Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »

ICS-SCADA Cybersecurity

ICS-SCADA Cybersecurity

€ 2.049,00 € 2.479,29 Excl. btw

ICS-SCADA Cybersecurity

Lees meer
Beschikbaarheid:
997
Levertijd:
Bestel voor 16:00 uur en start vandaag.
  • Bestel voor 17:00 uur en start vandaag
  • Persoonlijke service van ons deskundige team
  • Veilig betalen
  • Certificaat van deelname
  • De laagste prijs garantie

E-Learning Training ICS-SCADA Cybersecurity

Trainings programma's die zijn ontworpen om industriële cyberbeveiligingsbedreigingen tegen te gaan

Industriële automatiseringsprocessen maken gebruik van industriële controlesystemen (ICS) en toezichthoudende controle- en data-acquisitiesystemen (SCADA) om industriële processen lokaal of op afstand te besturen en om realtime gegevens te bewaken, te verzamelen en te verwerken.

Terwijl de snelle groei van interconnectiviteit tussen systemen doorgaat (d.w.z. Internet of Things, Industrial Internet), zijn ICS- en SCADA-systemen nu toegankelijk en worden ze een doelwit met hoge prioriteit voor hackers. Cybercriminelen hebben al malwarebedreigingen ontwikkeld die industriële Operation Technology (OT) kunnen verstoren. Vanwege de mogelijke impact van een aanval op de fysieke veiligheid van gemeenschappen, medewerkers of klanten, heeft ICS/SCADA-beveiliging een nog hogere prioriteit dan traditionele IT-systemen.

Cursusbeschrijving

Je leert krachtige methoden om het risico van zowel het IT- als het bedrijfsnetwerk te analyseren. Zodra uw fundament is gelegd, bekijkt u de best practices en aanbevelingen als het gaat om het overbruggen van de luchtspleet. Je leert een systematisch proces van inbraak- en malware-analyse. Zodra u het analyseproces onder de knie heeft, maakt u kennis met het digitale forensische proces en hoe u kunt reageren op incidenten wanneer een inbreuk wordt gedetecteerd.

Module 1: Introduction to ICS/SCADA Network Defense

IT Security Model
ICS/SCADA Security Model
LAB: Security Model

Security Posture
Risk Management in ICS/SCADA
Risk Assessment
Defining Types of Risk
Security Policy
LAB: Allowing a Service

Module 2: TCP/IP 101

Introduction and Overview
Introducing TCP/IP Networks
Internet RFCs and STDs
TCP/IP Protocol Architecture
Protocol layering Concepts
TCP/IP layering
Components of TCP/IP Networks
ICS/SCADA Protocols
LAB: TCP/IP and ICS/SCADA Protocols

Module 3: Introduction to Hacking

Review of the Hacking Process
Hacking Methodology
Intelligence Gathering
Footprinting
Scanning
Enumeration
Identify Vulnerabilities
Exploitation
Covering Tracks
LAB: Hacking ICS/SCADA Networks Protocols

How ICS/SCADA are targeted
Study of ICS/SCADA attacks
ICS/SCADA as a high value target
Attack methodologies in ICS

Module 4: Vulnerability Management

Challenges of Vulnerability Assessment
System Vulnerabilities
Desktop Vulnerabilities
ICS/SCADA Vulnerabilities
Interpreting Advisory Notices
CVE
ICS/SCADA Vulnerability Sites
Lifecycle of A vulnerability and Exploit
Challenges of Zero-day Vulnerability
Exploitation of a vulnerability
Vulnerability Scanners
ICS/SCADA Vulnerability Uniqueness
Challenges of Vulnerability Management within ICS/SCADA
LAB: Vulnerability Assessment

Prioritizing vulnerabilities
CVSS
OVAL
LAB: Vulnerability Severity

Module 5: Standards and Regulations for Cybersecurity

ISO 27001
ICS/SCADA
NERC CIP
CFATS
ISA99
IEC 62443
NIST SP 800-82

Module 6: Securing the ICS network

Physical Security
Establishing policy – ISO roadmap
Securing the protocols unique to the ICS
Performing a vulnerability assessment
Selecting and applying controls to mitigate risk
Monitoring
Mitigating the risk of legacy machines

Module 7: Bridging the Air Gap

Do you really want to do this?
Advantages and disadvantages
Guard
Data Diode
Next Generation firewalls
Deploying event monitoring to mitigate the risk to the ICS
Implementing strong authentication

Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

What IDS can and cannot do
Types IDS
Network
Host
Network Node
Advantages of IDS
Limitations of IDS
Stealthing the IDS
Detecting intrusions
LAB: Intrusion Detection

Log analysis
ICS Malware analysis
LAB: ICS Malware Analysis

Essential malware mitigation techniques
ICS/SCADA Network Monitoring
ICS/SCADA IDS
Case Study: Configuring essential rules within ICS/SCADA

Who is it for?

This course is specially designed for IT professionals who are involved in managing or directing their organization’s IT infrastructure and who are responsible for establishing and maintaining information security policies, practices and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

Job Roles

SCADA Systems Personnel
Business System Analysts Who Support SCADA Interfaces
System administrators, engineers and other IT professionals when administering, patching, securing SCADA and/or ICS
Security consultants when performing security assessments of SCADA and/or ICS

The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network architectures from attacks. Students will learn to think like a malicious hacker to defend their organizations.

ICS/SCADA teaches powerful methods to analyze risks possessed by network infrastructure in IT and corporate spaces. Once your foundation or basic concepts are clear, you will learn a systematic process of intrusion and malware analysis. After this, you will learn about digital forensic process and incident response techniques upon detecting a breach.

Who Is It For?

This course is designed for IT professionals who manage or direct their organization’s IT infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

Job Roles

SCADA Systems personnel.
Business System Analysts who support SCADA interfaces.
System Administrators, Engineers, and other IT professionals who are administering, patching, securing SCADA, and/or ICS.
Security Consultants who are performing security assessments of SCADA and/or ICS.

Prerequisites

Linux operating system fundamentals, including basic command line usage.
Conceptual knowledge of programming/scripting.
Solid grasp of essential networking concepts (OSI model, TCP/IP, networking devices, and transmission media).
Understanding of basic security concepts (e.g., malware, intrusion detection systems, firewalls, and vulnerabilities).
Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.

The EC-Council Advantage

With EC-Council, you’ll get a chance to learn ICS/SCADA from industry experts. The training program is spearheaded by renowned SCADA expert, Kevin Cardwell. EC-Council’s SCADA training uses multimedia learning with interactive formats such as lectures, illustrations, and simulations.

Apart from this, the training program is interactive, and the learning module is activity-focused, which is helpful for skill development.

Duur 32 uur
Taal Engels
Certificaat van deelname Ja
Online toegang 365 dagen
Voortgangsbewaking Ja
Award Winning E-learning Ja
Geschikt voor mobiel Ja

Er zijn nog geen reviews geschreven over dit product.

Beoordelingen

Er zijn nog geen reviews geschreven over dit product.

Nieuwsbrief

Lees hier de wettelijke beperkingen

Recent bekeken

Goud Gecertificeerde Bekroonde E-Learning

MOS Gecertificeerde Docenten

Gemiddelde beoordeling

8.7

20 jaar Ervaring

Microsoft Office 365 Incompany Trainingen

Met MOS gecertificeerde docenten, nulmetingen met deskundig advies, maatwerk, huren van laptops, naslagwerk, hand-outs, evaluaties en certificaten van deelname.

Bekijk Incompany trainingen

Van onze blog

Lees onze meest recente artikelen

View blog