SCADA Security Manager

Free
Free access this course
Average Google Reviews Rate

Certificate of Completion

0

Online & Classroom

Companies trained their employees with us in this Subject

Pay by 4 Installment with Zero Interest, We Accept:

Student Ratings & Reviews

No Review Yet
No Review Yet

SCADA Security Manager training course is designed to help managers, supervisors, and operators in the field of IT to discover how to configure the required tools and features for developing and organizing SCADA projects in industrial processes.

SCADA – Supervisory Control and Data Acquisition is an industrial system framework that includes both hardware and software architecture to control, monitor and analyze an industrial process. SCADA is application software that enables managers, engineers, and industry operators, to supervise and efficiently communicate with the working environment.

As an application software, SCADA is designed to assist industry experts in maintaining and improving industrial processes. Hence, the objective of SCADA is to collect real-time data, and store, process and generate reports for the complex industrial processes.

Why is it essential to have a secured SCADA System? 

SCADA is an essential tool that provides networking systems, communication and security technologies, and standards which are necessary to facilitate the maintenance of industrial processes. The application of technology is vital for individuals to innovate and develop procedures that will assist industries shortly.

SCADA aims to provide individuals with techniques to choose, plan and design technologies for improving the business processes and other utilities.

Also, SCADA will assist individuals to learn the required skills that are essential to plan, direct, operate and manage a project system in a working environment.

The importance of SCADA is the automation system which allows the organization and individuals to anticipate risk uncertainties, lower investment, maintenance costs and study optimal responses to the continuity of industrial processes.

This intensive course enables participants to develop the necessary expertise to plan, design, and implement an effective program to protect SCADA systems.

Participants will be able to understand standard Industrial Control System (ICS) threats, vulnerabilities, and risks related to ICS systems and how they can be managed. This training focuses on a mix of knowledge and skills related to SCADA/ICS security.

You might be interested in another Information Security programs as a next step.

The course is accredited by GIAC.

WHAT YOU WILL LEARN

Industry experts have designed the course with in-depth experience in SCADA and Industrial Control Systems Security. Unlike other certifications, this course focuses specifically on the knowledge and skills needed by a professional looking to advise on or manage risks related to SCADA environments and systems. In addition to presenting the theoretical knowledge required by SCADA

Security Manager, a comprehensive methodology for the implementation is presented. Thus, at the end of this course, participants will gain understanding on how to efficiently implement a security program for SCADA/ ICS systems.

IMPORTANT COURSE INFORMATION

Requirements

Knowledge of SCADA systems is preferred.

Exam

You can apply for – Global Industrial Cyber Security Professional (GICSP) from GIAC.

One proctored exam

115 questions

Time limit of 3 hours

Minimum Passing Score of 69%

COURSE OUTLINE

Global Industrial Cybersecurity Professional (GICSP) Overview

Overview of ICS o Processes & Roles o Industries

Field Components of Real-Time Operating Systems

Programming Controllers o Exercise: PLC Programming

Supervisory Components o Specialized Applications o Master Servers o Exercise: HMI Programming

Types of ICS Systems o DCS vs. SCADA

IT & ICS Differences o ICS Lifecycle Challenges

Physical Security

ICS Network Architecture vs. Network Models

Design Example

Exercise: Architecting a Secure DCS
Global Industrial Cybersecurity Professional (GICSP) Overview

Overview of ICS o Processes & Roles o Industries

Field Components of Real-Time Operating Systems

Programming Controllers o Exercise: PLC Programming

Supervisory Components o Specialized Applications o Master Servers o Exercise: HMI Programming

Types of ICS Systems o DCS vs. SCADA

IT & ICS Differences o ICS Lifecycle Challenges

Physical Security

ICS Network Architecture vs. Network Models

Design Example

Exercise: Architecting a Secure DCS

Module 2: ICS Attack Surface
ICS Attack Surface o Exercise: Information Leakage

Attacks on HMIs and UIs

Intro to SamuraiSTFU

Exercise: Password Fuzzing

Web Attacks

Exercise: Authentication Bypass with SQL Injection

Attacks on Control Servers

Attacks on Network Communications

Exercise: Spoofing Modbus

Attacks on Remote Devices

Exercise: Analyzing Firmware o Firmware Attacks

Module 3: Defending ICS Servers and Workstations
Windows in ICS

Linux/Unix in ICS

Updates and Patching

Processes and Services

Configuration Hardening

Exercise: Bastille Linux

Endpoint Defenses

Exercise: Firewalls

Automation and Auditing

Exercise: Powershell

Log Management o Exercise: Windows Logs

Databases and Historians

Module 4: Defending ICS Networks and Devices
Network Fundamentals

Ethernet

TCP/IP Protocol Suite

ICS Protocols over TCP/IP o Exercise: Network Capture Analysis

Enforcement Zone Devices o Firewalls

Unidirectional Gateways

Honeypots

Wireless in Control Systems

Satellite Protocols

Mesh Protocols

Bluetooth and WiFi

Defenses

Exercise: Network Capture Forensics

Field and Plant Floor Equipment

Cryptography Fundamentals

Module 5: ICS Security Governance
Information Assurance Foundations

Data Classification

Depth in Defense

Security Policies

Policy Hierarchy

Policy Governance

Contingency and Continuity Planning

Risk Assessment and Auditing

Risk Governance

Calculating Risk

Exercise: Attack Tree Analysis

Password Management

Incident Handling

Six Steps

Table Top Exercise

Exercise: Incident Response

Resources

Free
Free access this course

Mosab
Senior Course Consultant

K M

أشكر المدرب أسامة مهره على أدائه الرائع وإعداده المتميز للمادة التدريبية - خبرة في مجاله‎

Rushi Rizvi

Thanks Strategic Axis - Their Professional Instructor was the reason why I passed my Exam. Card was late but is okay.

Ez Al Din Ahmad

I collaborate as a trainer with Strategic Axis which is one of the most important companies I deal with. I was honored to provide distinguished programs to their significant clients inside and outside the UAE.

Khawlah M

اخذت معهم كورس و تجربتي معهم كانت رائعة، الاستاذ مصعب راقي وجدا متعاون وعموما كل الطاقم لطيفين ومرحبين تشرفت بمعرفتهم ، والمدربه دعاء يعجبني فيها تشوف ايش المفيد للمتدرب وتوصله له ع حسب مستواه ، اعطتني معلومات جديده جدا مفيده في عملي

donia mansour

Highly professional institute with a wealth of knowledge!

I recently completed the 3 courses at Strategic Axis Institute and I was thoroughly impressed. The institute maintains a high level of professionalism throughout the program.

The course itself was incredibly informative and helpful. The trainer, Julia, was a true expert in the field and readily answered any questions we had. Her knowledge and insights were invaluable.

I highly recommend Strategic Axis Institute to anyone seeking to expand their knowledge as they offer various multiple about various topics.

Douaa Hammoudah

One of the best institutes in the Middle East, I am happy to deal with them❤️

Omar Alzarooni

I recently had the pleasure of enrolling in the course with Dr.Osama Muhra, and I cannot emphasize enough how valuable and impactful this learning experience has been. Strategic Axis has truly exceed my expectations in delivering a comprehensive and highly effective course. Thank you Dr.Osama.

Want to receive push notifications for all major on-site activities?

One of Our Consultants will be in Touch with You

Recently , 2 People Registered on This Course
Currently, 38 People are Reviewing This Page

Verify your Email Address
Complete Your Registration, by Clicking on Email Link we send to your provided Email

We’ll send you an invitation link shortly via email. Please check your inbox.

If you have any questions, feel free to reach out!

Tell us more