Shop

Artificial Intelligence Notice: ISA prohibits the entry of any ISA intellectual property (“ISA IP”), including standards, publications, training or other materials into any form of Artificial Intelligence (AI) tools, such as ChatGPT. Additionally, creating derivatives of ISA IP using AI is also prohibited without express written permission from ISA’s CEO. In the case of such use, ISA will suspend a licensee’s access to ISA IP, and further legal action will be considered. Please review ISA's policies for Use of AI Tools, Intellectual Property and Terms and Conditions for further information.

IACS Cybersecurity Design & Implementation (IC34)

female_engineer_working_at_computer

Protect Industrial Control Systems Using ISA/IEC 62443 Standards

Industrial Automation Control System (IACS) Cybersecurity Design & Implementation (IC34) provides a straightforward, standards-based approach to securing industrial automation and control systems (IACS) using the ISA/IEC 62443 framework. This course covers the IACS cybersecurity lifecycle and shows how risk assessment outcomes inform zone- and conduit-level security strategies, network segmentation, demilitarized zone (DMZ) architectures, firewall planning and configuration, intrusion detection concepts, system and network hardening, access control and certificate management, secure remote access and cybersecurity acceptance testing. It emphasizes the core requirements of ISA/IEC 62443 and highlights design and verification methods that align technical controls with organizational risk tolerances. IC34 also explores security level (SL) concepts to help designers align risk objectives with security capability targets. 

Students will learn standards‑based techniques to secure industrial control systems, streamline security decision‑making and demonstrate measurable improvements in resilience and compliance, while improving communication with engineering, operations, and procurement teams. Companies benefit from more consistent security planning, better alignment between risk assessments and countermeasures, and a stronger foundation for acquiring and validating security solutions across integration, maintenance, and supplier roles.   


ISA/IEC 62443 Cybersecurity Fundamentals Specialist badge
IC34 is third course in the ISA/IEC 62443 Cybersecurity Certificate Program. The course registration includes the exam fee. Pass the exam to earn the ISA/IEC 62443 Cybersecurity Design Specialist Certificate designation. 
 


Prerequisite

Successful completion of Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) and passing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist certificate exam are mandatory prerequisites for this course. 


Who Should Attend IC34?

  • Control systems engineers and managers
  • System integrators
  • IT engineers and managers in industrial facilities
  • Plant managers
  • Plant safety and risk management personnel

View Offerings by Format

Classroom (IC34)

Length: 3 days 
CEU Credits: 2.1

View IC34 Offerings


Virtual Classroom (IC34V)

Length: 3 days 
CEU Credits: 2.1

View IC34V Offerings


Self-Paced Modular (IC34M)

Length: 10 Modules 
CEU Credits: 0.7

View IC34M Offering

Visit our course formats page for a detailed description of each format. 

Learning Objectives

  • Interpret the results of an industrial control system (ICS) cybersecurity risk assessment
  • Develop a cybersecurity requirements specification (CRS)
  • Develop a conceptual design based upon information in a well-crafted CRS
  • Explain the security development lifecycle (SLD) process and deliverables
  • Perform a basic firewall configuration and commissioning
  • Design a secure remote access solution
  • Develop system hardening specification
  • Implement a basic network intrusion detection system (IDS)
  • Develop a cybersecurity acceptance test plan 
    • Cybersecurity factory acceptance test (CFAT)
    • Cybersecurity site acceptance test (CSAT)
  • Perform a basic CFAT or CSAT 

Topics Covered

  • Introduction to the ICS Cybersecurity Lifecycle
    • Assessment phase
    • Implementation phase
    • Maintenance phase
  • Conceptual Design Process
    • Interpreting risk assessment results
    • Cybersecurity requirements specifications
    • Developing a conceptual design
    • Conceptual design specification
  • Detailed Design Process
    • SDL
    • Types of technology
    • Selecting appropriate technology
    • Developing a detailed design
    • Documenting the design/specification
  • Design & Implementation Examples
    • Firewall design example
    • Remote access design example
    • System hardening design example
    • Intrusion detection design example
  • Testing
    • Developing test plans
    • CFAT
    • CSAT

Exercises

  • Building the board
  • Firewalls
  • Defining USB policy and procedure
  • Network device hardening
  • Remote access
  • Using 62443 3-3 to validate achieved security level (SL-A)

Recommended Prerequisites

ISA course Assessing the Cybersecurity of New or Existing IACS Systems (IC33) or equivalent knowledge/experience.


Recommended Resources

Take the First

Module Free!

Then choose the format that best fits your needs for the full course.


Not sure if this course is right for you? Take the IC34 knowledge check designed to evaluate your level of understanding of the course material and show you the types of questions you’ll be able to answer after completing the course.

Custom Training Solutions

If your company is interested in bringing training on site to your team, please contact trainingsales@isa.org or call +1 919-549-8411.

ISA Member Discount

To get the member price on today’s purchase, log in as a member or complete the join process before you complete your purchase. To join and/or register by phone, call Customer Experience at +1 919-549-8411.