IC37M IACS Cybersecurity Operations & Maintenance (M-Course)

///IC37M IACS Cybersecurity Operations & Maintenance (M-Course)
Loading Events

IC37M IACS Cybersecurity Operations & Maintenance (M-Course)

October 5, 2020 - October 5, 2020

 

Length : 5 Modules (Approximately 5 Hours)

CEU Credits :

Course Hours :

Dates: Self-paced

Length :  5 Modules (Approximately 5 Hours)

CEU Credits: 0.5

Location: Online

Description:   Part of the ISA’s Cybersecurity Certificate Program The third phase in the IACS Cybersecurity Lifecycle (defined in ISA/IEC 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change, backup and recovery procedures and periodic cybersecurity audits. This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an ever-changing threat environment.

 

Make sure to use HOUS2020 for $200 discount!

 

Module 1: Review of Assess Phase
Module 2: Review of Design Phase
Module 3: Security Management & Maintenance
Module 4: Security Monitoring & Detection
Module 5: Incident Response & Recovery

Certificate Program (if available) Part of the ISA/IEC 62443 Cybersecurity Certificate Program.  After successfully completing the course, students should call ISA Customer Service at +1 919-549-8411 to request their Eligibility code for Cybersecurity Certificate 4 Exam.  Once this code is issued, students may schedule to take the exam with Prometrics.  Exam fee is included in course price.

You will be able to:   

  • Perform basic network diagnostics and troubleshooting
  • Interpret the results of IACS device diagnostic alarms and event logs
  • Develop and follow IACS backup and restoration procedure
  • Understand the IACS patch management lifecycle
  • Develop and follow an IACS patch management procedure
  • Develop and follow an antivirus management procedure
  • Define the basics of application control and whitelisting tools
  • Define the basics of network and host intrusion detection
  • Define the basics of security incident and event monitoring tools
  • Develop and follow an incident response plan
  • Develop and follow an IACS management of change procedure
  • Conduct a basic IACS cybersecurity audit

You will cover:

  • ICS Cybersecurity Lifecycle
  • Security Management & Maintenance
  • Security Monitoring & Detection
  • IACS Incident Response & Recovery

 

Lab demonstrations: (Included in modules)

  • Network diagnostics and troubleshooting
  • Intrusion detection alarm
  • Event monitoring
  • Configuration management
  • Patch management
  • Anti-virus management
  • Whitelisting
  • Vulnerability scanning tools
  • Incident response

 

To Register : https://www.isa.org/training-and-certification/isa-training/instructor-led/course-descriptions/iacs-cybersecurity-operations-maintenance-ic37m

Register

Organizer

Jacqueline Buskop

Phone

N/A

Email

jbuskop@wesleyan.edu

Venue

,

, -

. + Google Map