The Industrial Cyber Security Certification Course
This ICS Cybersecurity certification covers all aspects of Industrial Cyber security including a special advanced module on Understanding IEC 62443-2-4 that is very useful for not only automation system vendors and system integrators, but also to owner/operators to know what to expect from the vendor that supplies , installs, commissions and maintain the Industrial Control System.
When you complete the requirements of this course, you earn the title of CICP- Certified Industrial Cybersecurity Professional. Having this title informs everybody that you have the knowledge and skills to work in the Industrial Cyber security domain.
Industrial Cyber security certification is now highly sought after if you are working in any manufacturing industry or facility that is dependent on OT (Operational Technology). These OT systems are responsible for running not only manufacturing facilities but also critical infrastructure like the electrical grid and municipal city water systems. Employers are looking for not just OT security knowledge and skills but also certifications like CICP.
There are of course a couple of other certification programs related to Industrial Cybersecurity and OT security, but they are not very affordable. This industrial cyber security certification program is the most cost effective program anywhere in the world and is considered one of the best ics cyber security certifications to earn.
What does the Industrial Cyber Security Certification course cover?
This industrial cyber security certification course is useful for Automation, Instrumentation, Control Systems, Electrical Engineers who work with DCS/PLC/SCADA/SIS systems and also for IT Cybersecurity Professionals, who need to understand the security aspects of these systems. Out of all the training courses out there, this is the only one that covers everything at a very affordable price!
1. Overview of Industrial Automation & Control Systems (DCS / PLC / SCADA /SIS).
Industrial Control Systems (ICS for short) refer to those Instrumentation, Control Systems and Automation systems that monitor and control industrial plants and processes such as Oil Platforms, Oil and Gas processing facilities, Power Generation plants, Chemical plants, Petrochemical manufacturing plants, textile plants, Electrical Distribution Grids, Ships, Terminal Automation Systems, Steel Plants, Pharmaceutical manufacturing and formulation plants, Food and Beverage industries, Water and Wastewater treatment plants, oil and gas pipelines, pumping stations, solar power plants, nuclear power plants, nuclear fuel reprocessing facilities and many more.
Industrial Control Systems- are they only in manufacturing plants?
No, they are not just in typical manufacturing plants only. Many of these systems are part of critical infrastructure where they are not actually recognized as “industrial” control systems, (but they actually are) and they govern a country level critical infrastructure, such as for example the sluice gates of a dam or the electric grid that supplies electricity nationwide.
An ICS network and control system can be one of many different types such as DCS (Distributed Control Systems), SCADA (Supervisory Control and Data Acquisition Systems), PLC (Programmable Logic Controllers), PAC (Programmable Automation Controller), SIS (Safety Instrumented Systems), ESD (Emergency Shutdown Systems) and more. Many of these industrial control systems were designed and installed in an age, where there were no security issues, hence they were cyber insecure at the design stage itself. These industrial control systems grew in size and complexity and many got interfaced to other enterprise business systems, such as ERP systems like SAP, but continued to remain insecure.
These systems are typically architected, designed and installed by Instrument Engineers, Automation Professionals or Instrumentation & Control System engineers, who are proficient in control systems but not necessarily trained in cybersecurity. Today a control system is vulnerable to cyber attacks in many ways and control system engineers need to aware of ICS security and SCADA security, to prevent catastrophic consequences such as loss of containment, asset damage and environmental disasters, not to mention possible loss of life.
In the recent past there have been many such attacks on industrial control systems and ICS networks, such as Stuxnet on Siemens and TRITON that was executed on a Triconex system.
Why you should get this course now?
Industrial Cyber security is a new and upcoming skill that many engineers and technical professionals do not have. There is a huge demand for these skills from employers and this demand will only grow in the years to come, as we see more cases of attacks on not only Industrial Control Systems themselves directly, but also via supply chain attacks.
Hence, you must take this Abhisam course and get certified (on passing the exam you get an electronic certificate and a badge from Abhisam as a Certified Industrial Cybersecurity Professional).
Many cybersecurity professionals are from an IT background with skills in Business Systems cybersecurity, but have little knowledge about Industrial Control Systems cybersecurity. This program can help plug this gap.
This online cybersecurity training course can be taken by either Instrumentation, Control Systems or Industrial Automation engineers, who have a good background knowledge of DCS, PLC, SCADA and other similar systems OR by experienced Information Technology related cybersecurity professionals, who wish to expand their skillset.
Please note that though this course does cover information security as one of the important aspects of protecting your control system, it is not an exclusively information security course.
