OT Security: challenges for companies and technical and organisational responses

  • Start date of the course 10/03/2022
  • Duration of the course 40 hours
  • Difficulty level Fundamentals
  • Delivery method Virtual Classroom
  • Access requirements None
Request information

We are all increasingly interconnected, and the risk of leaving a virtual “open door” means letting “unwanted guests” enter the company.

The course on offer, in collaboration with SBS, aims to provide technical and organisational answers to companies working in the Operational Technology sector.

Aims

Course no. 1

Social Engineering: attack and defence techniques

The aim of the course is to prepare company personnel to recognise cyber attacks perpetrated using social engineering techniques and not to fall into the trap.

Course no. 2

Basic Security in the OT World

The aim of the course is to gain an understanding of the basic principles and terminology relating to security in the ICS/OT world in order to be able to apply them in corporate contexts.

Course no. 3

Introduction to networks and infrastructure

The aim of the course is to gain an understanding of the basic principles and terminology for working in the field of networks and security as well as to acquire knowledge relating to hardware and software management.

Course no. 4

Introduction to Incident Response

The aim of the course is to become familiar with how to correctly design, develop and implement cyber security incident response plans and how to implement the mitigation process to help your company, even in the immediate future.

Prerequisites

No previous technical knowledge is required.

Training Program

Course no. 1

Social Engineering: attack and defence techniques

Definition of social engineering

The evolution of social engineering over time

Targets of a social engineering attack

The “human” operating system

The vulnerabilities of human psychology

Social engineering attacks today

The human risk factor

Increasing the level of human security

Developing a corporate security policy

How to defend yourself from social engineering attacks

Security measures

Recognising an attack

What to do in the event of an attack

Classroom exercises, live demos and real cases of phishing and smishing

Course no. 2

Basic Security in the OT World

Introduction to ICS/OT industrial cyber security

Differences between safety and security, ICS/SCADA security

Security in ICT and industrial/utility environments

Terminology, scenarios and technologies, why and how to protect systems

Security aspects

Threats and vulnerabilities of control systems

Risk analysis and assessment

Protecting systems on critical infrastructure installations

International industrial, IEC and ISO standards

Introduction to the PDCA (Plan-Do-Check-Act) cycle

HW/SW protection methods: Antimalware, IDS/IPS, Firewalls…

Defining the electronic perimeter

Wired security network and wireless security. Organisational aspects

Course no. 3

Introduction to networks and infrastructure

Network Fundamentals

LAN Switching Fundamentals

Routing Fundamentals

Infrastructure Services

Infrastructure Maintenance

Course no. 4

Introduction to Incident Response

Information Security Incident Management

Incident Management

Policy e procedure di Incident Response

Response Capability

Incident Response Plan

Business Continuity Management

Disaster Recovery Management

Response e Recovery Plan

Post-Incident Management

Investigation

Teacher and teaching materials

TEACHER

Highly qualified teacher specialised in the subject and working in the field of application on a daily basis.

TEACHING MATERIALS

Handouts prepared directly by the teachers for the course

Participation fee

Upon reaching 20 participants, registrations will be closed.

Prices shown do not include VAT.

Standard

3300,00 €

Multiple Participation

10% discount

Do you need more information?

Contact us with the form or send an e-mail to [email protected] to request the support of one of our tutors.

The undersigned, as data subject, DECLARES that I have read and understood the content of the privacy policy pursuant to Article 13, GDPR. AGREE to the processing of data in relation to the sending by the Data Controller of commercial and / or promotional communications relating to (i) own products / services, or (ii) products / services offered by third parties.
The consent given may be revoked at any time by contacting the Data Controller at the addresses provided in the aforementioned privacy policy.