Cybersecurity Certification: ISA/IEC 62443 Cybersecurity Fundamentals Specialist (IC32)
June 27 - June 30
Why Choose this Training Course
This is a 4-day training course. COVID-19 is Spreading More than just One Kind of Virus. Hackers have set up ‘coronavirus map’ websites containing malware to steal information from companies. Coronavirus-themed malicious emails targeting users in Japan, Italy, and other parts of the world have been spreading a variety of malware. Hence it is more than crucial to attend courses.
The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA99 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments.
Who Should Attend
This new ISA/IEC 62443 Cybersecurity Fundamentals Specialist certificate program is designed for professionals involved in IT and control system security roles that need to develop a command of industrial cybersecurity terminology and understanding of the material embedded in the ISA99 standards.
ISA/IEC 62443 Cybersecurity certificates are awarded to those who successfully complete a designated training program and pass a multiple choice exams.
Key Learning Objectives
You will be able to:
- Discuss the principles behind creating an effective long term program security
- Interpret the ISA/IEC 62443 industrial security framework and apply them to your operation
- Define the basics of risk and vulnerability analysis methodologies
- Describe the principles of security policy development
- Explain the concepts of defense in depth and zone/conduit models of security
- Analyze the current trends in industrial security incidents and methods hackers use to attack a system
- Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks