Course information

ICS/SCADA Cybersecurity Certification Course Outline

Module 1: Introduction to ICS/SCADA Network Defence

LAB: Security Model

  • IT Security Model
  • ICS/SCADA Security Model

LAB: Allowing a Service

  • Security Posture
  • Risk Management in ICS/SCADA
  • Risk Assessment
  • Defining Types of Risk
  • Security Policy

Module 2: TCP/IP 101

  • Introduction and Overview
  • Introducing TCP/IP Networks
  • Internet RFCs and STDs
  • TCP/IP Protocol Architecture
  • Protocol Layering Concepts
  • TCP/IP Layering
  • Components of TCP/IP Networks
  • ICS/SCADA Protocols

Module 3: Introduction to Hacking

  • Review of the Hacking Process
  • Hacking Methodology
  • Intelligence Gathering
  • Foot printing
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • Covering Tracks

LAB: Hacking ICS/SCADA Networks Protocols

  • How ICS/SCADA Are Targeted?
  • Study of ICS/SCADA Attacks
  • ICS/SCADA as a High-Value Target
  • Attack Methodologies In ICS

Module 4: Vulnerability Management

  • Challenges of Vulnerability Assessment
  • System Vulnerabilities
  • Desktop Vulnerabilities
  • ICS/SCADA Vulnerabilities
  • Interpreting Advisory Notices
  • CVE
  • ICS/SCADA Vulnerability Sites
  • Life Cycle of a Vulnerability and Exploit
  • Challenges of Zero-Day Vulnerability
  • Exploitation of a Vulnerability
  • Vulnerability Scanners
  • ICS/SCADA Vulnerability Uniqueness
  • Challenges of Vulnerability Management Within ICS/SCADA

LAB: Vulnerability Assessment

  • Prioritising Vulnerabilities
  • CVSS
  • OVAL

Module 5: Standards and Regulations for Cybersecurity

  • ISO 27001
  • ICS/SCADA
  • NERC CIP
  • CFATS
  • ISA99
  • IEC 62443
  • NIST SP 800-82

Module 6: Securing the ICS Network

  • Physical Security
  • Establishing Policy – ISO Roadmap
  • Securing the Protocols Unique to the ICS
  • Performing a Vulnerability Assessment
  • Selecting and Applying Controls to Mitigate Risk
  • Monitoring
  • Mitigating the Risk of Legacy Machines

Module 7: Bridging the Air Gap

  • Do You Really Want to Do This?
  • Advantages and Disadvantages
  • Guard
  • Data Diode
  • Next Generation Firewalls

Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

  • What IDS Can and Cannot Do
  • Types IDS
  • Network
  • Host
  • Network Node
  • Advantages of IDS
  • Limitations of IDS
  • Stealth the IDS
  • Detecting Intrusions

Show moredowndown

Who should attend this ICS/SCADA Cybersecurity Certification Course?

This ICS/SCADA Certification Course is ideal for a wide range of professionals who are involved in, affected by, or interested in the security of critical infrastructure and industrial environments. Professionals who will benefit from this ICS/SCADA Cybersecurity Certification Course include:

  • ICS/SCADA Engineers
  • Control Systems Engineers
  • Network Security Engineers
  • Cybersecurity Analysts
  • Industrial Automation Engineers
  • Risk Management Professionals
  • Operations Technology (OT) Security Specialists

Prerequisites of the ICS/SCADA Cybersecurity Certification Course

There are no formal prerequisites for attending this ICS/SCADA Certification Course. However, an understanding of networking and security concepts, and Linux operating system fundamentals is highly recommended.

ICS/SCADA Cybersecurity Certification Course Overview

ICS (Industrial Control Systems) and SCADA (Supervisory Control and Data Acquisition) systems are critical to industrial operations. As cyber threats grow more sophisticated, protecting these systems from cyberattacks has become essential. This course offers a comprehensive overview of ICS/SCADA Cybersecurity, ensuring participants are equipped to safeguard vital infrastructure against emerging threats.

Proficiency in ICS/SCADA Cybersecurity is crucial for professionals working in industrial sectors, IT security roles, and system administration. With the increasing frequency of cyberattacks targeting industrial systems, mastering these skills is essential for protecting sensitive data and ensuring operational continuity. This course is designed for cybersecurity professionals, engineers, and IT managers seeking to enhance their expertise in securing industrial control environments.

