Courses

  • 8 Lessons

    EN50 EN 3v20 – Industrial cybersecurity management for projects in the energy, oil and gas sector.

    The ability of any organization (end user or supplier) to develop and implement industrial cybersecurity management projects successfully, making optimal use of resources, in minimal…
  • 5 Lessons

    EN60 EN 3v20 – Cyber Risk Assessment in New and Existing Industrial Systems in Energy, Oil & Gas.

    The purpose of the EN60 course is to manage the development of the activities necessary to carry out the assessment of industrial cyber risks, meeting…
  • 5 Lessons

    EN61 EN 3v20 – Design and implementation of security in new and existing industrial systems in energy, oil and gas.

    The purpose of the EN61 course is to manage the development and incorporation of necessary and sufficient actions to mitigate all non-tolerable risks identified during…
  • 8 Lessons

    EN62 EN 3v20 – Assistance in the safe operation and maintenance of safety in industrial systems in energy, oil, and gas.

    Develop all the necessary tools to implement the Monitoring and Maintenance of the Security Levels defined for each of the Zones and Ducts of the…
  • 8 Lessons

    EN99 EN 3v20 – Good practices in the management of security events and alerts in industrial systems with ISA/IEC-62443

    Cybersecurity requires monitoring, detecting, monitoring, and alerting based on many cybersecurity events that occur in control systems. This activity, necessary to accompany the safe operation of…
  • 27 Lessons

    IC32 EN 4v20 – ‎Using the ISA/IEC-62443 Standard to Secure Control Systems.

    ‎A detailed overview of how ISA/IEC-62443 (formerly ISA 99) standards can be used to protect your critical control systems. It also explores the procedural and technical differences between security for traditional IT environments and appropriate solutions for SCADA or plant environments. The course explores the movement towards using open standards such as Ethernet, TCP/IP and web technologies in SCADA and process control networks that have begun to expose these systems to the same cyberattacks that have wreaked so much havoc on global government and businesses. Information systems.‎
  • 16 Lessons

    IC32 EN 5v00 – ‎Using the ISA/IEC-62443 Standard to Secure Control Systems.

    ‎A detailed overview of how ISA/IEC-62443 (formerly ISA 99) standards can be used to protect your critical control systems. It also explores the procedural and technical differences between security for traditional IT environments and appropriate solutions for SCADA or plant environments. The course explores the movement towards using open standards such as Ethernet, TCP/IP and web technologies in SCADA and process control networks that have begun to expose these systems to the same cyberattacks that have wreaked so much havoc on global government and businesses. Information systems.‎
  • 16 Lessons

    IC32 EN 5v12 – ‎Using the ISA/IEC-62443 Standard to Secure Control Systems.

    ‎A detailed overview of how ISA/IEC-62443 (formerly ISA 99) standards can be used to protect your critical control systems. It also explores the procedural and technical differences between security for traditional IT environments and appropriate solutions for SCADA or plant environments. The course explores the movement towards using open standards such as Ethernet, TCP/IP and web technologies in SCADA and process control networks that have begun to expose these systems to the same cyberattacks that have wreaked so much havoc on global government and businesses. Information systems.‎
  • 4 Lessons

    IC33 EN 2v00 – Vulnerability Analysis and Cyber Risk Assessment in New and Existing Industrial Systems.

    The first phase in the IACS Cybersecurity Lifecycle (defined in ISA/IEC 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA/IEC 62443-2-1 these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system, identifying security level targets, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS).
  • 6 Lessons

    IC33 EN 3v00 – Vulnerability Analysis and Cyber Risk Assessment in New and Existing Industrial Systems.

    ‎The first phase in the Industrial Systems Cybersecurity (IACS – defined in ‎‎ISA‎‎/IEC-62443-1-1) lifecycle consists of identifying and documenting industrial assets (IACS) and performing a cybersecurity vulnerability analysis and risk assessment to identify and understand high-risk vulnerabilities that require mitigation. For ‎‎ISA‎‎/IEC-62443-2-1 these assessments must be performed on both existing (Brownfield) and new (Greenfield) applications. Part of the assessment process involves developing a zone and conduit model of the systems under consideration, identifying security level objectives, and documenting cybersecurity requirements into a cybersecurity requirements specification (‎‎CSRS‎‎).‎
  • 6 Lessons

    IC33 EN 3v11 – Vulnerability Analysis and Cyber Risk Assessment in New and Existing Industrial Systems.

