Class Details

With the ever-improving and ever-changing cyber-threats, businesses need to be on their toes to ensure their safety. This comprehensive book will guide you through understanding the basics of cybersecurity and industrial protocols necessary for building robust industrial control systems. Through real world scenarios, you will understand vulnerabilities and will be equipped with techniques to ward off all kinds of cyber threats. If you are a security professional who wants to ensure a robust environment for critical infrastructure systems, then this book is for you. It professionals interested in getting into the cybersecurity domain or who are looking at succeeding in industrial cybersecurity certifications would also find this book helpful.

 

Course Outline

MOdule 1: INDUSTRIAL CONTROL SYSTEMS

·         An overview of an Industrial control system

·         The Industrial control system architecture

·         The Purdue model for Industrial control systems

·         Industrial control system communication media and protocols

 

Module 2: INSECURE BY INHERITANCE

·         Industrial control system history

·         Modbus and Modbus TCP/IP

·         PROFINET

·         Common IT protocols found in the ICS

 

module 3: ANATOMY OF AN ICS ATTACK SCENARIO

·         Setting the stage

·         The Slumbertown paper mill

·         Trouble in paradise

·         What can the attacker do with their access?

·         The cyber kill chain

·         Phase two of the Slumbertown Mill ICS attack

·         Other attack scenarios

 

module 4: INDUSTRIAL CONTROL SYSTEM RISK ASSESSMENT

·         Attacks, objectives, and consequences

·         Risk assessments

·         A risk assessment example

 

module 5: THE PURDUE MODEL AND A CONVERGED PLANTWIDE ETHERNET

·         The Purdue Enterprise Reference Architecture

 

module 6: THE DEFENSE-IN-DEPTH MODEL

·         ICS security restrictions

·         How to go about defending an ICS?

·         The ICS is extremely defendable

·         The defense-in-depth model

 

module 7: PHYSICAL ICS SECURITY

·         The ICS security bubble analogy

·         Segregation exercise

·         Down to it – Physical security

 

module 8: ICS NETWORK SECURITY

·         Designing network architectures for security

 

module 9: ICS COMPUTER SECURITY

·         Endpoint hardening

·         Configuration and change management

·         Patch management

·         Endpoint protection software

 

module 10: ICS APPLICATION SECURITY

·         Application security

·         Application security testing

·         ICS application patching

·         ICS secure SDLC

 

module 11: ICS DEVICE SECURITY

·         ICS device hardening

·         ICS device patching

·         The ICS device life cycle

 

module 12: THE ICS CYBERSECURITY PROGRAM DEVELOPMENT PROCESS

·         The NIST Guide to Industrial control systems security

  The ICS security program development process

Objectives



  • Understand industrial cybersecurity, its control systems and operations
  • Design security-oriented architectures, network segmentation, and security support services
  • Configure event monitoring systems, anti-malware applications, and endpoint security
  • Gain knowledge of ICS risks, threat detection, and access management
  • Learn about patch management and life cycle management
  • Secure your industrial control systems from design through retiremen