Smart Grid Cybersecurity Training

Introduction:

Smart Grid Cybersecurity Training Course with hands-on Exercises

Smart Grid Cybersecurity Training course will teach you the important aspects of cybersecurity in smart grids. The Smart Grid Cybersecurity Training consists of detailed information about smart power systems, recent technologies toward the smart grids, potential threats and vulnerabilities in smart grids and security assessment in smart grids in order to advance the knowledge of audience about the cybersecurity in smart grids. Upon the completion of the Smart Grid Cybersecurity Training, you will learn how to prevent the threats at the first hand. Moreover, you will be trained to identify the potential threats in smart grids, how to detect the threats in smart grid components such as SCADA systems, customer side, transmission and distribution levels.

Smart Grid Cybersecurity training course simply teaches you the modern transmission and distribution system reliability and efficiency, how the generation plants can be faced with threats and necessity of secure electricity infrastructure. By taking this course, you will learn the digital information technology and control which will result in a high efficiency smart grid technology. Moreover, the cybersecurity problem will be formulated in smart grids and communication issues will be introduced. After introducing the threats, a proper action should be designed in response to a threat or recovery actions after a threat. This course will also help you to understand the concept of risk in smart grids, and effect of cascading failure in security, concept of actors, interactions between actors, security in communications and loss of integrity.

Customize It

● We can adapt this course to your group’s background and work requirements at little to no added cost.
● If you are familiar with some aspects of this course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group

Smart Grid Cybersecurity training is a 3-day course designed for:

◾All individuals who need to understand the concept of security in smart grids.
◾Power utility engineers working on smart grid technology
◾Test engineers who need to learn the security issues in power grids
◾Power traders to understand the smart grid security systems.
◾Independent system operator personnel.
◾Faculty members from academic institutes who want to teach the smart grid security course.
◾Investors and contractors who plan to make investments in smart grids and renewable energy industry.
◾Professionals in other energy industries.
◾Electric utility personnel who recently started career in power systems or having new job responsibilities.
◾Technicians, operators, and maintenance personnel who are or will be working on smart grid related projects
◾Managers, accountants, and executives of smart grid industry.
◾Scientist or non-electrical engineers involved in smart grid related projects or proposals.

Smart Grid Cybersecurity Training Related Courses

Duration: 3-4 days

Objectives:

After completing this course, attendees will be able to:

◾Understand the smart grid components
◾Describe the trend toward smart grid technologies
◾Explain the necessity of security in smart grids
◾Understand the threats in smart grids
◾Explain the communication problems in smart grids
◾Understand the main components of cyber secured power grid
◾Initiate the cybersecurity analysis for designed smart grid
◾Understand the cascading failures in smart grids and consequences of risks
◾Set the boundaries for security architectures in smart grids
◾Differentiate the security issues in transmission, distribution and generation plants in smart grids
◾Understand the different energy management systems in different levels of smart grids
◾Explain the security assessment and incident response in smart grids
◾Describe the security concepts in SCADA systems, demand response, electric vehicle and metering infrastructures

Course Content:

Smart Grid Technology
◾What is the smart grid?
◾What are the main components of a smart grid
◾Renewable energy sources in smart grid
◾Effect of electric vehicles and energy storages
◾Wind farms
◾Solar panels
◾Definition of cyber
◾Five layers of cyber world
◾Why security of smart grid?
◾Vulnerabilities of smart grids
◾Security concepts in smart grids

Modernism In Electric Transmission And Distribution Systems
◾Reliability of distribution systems
◾Physical components of a grid
◾Generation plants
◾Transmission and distribution lines
◾Communication systems in smart grids
◾Meters (AC or DC)
◾Loads
◾Secure electricity infrastructure
◾Future demand growth effect
◾Concept of smart grids
◾Digital information technology
◾Digital control idea
◾High efficiency smart grid technologies
◾Dynamic optimization of smart grid operation
◾Concept of cyber security in smart grids
◾Automation and communication issues
◾Supporting the customers
◾Communications in smart grids
◾Recording, processing and exchanging data
◾Cascading failure example
◾Internet hacker attacks
◾Blackouts