    ‎The first phase in the Industrial Systems Cybersecurity (IACS – defined in ‎‎ISA‎‎/IEC-62443-1-1) lifecycle consists of identifying and documenting industrial assets (IACS) and performing a cybersecurity vulnerability analysis and risk assessment to identify and understand high-risk vulnerabilities that require mitigation. For ‎‎ISA‎‎/IEC-62443-2-1 these assessments must be performed on both existing (Brownfield) and new (Greenfield) applications. Part of the assessment process involves developing a zone and conduit model of the systems under consideration, identifying security level objectives, and documenting cybersecurity requirements into a cybersecurity requirements specification (‎‎CSRS‎‎).‎
  • 8 Lessons

    IC34 EN 2v00 – Design and Implementation of Cybersecurity in New and Existing Industrial Systems.

    The second phase in the IACS Cybersecurity Lifecycle (defined in ISA/IEC 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution, to validate countermeasures are properly implemented and that the IACS has achieved the target security level. This course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification.
  • 13 Lessons

    IC34 EN 3v00 – Design and Implementation of Cybersecurity in New and Existing Industrial Systems.

    ‎The second phase in the Industrial Systems Cybersecurity Lifecycle (IACS – defined in ISA/IEC-62443-1-1) focuses on activities associated with the design and implementation of cybersecurity countermeasures. This involves the selection of appropriate countermeasures based on their security-level capability and the nature of the threats and vulnerabilities identified in the assessment phase. This phase also includes conducting cybersecurity tests for the acceptance of the integrated solution, to validate that the countermeasures are implemented correctly and that the industrial system under consideration has reached the required level of security.‎
  • 13 Lessons

    IC34 EN 3v02 – Design and Implementation of Cybersecurity in New and Existing Industrial Systems.

    ‎The second phase in the Industrial Systems Cybersecurity Lifecycle (IACS – defined in ISA/IEC-62443-1-1) focuses on activities associated with the design and implementation of cybersecurity countermeasures. This involves the selection of appropriate countermeasures based on their security-level capability and the nature of the threats and vulnerabilities identified in the assessment phase. This phase also includes conducting cybersecurity tests for the acceptance of the integrated solution, to validate that the countermeasures are implemented correctly and that the industrial system under consideration has reached the required level of security.‎
  • 5 Lessons

    IC37 EN 2v00 – Operation and Maintenance of Cybersecurity in Industrial Systems.

    The third phase in the IACS Cybersecurity Lifecycle (defined in ISA/IEC 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change, backup and recovery procedures and periodic cybersecurity audits. This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events, as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an every changing threat environment.
  • 6 Lessons

    IC37 EN 3v00 – Operation and Maintenance of Cybersecurity in Industrial Systems.

    ‎The third phase in the Cybersecurity in Industrial Systems (IACS ) lifecycle – defined in ISA/IEC-62443-1-1) focuses on activities associated with ongoing operations and the…
  • 3 Lessons

    IC47 EN – ISASecure for Product Suppliers and Assessors.

    As the ISA/IEC 62443 series of standards for the security of Industrial Automation and Control Systems (IACS) grow in popularity and usage several certification and assessment programs have been established, for example ISASecure. There is a need for training programs because there is a lack of understanding of 62443 standards in the product supplier community and a shortage of assessors with the requisite knowledge to perform certifications and assessments. This course is intended to train product suppliers in how to design, develop and support IACS products, and assessors in how to certify and assess IACS products and security development lifecycles using the ISA/IEC 62443 series of standards.
  • 10 Lessons

    IC55 EN – Implementing Business to MES Integration Using the ANSI/ISA95 Standard.

    Many manufacturing firms have made significant investments in flexible shop-floor execution systems and in sophisticated enterprise planning (ERP) systems. Those investments, however, cannot yield their full potential until each has access to the information and capabilities of the other. The ANSI/ISA95 standard addresses that coordination problem by providing a sound, robust definition of business activities and of the information that must flow between those two realms. This course also teaches the terminology used in Information Technology (IT) departments so that manufacturing and IT personnel can effectively work together on integration projects.
You cannot copy content, as this information is provided to view only. You can request to receive a printed copy.