Cyber Acceptance Testing

Topics to Cover Cybersecurity acceptance testing Best practices Guidance Auditing tools Assistance This activity requires your presence in class that will be reviewed by the…

Access Control and Remote Access

Topics to Cover Access control in IACS Access control best practices Multifactor authentication Remote access control Remote access technologies Design factors Virtual Private Networks Assistance…

System Hardening

Topics to Cover System hardening Operating Systems hardening System configuration benchmarks Auditing Windows policies Auditing tools – Examples Device hardening Network hardening Assistance This activity…

Intrusion Detection Systems

Topics to Cover Types of Intrusion Detection Systems IDS best practices Assistance This activity requires your presence in class that will be reviewed by the…

Firewalls and Segmentation

Topics to Cover Types of firewalls Classes of firewalls Device decision basis ISA/IEC-62443-2-1 requirements DMZ zones Defense-In-Depth IACS firewalls Firewall segmentation planning and implementation IACS…

Conceptual Design

Topics to Cover Interpreting risk assessment results Security Levels definitions Security Levels types definitions The four “Ts” of managing risk The five “Ds” of treating…

Risk Assessment Overview

Topics to Cover IACS Cybersecurity Lifecycle Assess, also known as, “Evaluation”, or “Discover & Assess” Develop, also known as “Implement”, or “Develop & Implementation”, or…

You cannot copy content, as this information is provided to view only. You can request to receive a printed copy.