Search your Courses by Keywords

An online intensive professional development training course on

Industrial Cyber Security

Reducing Cyber Risk, Operating Securely

The threat of Cyber Attacks is widespread and global, and effects individuals, commercial organisations and nation states alike.  The ability to safeguard your organisation and technology from attacks, and more importantly understand how to identify, analyse, respond and investigate cyber-attacks as a security breach is paramount.  The ability for an Information Security Breach resulting in the circumvention of operational technology controls can have disastrous effects, as we have seen with global documented case such as Ukraine Power Station attack.

Attacks are growing in number and sophistication. The networked control systems are often integrated and reliance with specialist strategic partners underpins your organisational risk and competitive ability. Furthermore, to effectively detect and deter any cyber-attack, you need to understand the nature, motive and ways of perceived cyber threat actors. In doing so and utilising appropriate countermeasures, best practice and management techniques will mitigate the risk of cyber-attack and enhance protection to your assets.

Boards of directors, corporate officers, chief engineers and frontline employees are starting to understand the implication of Cyber breaches within their organisation and their potential effect to their personal liability.Therefore, Cyber Security is a core value for leaders in today’s digital economy environment.

This AZTech online training course will feature:

  • An understanding of Cyber Security issues
  • Approaches to Cyber Security within an Operational Technology environment.
  • An introduction to Cyber Security Frameworks
  • Current Best Practices for Cyber Security Response
  • Approaching Cyber Security Response Plans

What are the Goals?

By the end of this online training Course, participants will be able to:

  • Understand Information Security, and how this is deployed in an Operational Technology Environment
  • Understand a range of Cyber threats and assess a security posture within an Operational Technology environment.
  • Appreciate the leading legislation, International Standards and Governance models for Cyber Security and current best practice.
  • Understand the approaches for Crisis and Incident Management for Cyber Security Breaches.

Who is this Online Training Course for?

This AZTech online training course is suitable to a wide range of professionals but will greatly benefit:

  • Legal Professionals
  • System Engineers
  • Security Administration
  • Operational Staff
  • Those whom have involvement with and responsibility for operational technology, information technology, & risk assessment

How will this Online Training Course be Presented?

This AZTech online training course will use a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  The online training course is highly interactive and is carefully designed to provide the best mix of experience, theory and practice in a professional learning environment. The emphasis is on real case studies, and practical applications through “hands-on” action learning.

The Course Content

Day One: What is Cyber Security?

  • Overview of Cyber Security for Industries
  • Cyber Crime and Attacks
  • Technology, Policing, and Investigation of Electronic Crime
  • Ethical Hacking and Cyber Crime
  • Civil and Criminal Considerations

Day Two: Assessing Your Cyber Security Posture

  • Cyber Security and Risk Assessment
  • Information Security and Standards
  • ISO7799 - Information Security Management - Code of Practice
  • ISA99 - International Standards for Automation Cyber Security Standard
  • Reducing Your Security Risk and Increasing Your Security Capabilities

Day Three: Cyber Security and Industrial Control Systems Management

  • Information Security and Operational Technology
  • Emerging Industrial Technology Trends
  • Metcaf’s Law
  • Moore’s Law
  • Mirrors World

Day Four: Cyber Security Controls

  • Selecting Security Controls and Best Practice
  • Considerations for Enhancing Security
  • Detection, Prevention and Offensive Responses
  • Securing and Assessing OPERATIONAL TECHNOLOGY Environments (OTE)
  • OTE User Management, System Integrity, Data Confidentiality & Restricted Data Flow

Day Five: Building a Cyber Response Plan

  • Defining a Cyber Response Strategy
  • Composing Cyber Response Plan
  • Cyber Response Team Compilation and Service Vendor Support
  • Cyber Preparedness and Corporate Governance
  • Operational Security Centers

The Course Schedule

10:30 - 11:00


Welcome, Setup, Registration (Day 1 Only)

11:00 – 12:30


First Session

12:30 – 12:45


Break (15 minutes)

12:45 – 14:15


Second Session

14:15 – 14:30


Break (15 minutes)

14:30 – 16:00


Third Session

The Certificate

  • An AZTech e-Certificate will be provided to delegates who attend and complete the online training course

In Partnership With


Request for In-House Solutions
Request for
In-House Solutions
Request for More Details
Request for
More Details
Share this Course With a Colleague
Share this Course
With a Colleague
Request Brochure
Download the
Course Brochure

Send to Colleague

© 2023. Material published by Aztech shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.

Sending your message. Please wait...

Send Successfully

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.


Online Training