Overview
Course Outline
Schedule & Fees
Course Methodology
Instructor-led training that uses interactive learning methods, including class discussion, small group activities, and role-playing
Course Objectives
List what process control assets need to be protected; Understand the Current Industrial Security Environment; List and explain the main components of the process control security standard IEC 62443; Understand how to perform a risk assessment and apply cybersecurity counter-measures; Learn how to perform application diagnostics, troubleshooting, and incidence response
Target Audience
Target Competencies
n/a
Day 1
Introduction and Cybersecurity Fundamentals:
- Introduction to Process Control Cybersecurity
- Understanding the Current Industrial Security Environment
- How IT and OT (Operational Technology) in the Plant Floor are Different and How They are the Same
- Overview of Process Control
- Overview of Industrial Communication Systems and Networks
- How Cyber-attacks Happen: Threats, Vulnerabilities, Attacks
- Asset Identification and Impact Assessment
Day 2
Introduction to the IACS Cybersecurity Lifecycle and ISA99 / IEC 62443
- Identification & Assessment Phase
- Design & Implementation Phase
- Operations & Maintenance Phase
- Limits of a Conventional IT Approach
- The IEC 62443 Security Approach and Standards
- Risk Analysis Risk Identification, Classification, and Assessment
- CAL (Cybersecurity Assurance Levels)
- Functional Requirements of IEC 62443
Day 3
Addressing Security Risks: Process Control Security Counter-Measures
- Antivirus, Anti-spyware
- Firewalls, Traffic Analyzers
- Encryption, Virtual Private Networks (VPNs)
- Passwords - Authentication Systems
- Access Control - Intrusion Detection / Prevention
- Network Segmentation
- Interpreting Device Alarms and Event Logs
- Early Indicators
- Network Intrusion Detection Systems
- Network Management Tools
- Interpreting OS and Application Alarms and Event Logs
- Application Management and Whitelisting Tools
- Antivirus and Endpoint Protection Tools
- Security Incident and Event Monitoring (SIEM) Tools
Day 5
IACS Cybersecurity Operating Procedures & Tools and Incident Response
- Developing and Following an IACS Management of Change Procedures
- IACS Configuration Management Tools
- Developing and Following an IACS Patch & Antivirus Management and Cybersecurity Audit Procedures
- Patch Management Tools
- Antivirus and Whitelisting Tools
- Auditing Tools
- Developing and Following an IACS Incident Response Plan
- Incident Investigation and System Recovery
$3875
Kuala Lumpur
Country: Malaysia
Duration: One week
Date: 03–07 Nov 2025
Register
$1375
Zanzibar
Country: Tanzania
Duration: One week
Date: 04–08 May 2026
Register