Cybersecurity Context; Traditional Grid Security versus Smart Grid
◾One Way versus Two-Way Communications
◾Centralized and Distributed Generation Impact
◾Implementation of Sensors
◾Manual monitoring versus Self-Monitoring
◾Single Point of Failure and Self-Healing
◾Limited Control and Pervasive Control
◾CO2 Emission and Clean Energy Application
◾Smart Grid Concepts
◾Smart Grid Interoperability panel (SGIP)
◾Smart Grid Cybersecurity Committee (SGCC)
◾Information Technology Laboratory (ITL)
◾Advanced Metering Infrastructure Security (AMI)
◾New Challenging Threats in Smart Grids
◾Cybersecurity Standards for Smart Grids
◾Secure Content Automation Protocol (SCAP)
◾IEEE 1588
◾Security Architecture in Smart Grids

Reported Vulnerabilities of Smart Grids
◾Eavesdropping
◾Traffic Analysis
◾EM/RF Interception
◾Indiscretions by Personnel
◾Media Scavenging
◾Intercept/Alter
◾Repudiation
◾Masquerade
◾Bypassing Controls
◾Authorization Violation
◾Physical Intrusion
◾Man-in-the-Middle
◾Integrity violation
◾Theft
◾Virus/Worms
◾Trojan Horses
◾Trapdoor
◾Service Spoofing
◾Resource Exhaustion
◾Integrity Violations
◾Stolen/Altered
◾Insider Attacks
◾Cheating customers

Smart Grid Architecture Model (SGAM)
◾Component Layer
◾Communication Layer
◾Information Layer
◾Function Layer
◾Business Layer
◾Generation Domain
◾Transmission Domain
◾Distribution Domain
◾Customer Domain
◾Intelligent Energy Management (IEM)
◾Smart Web Grids
◾Smart Low Voltage Girds
◾Smart Metering Rollout (AMIS)

Information Assurance in Smart Grids
◾Confidentiality
◾Integrity
◾Availability
◾Accountability
◾Security concepts and smart grids

Advanced Metering Infrastructure and Security Issues
◾Smart Meters
◾Customer Gateway
◾AMI Communication Network
◾AMI Head End
◾AMI Security Threats
◾Listening Issue
◾Modification
◾Interactions
◾Malicious code Planted in the System
◾Denial of Service
◾Insider Attacks
◾Unauthorized Access

Demand Response Security Concerns
◾Confidentiality of Demand Response
◾Authentication
◾Data Integrity
◾Accountability
◾Availability
◾Automated Demand Response security
◾Communication Infrastructure in Automated Demand Response
◾Open ADR and security concerns
◾Demand Response Automation Server
◾Demand Response for Residential Sites and Security Issues
◾Possible Attacks in Demand Response Events

Smart Grid Domain Security
◾Home Area Network (HAN)
◾ZigBee
◾Z-Wave
◾Gateway Component
◾Wireless Neighborhood Area Network (WNAN)
◾IEEE Standards for Smart Grid Security
◾IEEE 802.11
◾IEEE 802.15.4
◾IEEE 802.16

Risk Assessment in Smart Grids
◾Safety Management
◾Cyber-Physical Risk Identification Step
◾Understanding Risks to Legacy Systems
◾Complex Organizational Dependecies
◾Cascading Effect
◾Fault-Tree Analysis
◾Event-Tree Analysis
◾FMEA
◾STAMP
◾HAZOP
◾Smart Grid Information Security (SGIS)
◾SGIS Risk Impact Level (SGIS-RIL)

