Critical Infrastructure and Control System Cybersecurity Training

Print Friendly, PDF & Email
Introduction

Critical Infrastructure and Control System Cybersecurity Training Course Description

This Critical Infrastructure and Control System Cybersecurity Training course is an intermediate to advanced course covering control system cybersecurity vulnerabilities, threats and mitigating controls. This Critical Infrastructure and Control System Cybersecurity Training course will provide hands-on analysis of control system environments allowing students to understand the environmental, operational and economic impacts of attacks like Stuxnet and supporting mitigating controls.

• Hands-on environment (PLC, HMI, Network Communications, Backtrack)
• Operational, Cyber and Physical Protective Solutions
• Kits provided and used by pods of two attendees (Laptop, Customized I/O Trainer, PLC, HMI, communications infrastructure, CYBATIFIED Backtrack)

Duration: 5 days

Critical Infrastructure and Control System Cybersecurity Training Related Courses

Customize It

• We can adapt this Critical Infrastructure and Control System Cybersecurity Training course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this Critical Infrastructure and Control System Cybersecurity Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Critical Infrastructure and Control System Cybersecurity Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Critical Infrastructure and Control System Cybersecurity Training course in manner understandable to lay audiences.

Audience / Target Group

The class establishes a high-level understanding of Control System cybersecurity valuable to a wide-range of professionals, whether directly in the field or responsible for compliance. The class also dives into a great deal of real-world cybersecurity applications and satisfies those who need or want to understand the inner-workings of the systems as well as the programming behind industrial automation. Therefore, the class is applicable to:

• Security personnel whose job involves assessing, deploying, or securing control system components, communications and operations
• Programmers, network and system administrators supporting control systems
• Process engineers and field technicians
• Operations and plant management personnel
• Control System vendor personnel
• Penetration testers
• NERC CIP, DHS CFATS and other Auditors who need to build deeper technical skills
• Computer emergency response teams

Objectives:

After completing this Critical Infrastructure and Control System Cybersecurity Training course, attendees will be able to:

Critical Infrastructure and Control System Cybersecurity Training - Course Content:

Course Ethics and General Security Awareness

Critical Infrastructure Control System Cybersecurity Background

• Brief History of Critical Infrastructure and Control Systems
• Risk Management (Threats, Vulnerabilities and Exploits)
• Laboratory: Training Kit Orientation and Setup

Control System Cyber Architecture and Device Programming

• Control System Cyber Architecture Components
• Programmable Logic Controllers, Ladder Logic, Points and OPC/HMI
• Laboratory: Introduction to Programmable Logic Controllers, Ladder Logic, Communications and OLE for Process • Control (OPC) / Human Machine Interface (HMI) Programming

Cyber Asset Vulnerability Assessments

• Case Study Review and Analysis (e.g. Bellingham Gas Pipeline; BP Texas Refinery; Washington DC Metro)
• ICS-CERT Vulnerability Notification Review and Analysis
• Open Source Intelligence (OSINT)
• Cyber, Physical and Operational Security Assessments
• Cyber Toolsets
• Laboratory: PLC Vulnerability Assessments
• Laboratory: Analyze and develop control system oriented Metasploit modules
• Laboratory: Mock Environment Analysis (e.g. Robotic Arm, Traffic Lights, Heavy Rail)

Automation Technologies Attack Surface and Mitigations

• Programmable Logic Controller Analysis
• Mitigating Controls
• Laboratory: PLC Exploit Analysis and Control
• Analyzing Control System IEDs
• Laboratory: Applied IED Security Analysis

Communications Attack Surface and Mitigations

• General Communications Protocol Analysis
• DNP3, IEC Variants, ICCP, Modbus Specific Protocol Analysis
• Vulnerabilities and Exploits
• Analyzing Wireless in Control Systems
• Mitigating Controls
• Laboratory: Communications Exploit Analysis and Control
• Laboratory: Protocol Spoofing and Fuzzing
• Laboratory: Industrial Wireless (802.11, 900 Mhz, GPRS and Zigbee) Analysis

OLE for Process Control / Human Machine Interface Attack Surface and Mitigations

• OPC / HMI Analysis
• Mitigating Controls
• Laboratory: OPC/HMI Exploit Analysis and Control

Integrated Defense in Depth Security Controls

• Layered Operational, Cyber and Physical Controls
• Forensics and attribution in control systems
• Performing Physical-Cyber-Operational Assessments and Penetration Tests
• Laboratory: Automation Technology Exploration and Vulnerability Assessments
• Situation Awareness and Incident Response
• Laboratory: Simulated Power Grid Control System Environment Attack and Defend

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0