Skip to main Content

EC-Council ICS/SCADA Cybersecurity + Exam voucher

  • Course Code EICS-SCADA
  • Duration 3 days

Elearning (Self-paced) Price

Please call

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Elearning (Self-paced)

    Self paced electronic learning

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

Due to the potential impact of an attack on the physical safety of communities, employees or customers, ICS /SCADA security is an even higher priority than for traditional IT systems. Cyber criminals have already developed malware threats such as Triton/TRISIS and Stuxnet that can disrupt industrial Operation Technology (OT).

The ICS/SCADA Cyber Security Training Course is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network.

Target Audience

Top

This course is specially designed for IT professionals who are involved in managing or directing their organization’s IT infrastructure and who are responsible for establishing and maintaining information security policies, practices and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

Job roles:

- SCADA Systems Personnel

- Business System Analysts Who Support SCADA Interfaces

- System administrators, engineers and other IT professionals when administering, patching, securing SCADA and/or ICS

- Security consultants when performing security assessments of SCADA and/or ICS

Course Objectives

Top

You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set, you will look at the best practices and recommendations when it comes to bridging the air gap. You will learn a systematic process of intrusion and malware analysis. Once you have the process for analysis mastered, you will be introduced to the digital forensic process and how to respond to incidents when a breach is detected.

Course Content

Top
  • Introduction to ICS/SCADA Network Defense
  • TCP/IP 101
  • Introduction to Hacking
  • Vulnerability Management
  • Standards and Regulations for Cybersecurity
  • Securing the ICS network
  • Bridging the Air Gap
  • Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)