This intensive 3-day training provides delegates with hands-on knowledge and practical skills necessary to defend ICS/SCADA systems. Participants will gain insights into threat detection, risk assessment, and implementing effective security measures. The course is tailored to offer actionable strategies for mitigating vulnerabilities and improving overall system resilience against cyber threats.

Course Objectives

  • To understand the fundamentals of ICS/SCADA systems and their vulnerabilities
  • To identify common cyber threats and attack vectors in industrial environments
  • To learn methods for assessing and managing cybersecurity risks
  • To apply best practices for securing ICS/SCADA infrastructure
  • To develop skills in incident response and recovery planning
  • To explore tools and technologies used for ICS/SCADA Cybersecurity

After completing this course, delegates will receive a certification recognising their proficiency in securing industrial control systems and enhancing their professional credentials in the cybersecurity field.

Show moredowndown

What's included in this ICS/SCADA Cybersecurity Certification Course?

  • World-Class Training Sessions from Experienced Instructors 
  • ICS/SCADA Cybersecurity Certificate 
  • Digital Delegate Pack

ICS/SCADA Cybersecurity Certification Exam Information:

The ICS/SCADA Cybersecurity exam evaluates a candidate proficiency in ICS/SCADA cybersecurity techniques and principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 75
  • Duration: 2 Hours

Why choose us

Our Washington D.C. venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

Washington D.C is the capital of the United States and is a federal district. Washington has around 660,000 inhabitants living in the area.

Washington D.C is the home to a variety of universities such as the American University which is a private research university. The university is affiliated with the United Methodist Church. The university was established in 1893 and was approved by former President Benjamin Harrison. The university enrols around 13,000 students a year who are either undergraduate or graduate students. Students at American University have backgrounds of more than 150 nationalities. The American University is also very well known for its study abroad programs in which students can participate in a number of programs around the world.

The George Washington University is another university located in Washington D.C. The university is a private research university and is the largest institution in the District of Columbia. The George Washington University was established in 1821. The university currently has around 25,300 students in attendance with the majority of those studying postgraduate degrees. Some of the courses available at the George Washington University include; Arts, Science, Business, International Affairs, Public Health, Professional Studies, Engineering, Applied Sciences, Nursing and Medicine, Politics and Law.

Another university located in Washington D.C is the Gallaudet University which is a private university for deaf and hard of hearing students. The university has around 2,000 students in attendance. Gallaudet was established in 1864 and was originally a grammar school for deaf and blind children until it became the university. Gallaudet is famous for being the only university that primarily teaches classes specifically accommodated to deaf and hard of hearing students. The university is bilingual using American Sign Language (ASL) and English.

Georgetown University is a private research university in Washington and was established in 1789 making it the oldest catholic and Jesuit institute in the United States. There are around 18,000 students who attend the university each year and study a variety of degrees. Some notable alumni from Georgetown University include eight former heads of state, Bill Clinton, Bradley Cooper and a variety of others. 

Show moredown

Address

AdvantEdge Business Centres,

5335 Wisconsin Avenue,

Suite 650,

Washington D.C

United States

T: +1 7204454674

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led ICS/SCADA Cybersecurity Certification Course in Washington D.C.. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's ICS/SCADA Cybersecurity Certification Course in Washington D.C., accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Streamline large-scale training requirements with The Knowledge Academy's In-house/Onsite at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

ICS/SCADA Cybersecurity Certification Course in Washington D.C. FAQs

Please arrive at the venue at 8:45am.
We are able to provide support via phone & email prior to attending, during and after the course.
Delegate pack consisting of course notes and exercises, Manual, Experienced Instructor, and Refreshments
This course is [ ] day(s)
Once your booking has been placed and confirmed, you will receive an email which contains your course location, course overview, pre-course reading material (if required), course agenda and payment receipts
The training fees for ICS/SCADA Cybersecurity Certification Coursein Washington D.C. starts from $6995
The Knowledge Academy is the Leading global training provider for ICS/SCADA Cybersecurity Certification Course.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on EC – Council Certification Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +1 7204454674 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
Christmas SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.