Overview

The Securing ICS: Becoming a Global Industrial Cyber Security Professional course is designed to provide those at IT/operational level (or equivalent) with an understanding of today’s cyber security challenges facing their ICS environments. This knowledge is vital when managing the day to day running of all aspects of security for those environments.

The course will show how to combine the disciplines of IT, OT and Physical Security to show how to best support their organisations cyber security and risk mitigation/reduction strategies for their ICS environments.

If you are an IT, an operational or a physical security professional responsible for any ICS environment and/or people working on securing these systems including:

  • Business Technical/Engineering/Procurement Lead
  • ICS Policy Maker
  • Site/Asset Single Point of Accountability (SPA) for security and/or Incident Response
  • Site/Asset IT Manager
  • ICS Consultant
  • Integrator

…then this course is for you.

It provides an in-depth understanding across multiple industry sectors of what the current standards and regulations are, cyber security risks are and the threats currently facing your ICS environments. In addition, it discusses how to forward plan to help mitigate and reduce these risks. Lastly it discusses how to plan for and respond effectively to a cyber incident.

Read more +

Prerequisites

There are no pre-requisites for this course. However, all attendees need a good understanding of either basic IT or OT skills. A handbook of supporting material will be provided.

Read more +

Learning Outcomes

The course consists of five days (30 CPE credits) classroom training broken down into a mix of lectures, discussions and exercises.

By the end of the course, you will know:

  • How to identify what current and emerging threats your ICS face
  • Where your ICS environments are vulnerable
  • What actions you need to take to secure your systems and help reduce the risk.
  • How to prepare for and handle a security incident
  • Help prepare for the knowledge required for the challenging the GICSP exam
Read more +

Course Outline

This course is a skilled level course that allows an attendee from either side (IT or OT) to have a base understanding of the ‘other side of the firewall’.

The course follows a whole lifecycle approach for designing, implementing, monitoring and decommissioning an ICS and covers the following modules:

  • ICS Basics (for non-OT personnel)
  • Cybersecurity Essentials (for ICS personnel)
  • ICS Security Governance and security risk
  • ICS Architecture
  • ICS Hardening
  • Access Management
  • Physical Security
  • ICS Security Assessments
  • ICS Security Monitoring
  • Incident Response

Exam Information

Please note, whilst this course help prepare for the knowledge required for the GICSP exam. We cannot guarantee that everything will be covered in the GICSP exam because of the sheer quantity of questions potentially used, over which Siker have no input or control. The course does not include the examination itself. Candidates must purchase the exam directly with GIAC.

Read more +

Siker Logo

QA is proud to be the UK Siker partner.

Why choose QA

NCSC Assured Training

Continuous Professional Development (CPD)

CPD points can be claimed for NCSC assured training courses at the rate of 1 point per hour of training for NCSC assured training courses (up to a maximum of 15 points).

Dates & Locations

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing