Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CSFI-CSCOE- Certified SCADA Cyberspace Operations Engineer

Train how to execute cyberspace operations within a SCADA environment.

GK# 9791

Course Overview

This course provides you with a thorough understanding of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) devices and their inner workings. You will learn how to execute cyber missions in which a SCADA environment is part of the greater cyberspace operational environment. By performing incident response on SCADA devices, you will learn in-depth concepts about SCADA devices.

Certification:

CSFI-CSCOE

Delivery Format Options

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Concepts of SCADA devices
  • SCADA devices work and function
  • Security concepts and challenges directly with SCADA devices
  • Vulnerability assessments within SCADA environments
  • Incident response within a SCADA environment
  • Penetration tests on Industrial Control systems
  • Vulnerabilities in web applications used in industrial control systems
  • Hardware, network, user interface, and server-side vulnerabilities
  • Incident response on industrial control systems
  • Unique differences between ICS incident response and traditional

Who Needs To Attend

  • Anyone involved with designing, monitoring, or operating SCADA/ICS networks
  • Security personnel whose job involves assessing, deploying, or securing control system components, communications, and operations
  • Programmers
  • Network and system administrators supporting control systems
  • Process engineers and field technicians
  • Operations and plant management personnel
  • Control system hardware, software and integrator vendor personnel
  • Penetration testers
  • NERC CIP, DHS CFATS, and other auditors
  • Managers who need to build deeper technical skills
  • Computer emergency response teams

Course Outline

Download Course Outline