PER398 – 8.00 Hours
|Details||07/19/22 – 07/19/22||Johnston, IA||EC PER398 5||Register|
This schedule is subject to change without notice. If you have not received confirmation of the class prior to the class start, please contact the division at or firstname.lastname@example.org to get the latest schedule.
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.
Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at email@example.com or call (800) 541-7149 for more information on the approval process.
To meet attendance requirements, participants must review each training module and complete all required course assignments, activities, quizzes, and/or end of course exam.
- Internet of Things (IoT)
- Industrial Control Systems (ICS)
- Types of Attacks
- Industrial Control System technical vulnerabilities
- Industrial Control System human vulnerabilities
- Case Studies
- Dependencies and interdependencies between Community Lifelines
- Potential impacts of successful attacks
- Risk Management Process
- Convenience Versus Usability
- Importance of a Cybersecurity Program
- Limitations to Mitigating Risk
- Detecting Cyber Vulnerabilities
- Detecting Cyber Attacks
- Identifying Challenges Unique to Industrial Control Systems
- Containment, Eradication, and Recovery Techniques
- Cyber Incident Management
- Critical Decision-Making