Scada Security Training

Print Friendly, PDF & Email

Scada Security Training Course with Real World Hands-on Lab and Exercises

Scada Security Training; SCADA, DCS and other process control networks, generically called SCADA, run the nation's mission critical infrastructure, everything from the power grid to water treatment, chemical manufacturing to transportation.

These networks are at increasing risk due to the move to standard protocols, the Microsoft OS and interconnection to other networks. With Scada Security Training, you will learn the skills required to direct and manage the appropriate cyber security protection for your SCADA system.

Today, IT departments and the classic IT security approach is wreaking havoc with SCADA systems. Too often, IT 'fixes' bring a SCADA system down, but avoiding or ignoring cyber security is not an option. Learn how standard IT security solutions can be used in SCADA systems and where SCADA specific security controls and practices are required. This Scada Security Training course will teach you to develop a SCADA cyber security program and work with internal and external IT resources to implement the program.

Our SCADA security instructors have both SCADA security and IT security expertise, a rare combination. They have performed assessments, designed security architectures, and written and audited security policies on a wide variety of real world SCADA systems in the oil & gas, electric, water and other industries.

Duration: 3-4 days

Scada Security Training Related Courses

Customize It!

• We can adapt this Scada Security Training course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this Scada Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Scada Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Scada Security Training course in manner understandable to lay audiences.

Audience / Target Group

The target audience for this Scada Security Training course is defined here:

• Incident responders
• Forensic investigators
• Threat operation analysts
• Incident responders needing to quickly address system security breaches
• Threat operations analysts seeking a better understanding of network based malware and attacks
• Those individuals who want to learn what malicious network activity looks like and how to identify it

Scada Security Training - Objectives:

After completing this Scada Security Training course, attendees will be able to:

• SCADA security policies
• Firewall architecture, DMZ, and rulebases
• Secure remote access to a control center
• SCADA protocol security issues
• Securing field communications
• User authentication technologies and integration with SCADA applications
• Access control principles and implementation
• Active Directory integration with SCADA applications
• Detecting cyber attacks on SCADA systems
• Vulnerability scanning
• Security patch management
• Anti-virus protection and management
• Exceptions – what to do when you can’t implement best practice
• SCADA security standards

Scada Security Training - Course Content:


• Security Challenges are Universal
• Increased Vulnerability Due To Open Systems Trend
• Increased Vulnerability From Motivated, Knowledgeable Attackers
• Some Documented SCADA Security Failure Incidents

Open Systems Issues Push The Agenda

• Protocols of the Internet Architecture
• Ethernet and Other IT-derived Networks
• Fieldbus Standards
• IEC Standards
• Ethernet/IP and CIP
• Computer Operating Systems; Windows and Unix/Linux

Points of Vulnerability

• The IT Infrastructure
• Leased Infrastructure; Frame Relay and Other Services
• The Sensor/Fieldbus Networks
• Wireless LAN Systems
• Rogue (Undocumented) Dial and Wireless Links
• Infected/Compromised Portable Equipment
• Network Management Systems

SCADA Network Protocols

• Features Common to Most SCADA Networks
• The MODBUS Protocol and Lack of Security
• Demonstration: MODBUS Dialog
• The DNP3 Protocol and Its Security Limitations
• The Near-Universal Trend to Ethernet-Based Networks
• Network Management Systems


• Starting With a Secure Physical Environment
• Traditional Purpose of Assuring Privacy is a Minor Issue
• Traditional Symmetric Key Cryptography
• Public Key Cryptography and RSA
• Protecting Field Networks From Intrusion With Encryption

Firewalls and Perimeter Security

• Firewall Design Objectives
• Survey of Firewall Types
• Network Address Translation
• Creating and Populating a SCADA DMZ
• Field-Level Firewalls in the SCADA Network

Access Control and Authorization: Managing Users

• Limitations of User ID's and Passwords
• Multi-Factor Authentication Methods
• Microsoft's Active Directory Services
• RADIUS, TACACS and Diameter Authentication Services

Intrusion Detection and Prevention

• NIDS Principles and Features
• Deployment Scenarios
• Packet Signature and Traffic Pattern Analysis
• Strategies For Dealing With The Volumes of Data

Wireless Security Issues

• Wireless Technology Offers Compelling Advantages
• Early Misadventures With Wireless Security
• TKIP and the WPA/IEEE 802.11i Supplemental Standard
• Private Point-to-Point Wireless Services
• Cellular/Mobile Data Networks; Benefits and Risks

Creating and Documenting A Security Solution

• Essential Elements of a Secure Environment
• Promoting User Awareness
• Elements of an Effective Security Policy
• Defining a Model for Internet Access

10 Essential Steps to Improving SCADA Security

• Appendices
• Glossary of Terminology
• Suggestions For Further Reading
• General Index

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment