IC34M IACS Cybersecurity Design & Implementation (M-Course)

Home/Training/Cyber-Security/IC34M IACS Cybersecurity Design & Implementation (M-Course)
Loading Events

IC34M IACS Cybersecurity Design & Implementation (M-Course)

October 4, 2020 - October 4, 2020

 

Length : Eight Modules (10-30 minutes each)

CEU Credits : 1.4

Course Hours :

Dates: Self-paced

Length: Dates/Length: Eight Modules (10-30 minutes each)

CEU Credits: 1.4 Credits

Location: Online

Description: The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution, in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level

This course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification.

 

Make sure to use HOUS2020 for $200 discount!

 

Certificate Program (if available) Part of the ISA/IEC 62443 Cybersecurity Certificate Program: After successfully completing all eight modules, students may take the exam for ISA/IEC 62443 Cybersecurity Design Specialist  Exam is included in the Full Course Bundle but must be purchased separately if modules are purchased separately.

Modules included:
Module 1: Assessment Overview
Module 2: Conceptual Design
Module 3  Detailed Design
Module 4: Firewalls
Module 5: Intrusion Detection Systems
Module 6: Intrusion Detection Systems (Cont;d_

Module 7: Access Control

Module 8: Cybersecurity Acceptance Testing

 

You will cover:

Review the ICS Cybersecurity Lifecycle

  • Assessment phase
  • Implementation phase
  • Maintenance phase

Conceptual Design Process

  • Interpreting risk assessment results
  • Cybersecurity requirements specifications
  • Developing a conceptual design
  • Conceptual design specification

Detailed Design Process

  • Security Development Lifecycle (SDL)
  • Types of technology
  • Selecting appropriate technology
  • Developing a detailed design
  • Documenting the design/specification

Design & Implementation Examples

  • Firewall design example
  • Remote access design example
  • System hardening design example
  • Intrusion detection design example

Testing

  • Developing test plans
  • Cybersecurity Factory Acceptance Testing

Cybersecurity Site Acceptance Testing

To Register : https://www.isa.org/training-and-certification/isa-training/instructor-led/course-descriptions/cybersecurity-design-implementation-testing-ic34m

Register

Organizer

Jacqueline Buskop

Phone

N/A

Email

jbuskop@wesleyan.edu

Venue

,

, -

. + Google Map

Go to Top