IC33E Assessing the Cybersecurity of New or Existing IACS Systems E-Course (November)

Home/Training/Cyber-Security/IC33E Assessing the Cybersecurity of New or Existing IACS Systems E-Course (November)
Loading Events

IC33E Assessing the Cybersecurity of New or Existing IACS Systems E-Course (November)

November 1, 2020 - December 20, 2020

 

Length : Six (6) online modules running for 7 weeks. Each module is 20-90 minutes each.

CEU Credits : 1.4

Course Hours :

Dates:  Self Paced

Length: Six (6)  online modules running for 7 weeks.  Each module is 20-90 minutes each.

CEU Credits: 1.4

Description: Part of the ISA/IEC 62443 Cybersecurity Certificate Program.  Assessing the Cybersecurity of New or Existing IACS Systems (IC33E) is an online course which will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements of the project.

An online course which will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements of the project.  This course is a blended learning format which includes interactive, on-demand modules, weekly assignments and instructor call-in sessions.  Modules include instructional content, interactive reviews, video lab demonstrations conducted by an ISA Cybersecurity instructor and assessments.

 

Make sure to use HOUS2020 for $200 discount!

 

Certificate Program (if available) Part of the ISA/IEC 62443 Cybersecurity Certificate Program: After successfully completing all eight modules, students may take the exam for ISA/IEC 62443 Cybersecurity Design Specialist  Exam is included in the Full Course Bundle but must be purchased separately if modules are purchased separately.

You will be able to:

  •  Identify and document the scope of the IACS under assessment
  • Specify, gather or generate the cybersecurity information required to perform the assessment
  • Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design
  • Organize and facilitate a cybersecurity risk assessment for an IACS
  • Identify and evaluate realistic threat scenarios
  • Identify gaps in existing policies, procedures and standards
  • Establish and document security zones and conduits
  • Prepare documentation of assessment results

You will cover:

  • Preparing for an Assessment
  • Cybersecurity Vulnerability Assessment
  • Conducting Vulnerability Assessments
  • Cyber Risk Assessments
  • Conducting Cyber Risk Assessments
  • Documentation and Reporting
  • And more…

Lab Demonstrations (Included in the Modules):

  • Critiquing System Architecture Diagrams
  • Asset Inventory
  • Gap Assessment
  • Windows Vulnerability Assessment
  • Capturing Ethernet Traffic
  • Port Scanning
  • Windows Vulnerability Scanning
  • Perform a High-Level Cybersecurity Risk Assessment
  • Creating a Zone & Conduit Diagram
  • Perform a Detailed Cyber Risk Assessment

Risk Assessment Report

To Register : https://www.isa.org/training-and-certification/isa-training/instructor-led/course-descriptions/ic33e

Register

Organizer

Jacqueline Buskop

Phone

N/A

Email

jbuskop@wesleyan.edu

Venue

,

, -

. + Google Map

Go to Top