Scada Security Training

Scada Security Training

Print Friendly, PDF & Email

Introduction:

Scada Security Training Course with detailed hands-on Exercises

Scada Security Training, SCADA, DCS and other process control networks, generically called SCADA, run the nation’s mission critical infrastructure, everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move to standard protocols, the Microsoft OS and interconnection to other networks. Learn the skills required to direct and manage the appropriate cyber security protection for your SCADA system.

Today, IT departments and the classic IT security approach is wreaking havoc with SCADA systems. Too often, IT ‘fixes’ bring a SCADA system down, but avoiding or ignoring cyber security is not an option. Learn how standard IT security solutions can be used in SCADA systems and where SCADA specific security controls and practices are required. This Scada Security Training course will teach you to develop a SCADA cyber security program and work with internal and external IT resources to implement the program.

Our Scada Security Training instructors have both SCADA security and IT security expertise, a rare combination. They have performed assessments, designed security architectures, and written and audited security policies on a wide variety of real world SCADA systems in the oil & gas, electric, water and other industries.

Duration: 3-4 days

Scada Security Training
 
Scada Security TrainingRelated Courses
 

Customize It:

• If you are familiar with some aspects of this Scada Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Scada Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Scada Security Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Scada Security Training course is defined here:

• SCADA Systems Personnel
• Engineers and Operations
• Process Engineers and Managers
• Operations and Maintenance Managers, Engineers and Technicians
• Hardware and Instrument Specialists
• Business System Analysts Who Support SCADA Interfaces
• System and Application Programmers
• Project Managers
• Telecommunications and Wireless Support Personnel
• Control engineers, integrators and architects when designing and implementing secure SCADA and/or ICS
• System administrators, engineers and other IT professionals when administering, patching, securing SCADA and/or ICS
• Security consultants when performing security assessments of SCADA and/or ICS
• Managers responsible for SCADA and/or ICS Researchers and analysts who are trying to understand the unique security needs of • SCADA and/or ICS Vendors developing products that will be deployed in SCADA and/or ICS

Objectives:

After completing this Scada Security Training course, attendees will be able to:

• SCADA security policies
• Firewall architecture, DMZ, and rulebases
• Secure remote access to a control center
• SCADA protocol security issues
• Securing field communications
• User authentication technologies and integration with SCADA applications
• Access control principles and implementation
• Active Directory integration with SCADA applications
• Detecting cyber attacks on SCADA systems
• Vulnerability scanning
• Security patch management
• Anti-virus protection and management
• Exceptions – what to do when you can’t implement best practice
• SCADA security standards

Scada Security Training – Course Syllabus:

Introduction
•Security Challenges are Universal
•Increased Vulnerability Due To Open Systems Trend
•Increased Vulnerability From Motivated, Knowledgeable Attackers
•Some Documented SCADA Security Failure Incidents

Open Systems Issues Push The Agenda
•Protocols of the Internet Architecture
•Ethernet and Other IT-derived Networks
•Fieldbus Standards
•IEC Standards
•Ethernet/IP and CIP
•Computer Operating Systems; Windows and Unix/Linux

Points of Vulnerability
•The IT Infrastructure
•Leased Infrastructure; Frame Relay and Other Services
•The Sensor/Fieldbus Networks
•Wireless LAN Systems
•Rogue (Undocumented) Dial and Wireless Links
•Infected/Compromised Portable Equipment
•Network Management Systems

SCADA Network Protocols
•Features Common to Most SCADA Networks
•The MODBUS Protocol and Lack of Security
•Demonstration: MODBUS Dialog
•The DNP3 Protocol and Its Security Limitations
•The Near-Universal Trend to Ethernet-Based Networks
•Network Management Systems

Encryption
•Starting With a Secure Physical Environment
•Traditional Purpose of Assuring Privacy is a Minor Issue
•Traditional Symmetric Key Cryptography
•Public Key Cryptography and RSA
•Protecting Field Networks From Intrusion With Encryption

Firewalls and Perimeter Security
•Firewall Design Objectives
•Survey of Firewall Types
•Network Address Translation
•Creating and Populating a SCADA DMZ
•Field-Level Firewalls in the SCADA Network

Access Control and Authorization: Managing Users
•Limitations of User ID’s and Passwords
•Multi-Factor Authentication Methods
•Microsoft’s Active Directory Services
•RADIUS, TACACS and Diameter Authentication Services

Intrusion Detection and Prevention
•NIDS Principles and Features
•Deployment Scenarios
•Packet Signature and Traffic Pattern Analysis
•Strategies For Dealing With The Volumes of Data

Wireless Security Issues
•Wireless Technology Offers Compelling Advantages
•Early Misadventures With Wireless Security
•TKIP and the WPA/IEEE 802.11i Supplemental Standard
•Private Point-to-Point Wireless Services
•Cellular/Mobile Data Networks; Benefits and Risks

Creating and Documenting A Security Solution
•Essential Elements of a Secure Environment
•Promoting User Awareness
•Elements of an Effective Security Policy
•Defining a Model for Internet Access

10 Essential Steps to Improving SCADA Security
•Appendices
•Glossary of Terminology
•Suggestions For Further Reading
•General Index

 

Request More Information

Time frame:

No Comments Yet.

Leave a comment

0