IC33M Assessing the Cybersecurity or New or Existing IACS Systems (M-Course)

Home/Training/Cyber-Security/IC33M Assessing the Cybersecurity or New or Existing IACS Systems (M-Course)
Loading Events

IC33M Assessing the Cybersecurity or New or Existing IACS Systems (M-Course)

October 6, 2020 - October 6, 2020

 

Length : Six 30-45 Modules

CEU Credits : 0.6

Course Hours : Self Paced

Dates: Self-paced

Length: Six 30-45 Modules

CEU Credits: 0.6

Location: Online

Description: First Phase of the  of the ISA/IEC 62443 Cybersecurity Certificate Program: After successfully completing all six modules, students may take the exam for ISA/IEC 62443 Cybersecurity Risk Assessment Specialist. Exam fee is included in full course purchase price

Certificate Program (if available) ISA/IEC 62443 Cybersecurity Certificate Program:

 

Make sure to use HOUS2020 for $200 discount!

 

You will be able to: 

  • Identify and document the scope of the IACS under assessment
  • Specify, gather or generate the cybersecurity information required to perform the assessment
  • Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design
  • Organize and facilitate a cybersecurity risk assessment for an IACS
  • Identify and evaluate realistic threat scenarios
  • Identify gaps in existing policies, procedures and standards
  • Establish and document security zones and conduits
  • Prepare documentation of assessment results

You will cover:

  • Preparing for an Assessment: Security Life Cycle | Scope | System Architecture Diagrams | Network Diagrams | Asset Inventory | Cyber Criticality Assessment
  • Cybersecurity Vulnerability Assessment: Risk | Types of Cybersecurity Vulnerability Assessments | Gap Assessments | Passive and Active Assessments | Penetration Testing | Conducting Gap Assessments | Gap Assessment Tools | CSET
  • Conducting Vulnerability Assessments: Vulnerability Process | Pre-assessment | Standards | Research | Kick Off and Walk Thru | Passive Data Collection | Active Data Collection | Penetration Testing
  • Cyber Risk Assessments: Understanding Risk | ISA 62443-2-1 | SuC | Conduct High-level Risk Assessment | Consequence Scale | Establish Zones and Conduits | Zone and Conduit Drawings and Documentation | Document Cybersecurity Requirements
  • Conducting Cyber Risk Assessments: Detailed Cyber Risk Assessment Process | Threats | Vulnerabilities | Consequences | Likelihood | Calculate Risk | Security Levels | Countermeasures | Residual Risk | Documentation
  • Documentation and Reporting: Document to Maintain | Required Reports | Zone and Conduit Diagrams | Cybersecurity Requirements Specification (CRS)

 

For more information and to register online: 

To Register : https://www.isa.org/training-and-certification/isa-training/instructor-led/course-descriptions/assessing-the-cybersecurity-of-new-or-existing-1

Register

Organizer

Jacqueline Buskop

Phone

N/A

Email

jbuskop@wesleyan.edu

Venue

,

, -

. + Google Map

Go to Top