back

SCADA Security Foundations Theory training course

The “SCADA Security Foundations Theory” training will allow participants to gain a wide set of knowledge to manage and operate security of the SCADA/ICS (Supervisory Control and Data Acquisition/Industrial control systems) environments. You will get understanding the basics of audit approach for SCADA/ICS and all required skills to face the most difficult problems, such as risk assessment for SCADA/ICS systems, security processes management for SCADA/ICS environments, and security controls development and implementation for SCADA/ICS.

HIRE US

Our training course "SCADA Security Foundations Theory" is adopted for an audience which represents students with completely different background. If you are just a novice, you will be solving simple tasks. If you are professional, you will have a set of very sophisticated tasks. The obtained experience will mandatorily increase your value for employees and customers and bring a tremendous level of a professional confidence to you personally.

The target audience of this course is:
  • CTO/CIO
  • SCADA/ICS security specialists
  • SCADA/ICS architects
  • SCADA/ICS software developers/system administrators
  • project managers who implement SCADA/ICS
  • auditors who audit SCADA/ICS.
The course duration is 2 days.

The course syllabus below can be adopted according to company/organisation's needs.

Please write us your requirements and questions that are critical for you. We will update the training program accordingly.

Course syllabus

  1. SCADA and ICS systems overview
  2. Standards (ISA 62443 and others)
  3. Key concepts
  4. Industrial networks
  5. Industrial protocols
  6. Network security
  7. Establishing a security program
  8. Risk assessment
  9. Security for service providers
  10. Secure system development and implementation
  11. Security policies
  12. Access control management
  13. Attacks’ detection
  14. Vulnerability management
  15. Securing communications
  16. SCADA/ICS continuity and disaster recovery.

For ease of use, you can download the program of the training course "SCADA Security Foundations Theory" from the link. Click to download

This website uses cookies to give you the best experience. Terms & Conditions