Select Page

Training

Industrial Cybersecurity

3 días
On Demand
Recomendable:
Rec. Certifications

The Industrial Cybersecurity course lasts 3 days and is designed to provide attendees with knowledge related to Cybersecurity, attacks, and vulnerabilities in OT environments. In addition, the Industrial Cybersecurity course covers aspects that equip the user with best practices in networking for industrial environments, countermeasures, and specific technologies to increase the security of ICS environments. Finally, the course covers areas that facilitate the understanding of the terminology, concepts, and metrics of IEC62443 applied to an ICS environment.

  • The objective of the first day is to explain the basic concepts of the systems involved in the industry and to understand the operation of Ethernet/TCP/IP communications.
  • The objective of the second day is to explain the main vulnerabilities inherent in communications and how they can be exploited.
  • The objective of the third day is to explain the concepts and models of the IEC62443 standard and how to protect OT networks, remote access, and apply a defense-in-depth strategy.

Recommended Audience

The Industrial Cybersecurity course is mainly recommended for engineers, maintenance personnel, people linked to IT-OT convergence, and other professionals who are interested in preventing and protecting the industrial environment from possible attacks and improving the availability of systems.

Schedule and contents

First day
Second day
Third day
09:00-10:00

Module 1: Basic concepts associated with industrial environments and ICS.

10:00-11:00

Module 2: Industrial protocols and the OSI model

11:00 11:15

Break (15 min)

11:15-12:30

Module 2: Industrial protocols and the OSI model

13:00-15:00

Lunch Break

15:00-17:00

Module 3: Communications Workshop

09:00 to 9:30

Module 4: Threats and vulnerabilities

09:30 to 11:00

Module 5: Construction of attacks

11:00-11:15

Break (15 min)

11:15-12:30

Module 5: Construction of attacks

12:30-13:00

Module 6: Most common vulnerabilities

13:00-15:00

Lunch Break

15:00-16:00

Module 7: Demo with a simple attack

16:00-17:00

Module 8: IEC-62443

09:00-10:00

Module 8: IEC-62443

10:00-11:00

Module 9: Cybersecurity and segmentation

11:00-11:15

Break (15 min)

11:15-13:00

Module 10: Cryptography and VPN

13:00-15:00

Lunch Break

15:00-17:00

Module 11: Defense in depth and associated technologies

Industrial Cybersecurity