Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

Scada Security Training

Scada Security Training

SCADA Security Training:

SCADA Security Training Course with detailed hands-on Exercises (Online or Classroom Live)

SCADA Security Training, SCADA, DCS, and other process control networks, generically called SCADA, run the nation’s mission-critical infrastructure, everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increased risk due to the move to standard protocols, the Microsoft OS, and interconnection to other networks. Learn the skills required to direct and manage the appropriate cyber security protection for your SCADA system.

Today, IT departments and the classic IT security approach are wreaking havoc with SCADA systems. Too often, IT ‘fixes’ bring a SCADA system down, but avoiding or ignoring cyber security is not an option. Learn how standard IT security solutions can be used in SCADA systems and where SCADA-specific security controls and practices are required. This SCADA Security Training course will teach you to develop a SCADA cyber security program and work with internal and external IT resources to implement the program.

Our Scada Security Training instructors have both SCADA security and IT security expertise, a rare combination. They have performed assessments, designed security architectures, and written and audited security policies on a wide variety of real-world SCADA systems in the oil & gas, electric, water, and other industries.

What’s Included?

  • 4 days of Scada Security Training with an expert instructor
  • SCADA Security Training Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee

Resources

Related Courses

Customize It:

  • If you are familiar with some aspects of this Scada Security Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Scada Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Scada Security Training course in a manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Scada Security course is defined here:

  • SCADA Systems Personnel
  • Engineers and Operations
  • Process Engineers and Managers
  • Operations and Maintenance Managers, Engineers, and Technicians
  • Hardware and Instrument Specialists
  • Business System Analysts Who Support SCADA Interfaces
  • System and Application Programmers
  • Project Managers
  • Telecommunications and Wireless Support Personnel
  • Control engineers, integrators, and architects when designing and implementing secure SCADA and/or ICS
  • System administrators, engineers, and other IT professionals when administering, patching, and securing SCADA and/or ICS
  • Security consultants when performing security assessments of SCADA and/or ICS
  • Managers responsible for SCADA and/or ICS Researchers and analysts who are trying to understand the unique security needs of  SCADA and/or ICS Vendors developing products that will be deployed in SCADA and/or ICS

Objectives:

After completing this Scada Security course, attendees will be able to:

  • SCADA security policies
  • Firewall architecture, DMZ, and rule bases
  • Secure remote access to a control center
  • SCADA protocol security issues
  • Securing field communications
  • User authentication technologies and integration with SCADA applications
  • Access control principles and implementation
  • Active Directory integration with SCADA applications
  • Detecting cyber attacks on SCADA systems
  • Vulnerability scanning
  • Security patch management
  • Anti-virus protection and management
  • Exceptions – what to do when you can’t implement best practice
  • SCADA security standards

Course Syllabus:

SCADA/ICS OVERVIEW
  • Introduction to CSSA
  • Industrial Control Systems (ICS)
  • Types of ICS
  • ICS components
  • BPCS & SIS
  • Control system strengths and weaknesses
  • ICS PCN & Protocols
  • PCN evolution
  • Modbus / DNP3 / HART
  • Lab: Modbus PLC
  • IT vs. ICS
  • RS-232 and RS-485
  • TASE 2.0 / ICCP
  • CIP
  • PROFIBUS / PROFINET
  • FOUNDATION Fieldbus
  • Open vs. proprietary protocols
  • HMI applications
  • HMI/OIT implementations
  • OPC and OPC UA
  • Data historians
  • Integration software (ERP/MES)
SCADA SECURITY GOVERNANCE
  • Threat to SCADA
  • SCADA attacks and threats case studies
  • Lab: Attacking the infrastructure
  • SCADA security challenge
  • Security frameworks, strategy, policies
  • Standards, procedures, and guidelines
  • SCADA security standards bodies (NIST / ISA / CFATS / NERC CIP)
  • Risk management process
  • Lab: “Theoretical” assessment with CSET
  • SCADA security assessment methodology
  • NESCOR guide to vulnerability assessment
  • SCADA/ICS Security Training Workshop
PENTESTING SCADA SYSTEMS
  • Security assessment strategy
  • Pentesting steps
  • Safety and security considerations
  • Information gathering
  • Architecture analysis
  • Host, application and platform fingerprinting
  • DNS and SNMP recon
  • Lab: SNMP recon
  • Host and port scanning
  • Security considerations
  • Scanning tools and techniques
  • Lab: Scanning ICS/SCADA networks
  • Network communications capture and analysis
  • RF signal capture
  • Sniffing network traffic
  • Device functionality analysis
  • Lab: Datasheet analysis
  • Vulnerability identification
  • Common SCADA vulnerabilities
  • Finding vulnerabilities
  • Physical access
  • Vulnerability scanning
  • Server OS testing
  • Patch levels
  • Default and insecure configurations
  • Authentication and remote access
  • Firmware analysis
  • Attacking ICS
  • Attacking standard services (HTTP, FTP)
  • Attacking server OS
  • Lab: Exploiting OS-level vulnerabilities (Shellshock exploit)
  • Attacking ISC Protocols
  • Lab: Capturing and manipulating protocol data
  • Attacking wireless communications
  • Lab: Recovering ZigBee network keys
  • Lab: WEP/WPA2 password cracking
SCADA SECURITY CONTROLS
  • Categorization of system controls
  • Physical security & safety
  • Identification, Authentication & Authorization (IA&A)
  • IA&A and access control
  • Remote access security
  • Encryption
  • Logical security
  • Lab: Firewall rule design
  • Monitoring, detection, and protection
  • Secure SCADA architecture
  • Lab: Security architecture (group discussion)
  • IDS/IPS (Introduction to Snort)
  • Log monitoring and management
  • Lab: SCADA honeypot (Conpot)
  • Lab: Snort SCADA rules (Quickdraw)
  • Incident response
  • Anti-malware
  • Application whitelisting
  • Patch management
  • Active Directory and group policy
  • Summary of good security practices
ICS Security Training | SCADA Systems Security Training Workshop Course Wrap-Up

Request More Information

    Time frame: