PER398 – 8.00 Hours

Currently there are no scheduled classes for this course. However, in some cases a course can be scheduled to meet your organization’s specific needs. For more information about this course or to schedule a class, please contact Business & Cyber Solutions at or bcs@teex.tamu.edu to get the latest schedule.

Course Description

The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.

Prerequisites

Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at bcs@teex.tamu.edu or call (800) 541-7149 for more information on the approval process.

Attendance Requirements

To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.

Topics

  • Internet of Things (IoT)
  • Industrial Control Systems (ICS)
  • Types of Attacks
  • Industrial Control System technical vulnerabilities
  • Industrial Control System human vulnerabilities
  • Case Studies
  • Dependencies and interdependencies between Community Lifelines
  • Potential impacts of successful attacks
  • Risk Management Process
  • Convenience Versus Usability
  • Importance of a Cybersecurity Program
  • Limitations to Mitigating Risk
  • Detecting Cyber Vulnerabilities
  • Detecting Cyber Attacks
  • Identifying Challenges Unique to Industrial Control Systems
  • Containment, Eradication, and Recovery Techniques
  • Cyber Incident Management
  • Critical Decision-Making

Contact Information

Business & Cyber Solutions
Phone: (979) 431-4837 | Toll-Free:
Email: bcs@teex.tamu.edu

…the BEDC was great, thanks for all of the work that you, Bill, and all of the presenters put into development a top-notch curriculum. It was a lot of material, but I really enjoyed it.

— Jean Moreno, BEDC Participant, Program Administrator, City of Glendale, Arizona
Back to top