This is a Virtual Instructor-Led Training (VILT) course offering. Our virtual instructor-led courses, taught remotely by experienced instructors in short sessions over several days, leverages distance learning web technology. The VILT delivery allows attendees to continue to work at their normal job duties between sessions while letting them immediately apply their newly gained knowledge to their current work projects.
Certificate Program: After successfully completing all twelve modules, students may take the exam for ISA/IEC 62443 Cybersecurity Fundamentals Specialist. The exam fee is included with this course purchase.
The move to using Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has exposed these systems to the same cyberattacks that have wreaked havoc on corporate information systems. This course provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.
You will be able to:
- Discuss the principles behind creating an effective long-term program security
- Interpret the ANSI/ISA99 industrial security guidelines and apply them to your operation
- Define the basics of risk and vulnerability analysis methodologies
- Describe the principles of security policy development
- Explain the concepts of defense in depth and zone/conduit models of security
- Analyze the current trends in industrial security incidents and methods hackers use to attack a system
- Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks
You will cover:
- Understanding the Current Industrial Security Environment: What is Electronic Security for Industrial Automation and Control Systems? | How IT and the Plant Floor are Different and How They are the Same
- How Cyberattacks Happen: Understanding the Threat Sources | The Steps to Successful Cyberattacks
- Creating A Security Program: Critical Factors for Success/Understanding the ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009)- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- Risk Analysis: Business Rationale | Risk Identification, Classification, and Assessment | The DNSAM Methodology
- Addressing Risk with Security Policy, Organization, and Awareness: CSMS Scope | Organizational Security | Staff Training and Security Awareness
- Addressing Risk with Selected Security Counter Measures: Personnel Security | Physical and Environmental Security | Network Segmentation | Access Control
- Addressing Risk with Implementation Measures: Risk Management and Implementation | System Development and Maintenance | Information and Document Management
- Monitoring and Improving the CSMS: Compliance and Review | Improve and Maintain the CSMS
- Learn how to use built in Operating System (OS) command line prompts to enumerate and understand a network
- Introduce the use of port scanning utilities to identify open ports, running services, OS, and other attributes of a network connected device
- Investigate the use of packet capturing tools to display and analyze network traffic
- Apply a free windows baseline security analyzer tool from Microsoft
ISA Courses TS06, TS12, or equivalent knowledge/experience.
Basic level of risk assessment knowledge, skills and experience (e.g., SIS/SIL, ISO) or equivalent
If you wish to register offline, download the Training Registration Form, complete, and return to ISA with your payment.
Not sure this particular course is for you?
A pre-instructional survey is available for you to evaluate your level of understanding of the course material and to show you the types of questions you'll be able to answer after completing the course.