Cybersecurity Awareness Training for Industrial Systems

Join the Program

https://www.engineeringtrainer.com/web/image/product.template/453/image_1920?unique=c4494cc

Virtual or Classroom
1/2 day training

Custom Scheduling
Ted Angevaare
INCO3511


Format: Instructor-led


Join the Program

To register multiple team-members at once, use the link below.

Need a dedicated version of this program for your team? Please contact us.

Course Objective

“To make people aware of potential attacks on their industrial systems, the associated trends, legislation, the chance that you are impacted, and what methods you can use to become more robust and resilient.

Private course for team

Custom scheduling

Industry Expert

On-site or virtual

1-year unlimited access

to up-to-date course materials

PDH Hours qualified course

Read more here

About the course


   In-Company

   Live sessions

   1/2 day training

   Custom

  English

   INCO3511

Industrial Automation is evolving and nowadays most companies use commercial off-the-shelf (COTS) computer systems, networks, and cloud applications to optimize production, reduce costs, improve uptime, and improve Process Safety. This is called the IIoT (Industrial Internet of Things) or Industry 4.0 and has been embraced by many because of its advantages.

Unfortunately, Industry 4.0 also creates a huge disadvantage: the OT-Cybersecurity threat. Malware, ransomware, and other hacking software, have been developed to attack systems, databases, and other private and governmental networks to steal information, corrupt information, hurt networks or create physical destruction. The number of cyber threats and thereby the likelihood of being a victim is growing exponentially.

This awareness training course introduces participants to the OT-Cybersecurity threat. The 3-hour course is split into two parts, first, the background and risks are explained. In the second part, the participants are shown the different approaches an organization can take to protect itself, with a focus on the correct working structure.

After the course, you maintain 1-year unlimited access to the online course material, including any new course material. This allows you to perform modules again should you need to refresh your knowledge.

 

Questions?  Contact us

  hello@engineeringtrainer.com

    +31 (0)85 058 0051
         Monday - Friday, 9am - 6pm CEST







Meet your instructor


 Ted Angevaare 

Ted Angevaare

Process Automation Expert and Owner of TAPS


OT Cybersecurity, Process Automation


TAPS logo 

Program & Details


  1. What is the OT-Cybersecurity threat? 

  2. How big is the issue in Dollar$?

  3. What are the trends of hacking and malware?

  4. What are the most successful attacks on the industry?

  5. What is happening in Industrial Automation and Industry 4.0?

  6. What is the chance that you are impacted by Malware or a Cyber-attack? 

  7. What are Governments doing?

  1. What is the Industry doing? 

  2. Why are End-Users slowly moving to protect themselves from Cyberattacks and malware? 

  3. Do End-Users require a new organisation? 

  4. What is required before you start a Security project? 

  5. How much should a company spend on Cybersecurity? 

  6. What can OT Security Engineers do to help? 

  7. What happens when less than the minimum will be implemented or when it takes too long to implement?

Results

After this course, you...

  • have a solid overview of the subject OT-Cybersecurity (also called Industrial Cybersecurity), having seen the importance of the subject, both financially as well as the possible impact.

  • have been provided with a list and summary of the most successful attacks

  • understand how to comply to new legislation and new International Standards have seen how the Industry reacting and understand why is the Industry, in general, slowly reacting to the new threat. 

  • understand the justification to start a project to make a company more robust and resilient against Cyber Attacks, doing nothing is not an option. 

  • have seen how to change your organisation to support this new threat and how detail a job description with the responsibility for OT-Cybersecurity. 

  • have been taken through a checklist of what Managers and Decision Makers, and Engineers can do to support and help.

Who should attend this course

  • Senior Managers and Decision Makers 

  • Process Automation Engineers of End-users 

  • IT Engineers and System Architects 

  • Operators of End-users 

  • Project Managers 

  • Cybersecurity Engineers 

  • Research Engineers of End-users 

  • Automation Engineers of Vendors 

  • Sales Engineers of Vendors

Prerequisites:

  • No experience is required, only a good understanding of your business and industry.

Level: Beginner


Live sessions

This course consists of instructor-led group sessions, these group sessions can be Virtual or Onsite. During these sessions participants can ask questions to the instructor which are discussed, as well as questions submitted beforehand in the learning portal.

After each live session used slides and exercise documents are made available to participants on the learning portal. Please note that for privacy reasons no recordings of the live sessions are made or provided. You receive 1-year unlimited access to the online course material. This allows you to watch content again if this is beneficial for your daily work activities and benefit from any material updates.

The live sessions are scheduled together with the customer and are private for their team only. 

Typically the training course would be scheduled as:

  • Virtual: 2 sessions of 90min each

  • Onsite: 1/2 day classroom session

After each live session used slides and exercise documents are made available to participants on the learning portal. Please note that for privacy reasons no recordings of the live sessions are made or provided. You receive 1-year unlimited access to the online course material. This allows you to watch content again if this is beneficial for your daily work activities and benefit from any material updates.

A personal digital certificate will be made available to each participant upon full attendance.


Example Certificate:


FAQ

This course consists of instructor-led live sessions which consist of presentations, demonstrations and discussions of questions. During each live session participants can ask questions to the instructor (through chat or microphone) which will be answered.

Please note that for privacy reasons no recordings of the live sessions are made or provided.

The training material used in the live sessions, for example the slides or exercises, will be available in the EngineeringTrainer portal for a year after the date of the training allowing you to refresh your knowledge or review material if needed. 

No, course content is not available for download.

The training material used in the sessions, for example the slides or exercises, will be available in the EngineeringTrainer portal for a year after the date of the training allowing you to refresh your knowledge or review material if needed. 

Please note that for privacy reasons no recordings of the live sessions are made or provided. 

Yes, interactive Q&A sessions are part of the live sessions in this course and allow you to interact with the instructor and ask questions.

To respect the privacy of the participants the live sessions will not be recorded, and as such the live sessions cannot be played back. Therefore it is important for all participants to block the time slots of the live sessions in their calendars and be present. 

No software licenses are provided as part of this course. 

Yes, this course qualifies for PDH hours as per the NCEES CPC Guidelines.

Want your team to be aware of cybersecurity risks?

Related Courses


Videos on YouTube


Subscribe & Follow

         

Questions? Contact Us


Luuk Hennen    
Product specialist

  hello@engineeringtrainer.com

   +31 (0)85 058 0051
        Monday - Friday, 9am-6pm CEST 

Recently viewed Products