Our SCADA security instructors have both SCADA security and IT security expertise - rare combination. Now updated with an in-depth lab on Stuxnet
SCADA, DCS and other process control networks, generically called SCADA, run the nation's mission critical infrastructure, everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move to standard protocols, the Microsoft OS and interconnection to other networks. Learn the skills required to direct and manage the appropriate cyber security protection for your SCADA system.
Today, IT departments and the classic IT security approach is wreaking havoc with SCADA systems. Too often, IT 'fixes' bring a SCADA system down, but avoiding or ignoring cyber security is not an option. Learn how standard IT security solutions can be used in SCADA systems and where SCADA specific security controls and practices are required. This course will teach you to develop a SCADA cyber security program and work with internal and external IT resources to implement the program.
Our Expert Instructors:
Our SCADA security instructors have both SCADA security and IT security expertise, a rare combination. They have performed assessments, designed security architectures, and written and audited security policies on a wide variety of real world SCADA systems in the oil & gas, electric, water and other industries.
Watch this video demo to see an example of a SCADA
lab you'll be completing in this course
Because of the nature of this security course, you must pass a background check prior to attending. Students that fail, or do not complete the background check approval process, are not allowed to attend. You will be issued a full refund if you fail to complete a background check.
Some of the topics that are covered in the SCADA Security course include:
Some of the hands on labs included in the comprehensive 5 day training curriculum:
|Dates||Location||Reserve a Seat!|
|Any Date!||Any Location!||SCADA Security Online - More Details Here|
|-||Las Vegas, NV||Reserve a Seat|
|-||Dulles, VA||Reserve a Seat|
|-||Live Online,||Reserve a Seat|
|06/15/14-06/19/14||Abu Dhabi, UAE||Reserve a Seat|
|07/28/14-08/01/14||Houston, TX||Reserve a Seat|
|09/14/14-09/18/14||Dubai, UAE||Reserve a Seat|
|09/22/14-09/26/14||Live Online,||Reserve a Seat|
|09/22/14-09/26/14||Dulles, VA||Reserve a Seat|
|10/27/14-10/31/14||Houston, TX||Reserve a Seat|
|12/01/14-12/05/14||Live Online,||Reserve a Seat|
|12/01/14-12/05/14||Dulles, VA||Reserve a Seat|
|12/07/14-12/11/14||Abu Dhabi, UAE||Reserve a Seat|
|12/09/14-12/13/14||Baltimore, MD||Reserve a Seat|
|Any Date|| Your Office!
||Get Information for On-Site Training|
The CSSA determines if a candidate possess adequate knowledge to properly secure a SCADA system. It is designed to be relevant for power transmission, oil and gas and water treatment industries.
The CSSA certification provides professionals with an objective measure of competence as well as a recognizable standard of achievement. The CSSA credential is ideal for industrial network administrators and their managers, as well as IT professionals and their managers. The CSSA certification encompasses the following domains:
Free limited use Triangle MicroWorks SCADA simulator license
5 Days of Expert SCADA Security Training from an instructor with real-world experience in SCADAsecurity and deep knowledge of course content.
Guaranteed small class size (less than 10-16 Students), you get an intimate learning setting not offered at any of our competitors.
CSSA Exam Fee included
Breakfast and lunch catered in to the training facility. Some snacks and refreshments included.
Introduction The theme of the car hacking is increasingly discussed by the media and within the security community. At one time, the exploits of hackers that have hijacked a car were the subject of movie scenes. Today they are a disturbing reality that we discuss in this article. One of [...]
The post Car Hacking: You Cannot Have Safety without Security appeared first on InfoSec Institute.
Introduction Supervisory control and data acquisition (SCADA) networks contain computers and software that perform critical tasks and provide essential services within critical infrastructure. They’re considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats [...]
Introduction The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access [...]
The article will explore various strategies for reversing firmware, with some examples. Finally, some best practices are mentioned. Embedded Systems and Firmware Embedded systems are everywhere, in mobiles, cameras, TVs, smart cards, and other automated devices. They have become an integral part of our lives and have made it comfortable [...]
Introduction In the last few years there has been an increase within the worldwide security community consciousness of the risks related to cyber-attacks against critical infrastructures of a countries; an event considered by principal security experts extremely likely. Probably the strongest jolt has been caused by events such as the [...]