denial of service.
Attack Methodologies in IT and ICS
Learn how to properly defend a control system, what specific areas of ICSs would likely be targeted and how an “attack lifecycle” could take shape.
Mapping IT Defense-in-Depth Security Solutions to ICS
Define and discuss defense-in-depth, the same strategy used to secure your IT systems that is recommended for securing your ICSs as well.
Meet your trainer, Radu Stanescu
Founder & CEO Sandline, Security Consultant and Trainer for several important financial institutions and utility facilities companies from Romania (electricity and gas) and government, and EC-Council Instructor for CEH and ECSA courses.
You are in good company
Meet our partners that have made this possible
SCADA Security Training is a must for each and every engineer involved in the design, implementation, maintenance and operation functions of Industrial Control System, starting from the entry-level operators to SCADA programmers. The information about vulnerabilities are currently the latest ones, but approaching them from classic attack methods point of view. The course also tackles very well the countermeasures to new attack patterns and methods.
This course is an investment for any company using SCADA, by reducing the risk of possible disasters.
SCADA Engineer - Luxten Lighting Company
Register now to get exclusive benefits
1 year access to the private CERT ICS platform
Save the date
The Cybersecurity for Industrial Control Systems Course takes place between November 16th - 19th, from 9 am to 5 pm, at Impact Hub, Bucharest. Coffee, meals and drinks for the lunch break are included.
Take advantage of the last course in 2015
This course is the first of its kind in Romania. After registering record success in 2014 among power, manufacturing, water treatment, oil and gas provision companies, Radu Stanescu has prepared a second edition to share his expertise.
Get privileged benefits
Receive 1 year subscription to CERT-ICS.eu, the first private team working across all critical infrastructure sectors by partnering with law enforcement agencies, the intelligence community, private sector ICS owners and manufacturers.
Secure your spot now
The price of the course is a one time fee of 2500 € (VAT not included). Registration ends on November 5th and it is limited to only 12 available spots, to ensure that proper attention is given to each participant.
Be part of the elite companies with trained SCADA professionals
Join competing companies that have already participated. Contact us at email@example.com, +40722234788