ICS Network Security
|
Cyber Security Certifications
ICS Network Security | Cyber Security Certifications
Due to the potential impact of an attack on the physical safety of communities, employees or customers, ICS /SCADA security is an even higher priority than for traditional IT systems. Cyber criminals have already developed malware threats such as Triton/TRISIS and Stuxnet that can disrupt industrial Operation Technology (OT).
The ICS/SCADA Cyber Security Training Course is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network.
You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set, you will look at the best practices and recommendations when it comes to bridging the air gap. You will learn a systematic process of intrusion and malware analysis. Once you have the process for analysis mastered, you will be introduced to the digital forensic process and how to respond to incidents when a breach is detected.
- Introduction to ICS/SCADA Network Defense
- TCP/IP 101
- Introduction to Hacking
- Vulnerability Management
- Standards and Regulations for Cybersecurity
- Securing the ICS network
- Bridging the Air Gap
- Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
- SCADA Systems Personnel
- Business System Analysts Who Support SCADA Interfaces
- System administrators, engineers and other IT professionals when administering, patching, securing SCADA and/or ICS
- Security consultants when performing security assessments of SCADA and/or ICS
- This course is specially designed for IT professionals who are involved in managing or directing their organization’s IT infrastructure and who are responsible for establishing and maintaining information security policies, practices and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.
Certified Ethical Hacker
CEH is the leading ethical hacking training and certification program in cybersecurity. Students audit a system for weaknesses and vulnerabilities using the same tools and exploits as malicious hackers, but under proper legal circumstances and in the best interest of assessing the security posture of a target system and organization. It teaches how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
Students have the option of two modes of learning: i-Learn Self-Study from video modules or instructor led training Master Class.
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
- Information Security Analyst/Administrator
- Information Assurance (IA) Security Officer
- Information Security Manager/Specialist
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security and IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
- Anyone who is concerned about the integrity of the network infrastructure
The i-Learn Experience
i-Learn is an asynchronous, self-study environment which delivers the CEH training course in a streaming video format. This course includes
Purchase i-Learn Self-Study Course
- Instructor led training modules (1 year access)
- Official e-courseware (1 year access)
- CyberQ Labs (6 Months Access)
- Certificate of Completion
- Exam Prep Program
- Certification Exam
The Master Class Experience
This course offers you the opportunity to learn from world-class instructors and to collaborate with top Infosecurity professionals. MasterClass classes come with a slew of additional benefits including add-on certification training, local meet-up opportunities, and iLearn access:
- Official e-courseware (1 year access)
- CyberQ Labs (6 Months Access)
- Certificate of Completion
- Exam Prep
- Certification Exam
- CEH On-Demand (1 year access)
- The CEH MasterClass package comes with your choice of CPENT (Pen Testing Track) or CHFI (Computer Forensics Track)
Get Certified Ethical Hacker Training
Upcoming Certified Ethical Hacker Classes
Testimonial
Want to Learn More Before You Register?
Get a sneak peek into our CEH certification course. Join us for a 3 hour overview including live lab demonstrations to get an idea of the kind of content you can expect from a full course! This webinar will be delivered by a Certified Master Instructor. Register with code: i4G.
For more info about this course, download the PDF using this form.
Other Trainings
A SAFe certification will empower you to
play an integral role in driving business transformation.
From learning about DevOps to sharpening your Agile Engineering skills – ICAgile certifications are crucial in embracing the Lean-Agile mindset.
Cybercriminals are becoming increasingly sophisticated, but with our training
programs you can learn how to protect your business from them.
From machine learning to SQL
programming – our Data Analytics training will help you become an expert data analyst.
Enter the world of Lean Six Sigma and discover the Lean manufacturing and Lean enterprise benefits.
Become an ISO/IEC certified information security implementer or auditor able to work in any organization.
Learn how to help businesses prepare for and deal with disruptive events that threaten their operation.