PER398 – 8.00 Hours

Schedule

Details Buttons Dates Location Class Price Register Buttons
04/23/24 – 04/23/24 Belton, TX EC PER398 32 Register
05/08/24 – 05/08/24 Live Online Instructor-Led Training EC PER398 39 Register

This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or [email protected] to get the latest schedule.

Course Description

The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.

Prerequisites

Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at [email protected] or call (800) 541-7149 for more information on the approval process.

Course Completion Requirements

Participant Must Provide

  • a photo identification on the first day of class. See the Participant Handbook for approved forms of identification and additional guidelines.

Attendance Requirements

Class attendance is an essential part of the education process and participants in TEEX courses are expected to attend all class sessions and field exercises. This course requires participants to attend a minimum of 80% of the class hours as a component of successful course completion. During the course, your instructor will review any additional attendance requirements, for example a field exercise that cannot be missed

Upon successful completion, you will be able to:

  • Internet of Things (IoT)
  • Industrial Control Systems (ICS)
  • Types of Attacks
  • Industrial Control System technical vulnerabilities
  • Industrial Control System human vulnerabilities
  • Case Studies
  • Dependencies and interdependencies between Community Lifelines
  • Potential impacts of successful attacks
  • Risk Management Process
  • Convenience Versus Usability
  • Importance of a Cybersecurity Program
  • Limitations to Mitigating Risk
  • Detecting Cyber Vulnerabilities
  • Detecting Cyber Attacks
  • Identifying Challenges Unique to Industrial Control Systems
  • Containment, Eradication, and Recovery Techniques
  • Cyber Incident Management
  • Critical Decision-Making

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837
Email: [email protected]

Back to top