Saturday, February 2, 2013

SCADA Security Training - Supervisory control and data acquisition


Why should you choose TONEX for your SCADA Security Training?


SCADA (supervisory control and data acquisitionRisk Factors such as Standardized Protocols and Technologies, Connectivity,  Insecure and Rogue Connections, SCADA Public Information, SCADA Possible Incident Scenarios and Sources of Incidents are also discussed.
Attacking critical infrastructure control systems such as SCADA requires planning, passive monitoring, intelligence gathering, active attacks and the use of alternative access methods. This students will understand vulnerabilities in SCADA software, devices and communication protocols . Details about dozens of SCADA and ICS vulnerabilities will be discussed in case studies with proof-of-concept exploit code.

SCADA Training course provides advanced SCADA technical overview of the emerging trends, advanced applications, operations, management and security.
SCADA Training course covers all aspects of Industrial Control System (ICS) security for several types of control systems including: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and Other control system configurations such as skid-mounted  Programmable Logic Controllers (PLC).
SCADA Characteristics,  Security Threats and  Vulnerabilities are discussed: Threats,  Potential SCADA Vulnerabilities,  Policy and Procedure Vulnerabilities, Platform Vulnerabilities and Network Vulnerabilities.


Learn how to develop a comprehensive SCADA security program:
·         Senior Management Buy-in
·         Build and Train a Cross-Functional Team
·         Define Charter and Scope
·         Define SCADA Specific Security Policies and Procedures
·         Define and Inventory SCADA Systems and Networks Assets
·         Perform Risk and Vulnerability Assessment
·         Define the Mitigation Controls
·         Provide Training and Raise Security Awareness

3 comments:

  1. Distributed Control Systems (DCS) CCTV Systems and Other control system configurations such as skid-mounted Programmable Logic Controllers (PLC).

    ReplyDelete
  2. Yes during the SCADA security and risk assessment, we will look at these issues

    ReplyDelete
  3. what are the differences between SCADA, ICS, DCS and PLC security? Very confusing. Please explain.

    ReplyDelete