Scada Security Training

Scada Security Training

Introduction:

Scada Security Training Course with real world hands-on labs - Public and Onsite Classes

SCADA, DCS and other process control networks, generically called SCADA, run the nation's mission critical infrastructure, everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move to standard protocols, the Microsoft OS and interconnection to other networks. Use our Scada Security Training course to learn the skills required to direct and manage the appropriate cyber security protection for your SCADA system.

Today, IT departments and the classic IT security approach is wreaking havoc with SCADA systems. Too often, IT 'fixes' bring a SCADA system down, but avoiding or ignoring cyber security is not an option. With our Learn how standard IT security solutions can be used in SCADA systems and where SCADA specific security controls and practices are required. This course will teach you to develop a SCADA cyber security program and work with internal and external IT resources to implement the program.

Our Scada Security Training instructors have both SCADA security and IT security expertise, a rare combination. They have performed assessments, designed security architectures, and written and audited security policies on a wide variety of real world SCADA systems in the oil & gas, electric, water and other industries.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

• Incident responders
• Forensic investigators
• Threat operation analysts
• Incident responders needing to quickly address system security breaches
• Threat operations analysts seeking a better understanding of network based malware and attacks
• Those individuals who want to learn what malicious network activity looks like and how to identify it

Scada Security Training Related Courses:

Duration: 3-4 days

Skilled Gained:

Introduction
• SCADA security policies
• Firewall architecture, DMZ, and rulebases
• Secure remote access to a control center
• SCADA protocol security issues
• Securing field communications
• User authentication technologies and integration with SCADA applications
• Access control principles and implementation
• Active Directory integration with SCADA applications
• Detecting cyber attacks on SCADA systems
• Vulnerability scanning
• Security patch management
• Anti-virus protection and management
• Exceptions – what to do when you can’t implement best practice
• SCADA security standards

Course Content:

Introduction
• Security Challenges are Universal
• Increased Vulnerability Due To Open Systems Trend
• Increased Vulnerability From Motivated, Knowledgeable Attackers
• Some Documented SCADA Security Failure Incidents

Open Systems Issues Push The Agenda
• Protocols of the Internet Architecture
• Ethernet and Other IT-derived Networks
• Fieldbus Standards
• IEC Standards
• Ethernet/IP and CIP
• Computer Operating Systems; Windows and Unix/Linux

Points of Vulnerability
• The IT Infrastructure
• Leased Infrastructure; Frame Relay and Other Services
• The Sensor/Fieldbus Networks
• Wireless LAN Systems
• Rogue (Undocumented) Dial and Wireless Links
• Infected/Compromised Portable Equipment
• Network Management Systems

SCADA Network Protocols
• Features Common to Most SCADA Networks
• The MODBUS Protocol and Lack of Security
• Demonstration: MODBUS Dialog
• The DNP3 Protocol and Its Security Limitations
• The Near-Universal Trend to Ethernet-Based Networks
• Network Management Systems

Encryption
• Starting With a Secure Physical Environment
• Traditional Purpose of Assuring Privacy is a Minor Issue
• Traditional Symmetric Key Cryptography
• Public Key Cryptography and RSA
• Protecting Field Networks From Intrusion With Encryption

Firewalls and Perimeter Security
• Firewall Design Objectives
• Survey of Firewall Types
• Network Address Translation
• Creating and Populating a SCADA DMZ
• Field-Level Firewalls in the SCADA Network

Access Control and Authorization: Managing Users
• Limitations of User ID's and Passwords
• Multi-Factor Authentication Methods
• Microsoft's Active Directory Services
• RADIUS, TACACS and Diameter Authentication Services

Intrusion Detection and Prevention
• NIDS Principles and Features
• Deployment Scenarios
• Packet Signature and Traffic Pattern Analysis
• Strategies For Dealing With The Volumes of Data

Wireless Security Issues
• Wireless Technology Offers Compelling Advantages
• Early Misadventures With Wireless Security
• TKIP and the WPA/IEEE 802.11i Supplemental Standard
• Private Point-to-Point Wireless Services
• Cellular/Mobile Data Networks; Benefits and Risks

Creating and Documenting A Security Solution
• Essential Elements of a Secure Environment
• Promoting User Awareness
• Elements of an Effective Security Policy
• Defining a Model for Internet Access

10 Essential Steps to Improving SCADA Security
• Appendices
• Glossary of Terminology
• Suggestions For Further Reading
• General Index

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment