OGT627 – 8.00 Hours

Currently there are no scheduled classes for this course. However, this course can be scheduled to meet your specific needs. For more information about this course or to schedule a class, please contact Knowledge Engineering at (800) 541-7149 or ke@teex.tamu.edu to get the latest schedule.

Course Description

This course provides an understanding of cybersecurity resiliency in industrial control systems (ICS). The course will review the Internet of Things (IoT), vulnerabilities within Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems, methods of detecting and responding to cyber attacks in the systems, as well as actions that can be taken by non-technical personnel to mitigate or minimize the effects of cyber attacks.

Prerequisites

Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at ke@teex.tamu.edu or call (800) 541-7149 for more information on the approval process.

Course Completion Requirements

Testing/Certification

A Pre-Test and Post-Test are given to measure participants’ understanding of the material. Participants are required to score a 70% or better on the Post-Test.

Registration and Attendance

Attendance is crucial in order to receive credit for this course. All participants must complete TEEX online registration prior to the beginning of the course, sign the attendance roster for each day of the course, attend 80% of the course hours, and complete the evaluation at the end of the course in order to receive a certificate of completion.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.

Topics

  • Define Internet of Things (IoT) and IndustrialInternet of Things (IIoT)
  • Identify ICS technical vulnerabilities, ICS human vulnerabilities and other risks to critical infrastructure
  • Discuss the risk management process and convenience versus usability
  • Identify cybersecurity programmatic considerations for ICS
  • Identify limitations to mitigating risk in ICS/SCADA
  • Discuss how to detect cyber attacks and vulnerabilities
  • Discuss how the operator can detect cyber issues with ICS systems
  • Discuss containment, eradication, and recovery techniques
  • Discuss considerations for incident management in critical infrastructure
  • Recognize critical decisions and false alarms

Suggested Audience

This course is designed for non-IT operators, managers, and technicians within critical infrastructure sectors such as power, water/wastewater, manufacturing and risk management personnel.

Government Programs

  • For DHS/FEMA Funded Courses, please contact ke@teex.tamu.edu or call (800) 541-7149

Contact Information

Knowledge Engineering
Phone: (979) 458-6710 | Toll-Free: (800) 541-7149
Email: ke@teex.tamu.edu

The chemicals used in the training are currently at my department. Great! I finally understand how they should be applied to evidence.

— Latent Print Processing
Back to top