Overview of Contents of the Modules:
MODULE 1- Overview of Industrial Automation & Control Systems (DCS/PLC/SCADA/SIS)
Introduction to Industrial Automation & Control Systems (IACS)
IACS Application Areas
Cyber physical systems
Evolution of IACS
Single Loop Controller architecture
Control Room & Field
Analog Electronic Signals
Point to Point Architecture
Direct Digital Control (DDC) to Distributed Control Systems (DCS)
DCS as a group of controllers
DCS Connection to field devices
Programmable Logic Controllers (PLC)
Safety Instrumented Systems
Typical IACS Architecture
Module 2 Basic Concepts of Cybersecurity
Brute Force Attacks
Public and Private Keys
Locking and Unlocking
Public Key Cryptography-
Defense in Depth
Role of Malware
Understanding malware delivery
Threats & Vulnerabilities
Types of Trojans
Command & Control
Firewall Basic Working
Classes of Firewalls
Deep Packet Inspection Firewalls
Intrusion Detection Systems (IDS)
Denial of Service
Distributed Denial of Service (DDoS)
Telephonic Denial of Service (TDoS)
Privilege Escalation Vulnerbility
Module 3- Threats to IACS
Threats to IACS
IACS Threat Severity
Insecure by design
Use of COTS
Skill Levels needed
Lack of awareness
Four Steps to an Attack
Insecure Connections & Firewalls
Fake Updates and Pirated Software
Devices and Software with Vulnerabilities
Advanced Persistent Threats (APT)
Cross Site Scripting
Zero Day Exploits
ICS Attack Categories
ICS Targeted attacks
Attack Sequence of Events
Man in the middle attack
MITM in ICS
Denial of Service
Module 4- ICS Cybersecurity Standards
ISA99- Purdue Model
IEC 62443 Organization-2
Zones, Conduits and Security Levels
Chlorine Loading Example
Security Level Types
Cybersecurity Management System
ISA Secure Scheme
IEC 61508 implementations
IEC 61511- More clauses
Module 5- Industrial Control Systems Risk Assessment
Risk Assessment Case Study
Risk Assessment & Mitigation, Incident Response
Non Safety Consequences
Risk Assessment Process
Security Vulnerability Analysis
ICS Security Evaluation
Initial Risk Assessment
ICS Vulnerabiility Assessment
Seven Steps to be carried out
Secondary Risk Assessment
Module 6- Industrial Cybersecurity Lifecycle
This module has ten sections about the Industrial Cybersecurity Lifecycle.
Understand the Stuxnet cyber attack in detail. Evaluate if it could have been prevented by using current ICS standards.
Module 8- Self Assessment Test
Use this self assessment test to judge how well you have understood the subject. Also use it as a mock test to prepare for the exam.
Cyber Kill Chain Model
MITRE ATT&CK framework for Industrial Control System
Honeypots for Industrial Control System
Advanced SHODAN techniques and other search methods
Understanding and complying with IEC 62443-2-4
Note: The Understanding IEC 62443-2-4 course is included in this version of the course.
Why you should get this course from Abhisam?
Abhisam is the world leader in online training as well as traditional classroom type training for technical professionals in industry. We have trained thousands of engineers and technicians all over the world.
Our learners come from Fortune 500 companies, individuals, government organizations as well as universities.
Who has taken this course?
Engineers and Managers from marquee companies, such as FLSmidth, Black & Veatch, SASOL, GALP as well as several individuals working with companies like Honeywell, Yokogawa and others have taken this course and got certified. Many security consultants have also taken this course and found it extremely useful for advising their clients about OT security issues.
Question: Why should I not read books instead?
There are hundreds of cybersecurity books, but very few on Industrial Cyber Security, but you will appreciate that reading books and understanding them is a much slower process than learning via animations, narrations and actual cases, that are shown in the training course.
You will also not get certified by reading a book.
Question: Can I not get this information online elsewhere?
Of course you can spend hours of your valuable time, surfing the internet but you will quickly find that it saps your energy when you spend hundreds of hours of your time trying to find nuggets of useful information . The ics-cert training programs are free but do not cover standards such as IEC 62443.
Question: We are an organization (company, university, association, etc). Can we use this course to train our employees/students/members?
Of course you can. We have special Enterprise and University pricing. If you need to record employee or student training activity and wish to get a record of their scores and certificates, then a fee will be applicable.
Question: Can this course be provided in a SCORM or TinCan format for deployment on our own Learning Management System?
Yes, please contact us at firstname.lastname@example.org for a quote.