Security Architecture of Smart Grids
◾Hierarchical Security Architecture of Smart Grids
◾Management Layer
◾Supervisory Layer
◾Network Layer
◾Communication Layer
◾Control Layer
◾Physical Layer
◾Typical SCADA Network Levels
◾Conceptual Control System with Layering
◾Robust and Resilient Control
◾Secure Network Routing in Smart Grids
◾Management of Information Security
◾User Patching

Smart Grid Conformity Testing
◾Certifying Smart Grid Components and Systems
◾Conformity Assessment
◾Relevant Standards in Conformity Testing
◾ISO 17025
◾ISO 9001
◾ISO Guide 65
◾Qualitative Approach
◾Categorical Approach
◾Quantitative

SCADA System Security
◾Introduction to SCADA
◾Security Issues in SCADA
◾Public Information Availability
◾Platform Vulnerabilities
◾Network Configuration Vulnerabilities
◾Network Perimeter Vulnerabilities
◾DNP3 Threats

Plug-in Electric Vehicle (PEV) Security Issues
◾Introduction to PEV Security
◾Privacy of movement
◾Secure payment
◾Smart Metering
◾Critical Infrastructure and Physical Security
◾Communication issues in PEVs

Generic Security Issues
◾Authentication and Authorizing Users
◾Maintenance Personnel to Smart Meters
◾Authentication and Authorized Users to outdoor field equipment
◾Serial SCADA Communications security
◾Protection of Routing Protocols
◾Insecure Firmware Updates
◾Side Channel Attacks
◾Key Management and Public Key Infrastructure
◾Patch Management

Components of A Cyber Secured Smart Grid
◾Prevention of threats
◾Identifying potential threats
◾Denial of service attacks
◾Detection of threats
◾Response to threats
◾Recovery from threats
◾Systematic documentation of vulnerabilities
◾Concept of risk in smart grid security
◾Cascading failures
◾Physical consequences of a risk
◾Assessing and quantifying the risks (Risk assessment)
◾Setting boundaries for security architecture
◾Concept of actors
◾Secure communication flows between actors
◾Interaction between actors in smart grids
◾Loss of confidentiality
◾Loss of integrity
◾Loss of availability

Cybersecurity Mode Level of a Smart Grid Domain
◾Transmission level
◾Measurement units
◾Transmission RTU
◾Operation
◾Distribution SCADA
◾Distributed generation management
◾Transmission engineering
◾Outage management system
◾Customer portals
◾Transmission SCADA
◾Wide area measurement systems
◾Energy management systems (EMS)
◾Bulk storage management
◾ISO operations
◾Metering
◾Bulk generation
◾Plant control
◾Marketing
◾Energy market
◾Wholesale market
◾Service providers
◾Pricing system
◾Retail energy provider
◾Third parties
◾Energy service providers
◾Customers

Customer Energy Management
◾Appliances and equipment
◾Meters
◾Electric vehicles
◾Generation and storages

High Level Cybersecurity Requirements
◾Objectives of cybersecurity
◾Confidentiality, integrity and availability impacts
◾Impact levels
◾Security requirements
◾Access control
◾Awareness and training
◾Audit and accountability
◾Security assessment
◾Configuration management
◾Incident response
◾Identification and management
◾Media protection
◾Smart grid development and maintenance
◾Personnel security
◾Environmental security
◾Security planning
◾Risk management
◾Smart grid information system security
◾Communication security
◾Security of metering infrastructures
◾Security of electric vehicles
◾Security of demand response
◾Security of SCADA systems

Hands-On, Workshops and Group Activities
◾Labs
◾Workshops
◾Group Activities

Sample Workshops and Labs for Smart Grid Cybersecurity Training
◾Vulnerability Analysis in SCADA and Automation Systems of Power Grid
◾Quantifying the Impact of Successful Cyber Attacks on Power System Operation
◾Risk Modeling due to Cyber Attacks
◾Mitigation of Risks and Intrusion Detection Algorithms
◾Testbed and Validation with Power System Simulator
◾Smart Grid Modeling Demo in Power System Simulators

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment