Class Details

Price: $4,995

5-Day Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available all day
  • Freshly baked cookies every afternoon - * only at participating locations

For group training options, please call us at (240) 667-7757 or email promo@phoenixts.com. 

Course Outline

  • Firewall Architectures, Rulebases and DMZ
  • Security Policies and Standards for SCADA Systems
  • Management of Security Patches
  • Management and Implementation of Anti-Virus Protection
  • Scanning Systems and Networks for Vulnerabilities
  • SCADA Application Integration with Active Directory
  • Field Communications Security
  • Protocol Security Concerns for SCADA
  • SCADA Application Integration with Authentication Technology
  • Access Control
  • Control Center and Remote Access Security
  • SCADA System Attack Detection 

Objectives

  • Developing Security Policies for SCADA Systems
  • Security Standards and Practices for SCADA Systems
  • Access Control
  • Field Communications Security
  • User Authentication and Authorization with SCADA Systems
  • Vulnerability Scanning and Assessment
  • Cyber-Attack Detection
  • Security Protocol Concerns and Problems

Class Exam

CSSA IACRB Certified Security Architect Exam

SCADA security training prepares students for the CSSA certification exam. This certification verifies an IT security professional's knowledge for securing SCADA systems. SCADA systems manage critical infrastructure industries such as water, oil, natural gas, and other energy systems. This certification is geared towards IT security professionals and managers who oversee and SCADA systems. 

Details:

  • Number of Questions - 100
  • Length - 2 Hours

Test Domains:

  • Security Policies for SCADA Systems
  • Security Standards and Practices for SCADA Systems
  • Access Control
  • Field Communications Security
  • User Authentication and Authorization with SCADA Systems
  • Vulnerability Scanning and Assessment
  • Cyber-Attack Detection
  • Security Protocol Problems