Scada Security Training | Scada Training

Scada Security Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Scada Security Training with Real World Hands-on Lab and Exercises

SCADA, DCS and other process control networks, generically called SCADA, run the nation’s mission critical infrastructure, everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move to standard protocols, the Microsoft OS and interconnection to other networks. With Scada Security Training, you will learn the skills required to direct and manage the appropriate cyber security protection for your SCADA system.

Today, IT departments and the classic IT security approach is wreaking havoc with SCADA systems. Too often, IT ‘fixes’ bring a SCADA system down, but avoiding or ignoring cyber security is not an option. Learn how standard IT security solutions can be used in SCADA systems and where SCADA specific security controls and practices are required. This Scada Security Training course will teach you to develop a SCADA cyber security program and work with internal and external IT resources to implement the program.

Our Scada Security Training instructors have both SCADA security and IT security expertise, a rare combination. They have performed assessments, designed security architectures, and written and audited security policies on a wide variety of real world SCADA systems in the oil & gas, electric, water and other industries.

Related Courses

Scada Security Challenges and Solutions Training
Industrial Control Systems – ICS/SCADA Security Essentials Training
Scada and Industrial Computing Applications: Fundamentals and Principles Training
SCADA Systems Security Training | ICS Security Training
Introduction to Industrial Control Systems Cybersecurity Training
Smart Grid Cybersecurity Training
Wireless Industrial and Scada Networks Training

Customize It:

• If you are familiar with some aspects of this Scada Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Scada Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Scada Security Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Scada Security Training course:

• Incident responders
• Forensic investigators
• Threat operation analysts
• Incident responders needing to quickly address system security breaches
• Threat operations analysts seeking a better understanding of network based malware and attacks
• Those individuals who want to learn what malicious network activity looks like and how to identify it

What You Will Learn:

Upon completing this Scada Security Training course, learners will be able to meet these objectives:

• SCADA security policies
• Firewall architecture, DMZ, and rulebases
• Secure remote access to a control center
• SCADA protocol security issues
• Securing field communications
• User authentication technologies and integration with SCADA applications
• Access control principles and implementation
• Active Directory integration with SCADA applications
• Detecting cyber attacks on SCADA systems
• Vulnerability scanning
• Security patch management
• Anti-virus protection and management
• Exceptions – what to do when you can’t implement best practice
• SCADA security standards

Scada Security Training – Course Syllabus:

Introduction

• Security Challenges are Universal
• Increased Vulnerability Due To Open Systems Trend
• Increased Vulnerability From Motivated, Knowledgeable Attackers
• Some Documented SCADA Security Failure Incidents

Open Systems Issues Push The Agenda

• Protocols of the Internet Architecture
• Ethernet and Other IT-derived Networks
• Fieldbus Standards
• IEC Standards
• Ethernet/IP and CIP
• Computer Operating Systems; Windows and Unix/Linux

Points of Vulnerability

• The IT Infrastructure
• Leased Infrastructure; Frame Relay and Other Services
• The Sensor/Fieldbus Networks
• Wireless LAN Systems
• Rogue (Undocumented) Dial and Wireless Links
• Infected/Compromised Portable Equipment
• Network Management Systems

SCADA Network Protocols

• Features Common to Most SCADA Networks
• The MODBUS Protocol and Lack of Security
• Demonstration: MODBUS Dialog
• The DNP3 Protocol and Its Security Limitations
• The Near-Universal Trend to Ethernet-Based Networks
• Network Management Systems

Encryption

• Starting With a Secure Physical Environment
• Traditional Purpose of Assuring Privacy is a Minor Issue
• Traditional Symmetric Key Cryptography
• Public Key Cryptography and RSA
• Protecting Field Networks From Intrusion With Encryption

Firewalls and Perimeter Security

• Firewall Design Objectives
• Survey of Firewall Types
• Network Address Translation
• Creating and Populating a SCADA DMZ
• Field-Level Firewalls in the SCADA Network

Access Control and Authorization: Managing Users

• Limitations of User ID’s and Passwords
• Multi-Factor Authentication Methods
• Microsoft’s Active Directory Services
• RADIUS, TACACS and Diameter Authentication Services

Intrusion Detection and Prevention

• NIDS Principles and Features
• Deployment Scenarios
• Packet Signature and Traffic Pattern Analysis
• Strategies For Dealing With The Volumes of Data

Wireless Security Issues

• Wireless Technology Offers Compelling Advantages
• Early Misadventures With Wireless Security
• TKIP and the WPA/IEEE 802.11i Supplemental Standard
• Private Point-to-Point Wireless Services
• Cellular/Mobile Data Networks; Benefits and Risks

Creating and Documenting A Security Solution

• Essential Elements of a Secure Environment
• Promoting User Awareness
• Elements of an Effective Security Policy
• Defining a Model for Internet Access

10 Essential Steps to Improving SCADA Security

• Appendices
• Glossary of Terminology
• Suggestions For Further Reading
• General Index

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email