Industrial Control Systems Security Introduction
- Learn via:
- Virtual/Classroom
- Duration:
- 1 Day
- Code:
- QAICSSI
- Tech type:
- Premium
- SFIA:
- DESN4
- Rating:
- 100% of learners rate this course 9/10 or higher
Overview
This one day introductory course provides valuable insight into the weaknesses and vulnerabilities within common Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments. We will discuss infamous and more recent critical infrastructure cyber-attack case studies and the vital lessons learnt. Identify systems that are discoverable and understand suitable countermeasures, threats and ICS technical controls.
Target Audience
This course is aimed at operational / engineering teams, IT staff and security practitioners working in public and private sectors who are looking to gain and insight and awareness of the security vulnerability exposure and defensive countermeasures for industrial control systems.
Prerequisites
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
Learning Outcomes
- Control systems – closed loop systems
- ICS logic systems – relay, ladder, programmable systems
- ICS security
- Control system vulnerabilities and weaknesses
- ICS technical security controls
- Discoverable systems - countermeasures
- Governance and standards
Course Outline
Module 1 – Introduction to ICS and SCADA
Introduce concepts and function of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA)
-
Control systems
- Closed loop systems
-
ICS
- Relay logic
- Programmable logic controllers
- PLC Programming
- Sequential function charts
- Ladder logic
- ICS Network protocols
- SCADA
- ICS Security
Module 2 – Introduction to Industrial Control Systems Security
- When control systems go wrong
-
Critical national infrastructure (CNI)
- Centre for the protection of national infrastructure (CPNI)
- Vulnerable systems
- Case study – STUXNET, Black Energy
- Not all ICS systems are designed with security in mind
- ICS common vulnerabilities
- Visible & discoverable ICS systems
- Risk management
- Defence in depth modified Purdue Model
- Typical ICS technical security controls
- Governance regulations
- Security standards
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.


Related to this course
ICS Security for Managers
The NCSC Certified ICS Managers Security Course is designed to provide those at Managerial level …
Securing ICS: Becoming a GICSP
The Securing ICS: Becoming a Global Industrial Cyber Security Professional (GICSP) course is desi…
ICS Practitioners Security Course
The IISP accredited ICS Practitioners Security Course is designed to provide ICS practitioners wi…
Assessing and Exploiting Control Systems & IIoT
This is not your traditional SCADA/ICS/IIoT security course! How many courses send you home …
New Certified Lead SCADA Security Manager
Lead SCADA Security Manager training enables you to develop the necessary expertise to plan, desi…