Showing posts with label scada security training. Show all posts
Showing posts with label scada security training. Show all posts

Thursday, February 28, 2013

SCADA Training - Supervisory Control And Data Acquisition

Learn SCADA by attending SCADA Training Course at TONEX

SCADA (Supervisory Control And Data Acquisition) systems also known as  Industrial Control System (ICS) run mission critical infrastructure such as telecom, nuclear plants, manufacturing, oil and gas refining plants, wind and solar power generation, gas pipelines, power grid, water treatment, chemical manufacturing, airports, and transportation.


SCADA Training



The following is a list of the major control components of SCADA:

- Control Server. The control server hosts the DCS or PLC supervisory control software that is designed to communicate with lower-level control devices. The control server accesses subordinate control modules over an ICS network.

- SCADA Server or Master Terminal Unit (MTU) or Master Station. The SCADA Server is the device that acts as the master in a SCADA system. Remote terminal units and PLC devices (as described below) located at remote field sites usually act as slaves.

With SCADA systems, master station receives inputs from remote terminal units (RTU) that are connected to field instrumentation such as process ovens. When polled by the SCADA master, the RTUs transmit data to the central host for processing. SCADA software then logs alarms and displays the data graphically.

Our SCADA instructors have SCADA, SCADA security, Network Security and IT security expertise, a unique combination.

Saturday, February 2, 2013

SCADA Security Training - Supervisory control and data acquisition


Why should you choose TONEX for your SCADA Security Training?


SCADA (supervisory control and data acquisitionRisk Factors such as Standardized Protocols and Technologies, Connectivity,  Insecure and Rogue Connections, SCADA Public Information, SCADA Possible Incident Scenarios and Sources of Incidents are also discussed.
Attacking critical infrastructure control systems such as SCADA requires planning, passive monitoring, intelligence gathering, active attacks and the use of alternative access methods. This students will understand vulnerabilities in SCADA software, devices and communication protocols . Details about dozens of SCADA and ICS vulnerabilities will be discussed in case studies with proof-of-concept exploit code.

SCADA Training course provides advanced SCADA technical overview of the emerging trends, advanced applications, operations, management and security.
SCADA Training course covers all aspects of Industrial Control System (ICS) security for several types of control systems including: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and Other control system configurations such as skid-mounted  Programmable Logic Controllers (PLC).
SCADA Characteristics,  Security Threats and  Vulnerabilities are discussed: Threats,  Potential SCADA Vulnerabilities,  Policy and Procedure Vulnerabilities, Platform Vulnerabilities and Network Vulnerabilities.


Learn how to develop a comprehensive SCADA security program:
·         Senior Management Buy-in
·         Build and Train a Cross-Functional Team
·         Define Charter and Scope
·         Define SCADA Specific Security Policies and Procedures
·         Define and Inventory SCADA Systems and Networks Assets
·         Perform Risk and Vulnerability Assessment
·         Define the Mitigation Controls
·         Provide Training and Raise Security Awareness