Cybersecurity for industrial automation – protecting SCADA systems – level 1
Partner szkolenia:
Course aim:
After completing the training, the participant knows:- How the ETHERNET network works
- How to ensure cybersecurity of industrial networks
- How to monitor the IDS network infrastructure
Course type
Course level
Duration
Prerequisites
Location
Dates
Schedule
day 2. 9.00 - 16.00
day 3. 9.00 - 16.00
Price
Highlights
- Certyfikat ukończenia kursu w 2 językach – polskim i angielskim
- Educational aids: scripts
- Dostęp do fachowej literatury i czasopism branżowych (dot. szkoleń stacjonarnych)
- Materiały piśmiennicze np. notatnik, długopis (dot. szkoleń stacjonarnych)
- Kompleksową pomoc indywidualnie przydzielonych opiekunów kursu
- Karty Kursantów upoważniające do zniżek w wybranych gliwickich lokalach partnerskich (dot. szkoleń stacjonarnych)
Catering
More information
Contact
Closed trainings
Certificate
More information
Accommodation
Please contact us on:
0048 32 4111 000
info@emt-systems.pl
should you have any questions on the course you have chosen
Course program
- How does the ETHERNET network work?
- ISO / OSI network model.
- Ethernet communication - the basics.
- Communication in the third layer (L3).
- Transport layer (L4) protocols.
- Application layer protocols (L7).
- Introduction - basic information.
- Review of vulnerabilities and sources of threats.
- Standards, good practices, security policies (Defense in depth, NIST, IEC 62443, Incident response).
- Inventory as the basis of security.
- Security audits - network security testing.
- Safe transmission.
- Passive protection - how to monitor a SCADA network.
- Basic issues (SOC, SIEM, SOAR, IDS, Honeypot).
- IDS - the key SCADA network monitoring system.
- Active protection - How to protect control systems or PLC under protection?
- Basic issues (Defense in Depth concept, Cyber Killchain).
- Technologies used (Firewall, IPS, Data LED, NG Firewall, DPI Firewall).
- DPI Firewall - protection of PLC and HMI controllers.
- Architecture of the monitoring system.
- Introduction to the IDS system interface.
- Case study
- Identification of a new device in the network.
- Detection of an active network reconnaissance.
- Identification of the wrong command of the selected protocol (eg Modbus, S7 +, PROFINET).
- Atack Man in the middle.
- Malware detection.
- Creating security policies.
- Detection of an unauthorized query for a driver registry value.
- Detection of an unauthorized change of registry parameters.
- Summary
About us
Catering
During each training day, participants receive:
- Unlimited access to the Cechownia Cafe coffee bar, serving tea and high-quality freshly ground coffee. The bar is equipped with:
- NECTO Karisma - a professional espresso machine of Italian production.
- THERMOPLAN BW 4 - a professional espresso machine made in Switzerland.
- Two-course dinner - a combination of traditional, home-made flavors with meals served in restaurants.