PER398 – 8.00 Hours
Currently there are no scheduled classes for this course. However, in some cases a course can be scheduled to meet your organization’s specific needs. For more information about this course or to schedule a class, please contact Business & Cyber Solutions at or [email protected] to get the latest schedule.
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.
Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at [email protected] or call (800) 541-7149 for more information on the approval process.
Course Completion Requirements
Participant Must Provide
- a photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines.
Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed
- Internet of Things (IoT)
- Industrial Control Systems (ICS)
- Types of Attacks
- Industrial Control System technical vulnerabilities
- Industrial Control System human vulnerabilities
- Case Studies
- Dependencies and interdependencies between Community Lifelines
- Potential impacts of successful attacks
- Risk Management Process
- Convenience Versus Usability
- Importance of a Cybersecurity Program
- Limitations to Mitigating Risk
- Detecting Cyber Vulnerabilities
- Detecting Cyber Attacks
- Identifying Challenges Unique to Industrial Control Systems
- Containment, Eradication, and Recovery Techniques
- Cyber Incident Management
- Critical Decision-Making
Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]