Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures - Manchester - England - I3804

Home>Kurse - Seminare>Applied IT-Security>Manchester>Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures - Manchester - England
 
Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures
Methode: Mit Anwesenheitspflicht
Bildungsart: Kurse - Seminare
Sponsored Links
Loading...

Unverbindlich in Kontakt treten
Vester Industrial Training Center

Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures - Manchester - England

Vorname
Nachname
Email
Telefon
Bundesland
Stadt
Um die Anfrage zu senden, müssen Sie die Datenschutzpolitik akzeptieren
* Pflichtfelder

In Kürze wird sich die zuständige Kontaktperson des Anbieters Vester Industrial Training Center mit Ihnen in Kontakt setzen um Sie bestmöglichst zu informieren.
Bitte füllen Sie alle Felder korrekt aus
Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures - Manchester - England Informationen über Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures - Manchester - England
Inhalt:
Certify Workshop Cybersecurity for Industrial Environments and Critical Infrastructures.

Cybersecurity training and consulting aimed to all levels of the organization: awareness, analysis, implementation, evaluation and actions monitoring.

Learn the basics notions, attacks types, anti-intrusion systems application and IT security control and diode firewalls.

Duration: 3 days (24 hours / 8 hours a day)
Schedule: 9:00h – 17:00h
Dates:

16-18 October - Cybersecurity - Madrid
23-25 October - Cybersecurity - Manchester

General Description:  

Three-day workshop designed with the aim of learning the general concepts of Cybersecurity at Industrial Environments and Critical Infrastructures, as well as its most important aspects and the basic protection against attacks.
The workshop includes a theoretical part, followed by a practical part. At the end of the training, the student will be provided with free software with all the test tools used during the three days training.

At the end of the course, the student will have the theoretical and practical knowledge to:

Evaluate threats and audit their monitoring and control systems. 

Obtain a list of critical points and their direct relationship with the applied countermeasures.

Protect the most critical points of your installation and know what to do with the least critical ones. 

Install and / or configure protection equipment with physical access.


General Objective:

Anti-intrusion systems application, computer security control and equipment firewall. 

Provide a general overview of the most important concepts associated with ​​industrial cybersecurity. 

Analyze the main vulnerabilities and threats that may be experienced at industrial environments. 

Know the different types of hacker attacks that can be carried out on an OT network or a critical infrastructure. 

Describe the main countermeasures that can be included to fortify industrial networks and protocols. 

Provide recommendations and practical advice to strengthen the company’s industrial systems and networks.

Introduce the main standards and/or the current and future laws regarding the implementation of said countermeasures.


Aimed at:

This workshop is designed to train technicians and engineers involved in the protection of critical industrial systems and the security measures implementation for PLC / SCADA / MES environments. 
It is mainly aimed at technical personnel involved in the design of architectures, installation, configuration, maintenance and supervision projects commissioning and / or remote control systems automation. 

Workshop Characteristics:

  • Mode: In person with supervised practices as complement to the theory. 
  • Methodology: Keynote lectures and practical workshops.
  • Participants: A minimum amount of 5 and a maximum amount of 20. 


Workshop Observations:

Any topic or sub-topic of the workshop can be expanded and detailed in a second session tailored specially for the client. So the basic workshop can be supplemented with successive trainings if need it.

At the end the participant will get an USB PEN with a FREE distribution Linux with all the test tools used in the course.
 

Material Included:

  • One computer per student during the workshop.
  • Welcome stationery material (notebooks, pens, USB with additional information). 
  • Training manual.  
  • Certificate of successful completion.
  • Meals: Coffee break and lunch (Coffee, tea and refreshments available during the training). 


Workshop Schedule:

Day 1           

09:00 – 11:00

Introduction to computer security:
- What is hacking?
- Information security properties: confidentiality, integrity / non-repudiation and availability

11:00 - 11:15

Coffee-break

11:15 – 13:30

- Authentication and authorization
- Risk, Threat, Vulnerability (+ CVSS), Exploit and Zero Day
- Main differences between IT Security and Cybersecurity in Industrial Environments

* Practice

13:30 - 14:30                

Lunch

14:30 – 16:00

Attacks and Malware:

Types of attacks:
- According to the actions of the attacker: assets and liabilities
- According to the location of the attacker: internal and external

* Practice 

16:00 - 16:15              

Break

16:15 – 17:00

Attack stages I:
- Recognition
- Information gathering

Attack stages II:
- Scanning
- Exploitation


Day 2

09:00 – 11:00

Attack stages III:
- Maintain Access
- Cover the tracks

* Practice 

11:00 - 11:15

Coffee-break

11:15 – 13:30

Safety Audits I:

- Types: White Box, Gray Box and Black Box
- Limitations: time, scope, allowed tests and knowledge
- Reporting
- Auditing from the Internet
- Auditing from the internal network


13:30 - 14:30                

Lunch

14:30 – 16:00

Safety Audits II:
- Work on equipment
- Interviews  with the organization members 

* Practice

16:00 - 16:15              

Break

16:15 – 17:00

Industrial networks safety I:
- Security in wired networks:
- Wired networks basic concepts
- Sniffers: TCPDump, WireShark
- Physical security: Port Security

Industrial networks safety II:
- DHCP Security: DHCP Snooping
- RSTP Security: BPDU Guard, Root Guard
- MiTM: IP Source Guard
- VPNs

Day 3

09:00 – 11:00

Security in WiFi networks:
Wireless networks basics concepts:
- Open networks
- WEP Networks
- WPA / WPA2 networks
- Rouge Aps

* Practice 

11:00 - 11:15

Coffee-break  

11:15 – 13:30 

Countermeasures and protection I:
- Defense and protection technologies.
- Perimeter defense architecture

13:30 - 14:30                

Lunch

14:30 – 16:00

Countermeasures and protection II:
- Management and protection Decalogue.
Physical security
Firewalls, IDS, IPS and SIEMs

16:00 - 16:15              

Break

16:15 – 17:00

Cryptography I:
- Symmetric: DES, AES, RC4
- Asymmetric: RSA, GPG, IKE, SSL

Cryptography II:
- Hashes: MD5, SH
- Password cracking: brute force, hash tables and rainbow tables

* Practice


Requirements for course completion:

There is no specific requirements, ideal participant’s profile for our courses: Technical staff that participates in the design of architectures, Installation, configuration, maintenance and commissioning of automation projects for electrical substations and telecontrol systems.

Specifically for the OPC UA * course: * theory and practice and the OPC course UA: theory, practice and application development, it is convenient to have previous experience about OPC technology acquired through daily use.

In regards of aspects that stand out:

- In all workshops different gifts are provided to participants
- In Spain, Tripartite Foundation recognizes our workshops

- Courses:
OPC Technology and  Advanced Architecture Development
OPC UA: Theory and Practice are certified by Matrikon

- In all our workshops we provide a completion certificate
- All workshops include practices with real hardware and simulation of issues that might occur in industrial plants today



Who we are:

Vester Industrial Training Center (VITC) is part of the European and Central American Vester Business Group. It was created more than five years ago as an area dedicated to the training and specialization for engineers, integrators and system designers, with its main focus on the most used communication protocols in the industry, the design of SCADA systems, cyber-security in industrial environments and critical infrastructures and OPC UA programming.

Ähnliche Angebote die in Bezug zu Ihrer Anfrage stehen: