Close
Close

QUICK SEARCH
Search your Courses by Keywords


An intensive professional development training course on

Industrial Cyber Security

Reducing Cyber Risk, Operating Securely

Why Choose this Training Course?

The threat of Cyber Attacks is widespread and global, and effects individuals, commercial organisations and nation states alike.  The ability to safeguard your organisation and technology from attacks, and more importantly understand how to identify, analyse, respond and investigate cyber-attacks as a security breach is paramount.  The ability for an Information Security Breach resulting in the circumvention of operational technology controls can have disastrous effects, as we have seen with global documented case such as Ukraine Power Station attack.

Attacks are growing in number and sophistication.   The networked control systems are often integrated and reliance with specialist strategic partners underpins your organisational risk and competitive ability.     Furthermore, to effectively detect and deter any cyber-attack, you need to understand the nature, motive and ways of perceived cyber threat actors. In doing so and utilising appropriate countermeasures, best practice and management techniques will mitigate the risk of cyber-attack and enhance protection to your assets.

Boards of directors, corporate officers, chief engineers and frontline employees are starting to understand the implication of Cyber breaches within their organisation and their potential effect to their personal liability.   Therefore, Cyber Security is a core value for leaders in today’s digital economy environment.

This AZTech training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practices for Cyber Security Response
  • Approaching Cyber Security Response Plans

What are the Goals?

By the end of this AZTech training course, the participants will be able to:

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment
  • Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches

Who is this Training Course for?

This AZTech training course is suitable to a wide range of professionals but will greatly benefit:

  • Legal Professionals
  • System Engineers
  • Security Administration
  • Operational Staff
  • Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment

How will this Training Course be Presented?

This AZTech training course will use a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  The training course is highly interactive and is carefully designed to provide the best mix of experience, theory and practice in a professional learning environment. The emphasis is on real case studies, and practical applications through “hands-on” action learning.

The Course Content

Day One: What is Cyber Security?

  • Overview of Cyber Security for Industries
  • Cyber Crime and Attacks
  • Technology, Policing, and Investigation of Electronic Crime
  • Ethical Hacking and Cyber Crime
  • Civil and Criminal Considerations

Day Two: Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 - Information Security Management - Code of Practice
  • ISA99 - International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities

Day Three: Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Emerging Industrial Technology Trends
  • Metcaf’s Law
  • Moore’s Law
  • Mirrors World

Day Four: Cyber Security Controls

  • Selecting Security Controls and Best Practice
  • Considerations for Enhancing Security
  • Detection, Prevention and Offensive Responses
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow

Day Five: Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance
  • Operational Security Centers

The Certificate

  • AZTech Certificate of Completion for delegates who attend and complete the training course

In Partnership With

DO YOU WANT TO
LEARN MORE ABOUT THIS COURSE?

Request for In-House Solutions
Request for
In-House Solutions
Request for More Details
Request for
More Details
Share this Course With a Colleague
Share this Course
With a Colleague
Request Brochure
Request for a
Course Brochure

Send to Colleague

© 2022. Material published by Aztech shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.


Sending your message. Please wait...

Send Successfully

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

USE THE COURSE FINDER TO
BROWSE OVER 400 COURSES

Online Training

DISCOVER OUR
ONLINE TRAINING
COURSES

LinkedIn
Facebook
Twitter
WhatsApp
Email
Other