Cybersecurity Awareness Training for Industrial Systems
Join the Program
Virtual or Classroom
1/2 day training
Registration deadline: 15 July 2024
Custom Scheduling
Ted Angevaare
INCO3511
Format:
Instructor-led
Join the Program
To register multiple team-members at once, use the link below.
Need a dedicated version of this program for your team? Please contact us.
Course Objective
“To make people aware of potential attacks on their industrial systems, the associated trends, legislation, the chance that you are impacted, and what methods you can use to become more robust and resilient.”
Private course for team
Custom scheduling
Industry Expert
On-site or virtual
1-year unlimited access
to up-to-date course materials
PDH Hours qualified course
Read more here
About the course
In-Company
Live sessions
1/2 day training
Custom
English
INCO3511
Industrial Automation is evolving and nowadays most companies use commercial off-the-shelf (COTS) computer systems, networks, and cloud applications to optimize production, reduce costs, improve uptime, and improve Process Safety. This is called the IIoT (Industrial Internet of Things) or Industry 4.0 and has been embraced by many because of its advantages.
Unfortunately, Industry 4.0 also creates a huge disadvantage: the OT-Cybersecurity threat. Malware, ransomware, and other hacking software, have been developed to attack systems, databases, and other private and governmental networks to steal information, corrupt information, hurt networks or create physical destruction. The number of cyber threats and thereby the likelihood of being a victim is growing exponentially.
This awareness training course introduces participants to the OT-Cybersecurity threat. The 3-hour course is split into two parts, first, the background and risks are explained. In the second part, the participants are shown the different approaches an organization can take to protect itself, with a focus on the correct working structure.
After the course, you maintain 1-year unlimited access to the online course material, including any new course material. This allows you to perform modules again should you need to refresh your knowledge.
Questions? Contact us
hello@engineeringtrainer.com
+31 (0)85 058 0051
Monday - Friday, 9am - 6pm CEST
Meet your instructor
Program & Details
What is the OT-Cybersecurity threat?
How big is the issue in Dollar$?
What are the trends of hacking and malware?
What are the most successful attacks on the industry?
What is happening in Industrial Automation and Industry 4.0?
What is the chance that you are impacted by Malware or a Cyber-attack?
What are Governments doing?
What is the Industry doing?
Why are End-Users slowly moving to protect themselves from Cyberattacks and malware?
Do End-Users require a new organisation?
What is required before you start a Security project?
How much should a company spend on Cybersecurity?
What can OT Security Engineers do to help?
What happens when less than the minimum will be implemented or when it takes too long to implement?
Results
After this course, you...
have a solid overview of the subject OT-Cybersecurity (also called Industrial Cybersecurity), having seen the importance of the subject, both financially as well as the possible impact.
have been provided with a list and summary of the most successful attacks
understand how to comply to new legislation and new International Standards have seen how the Industry reacting and understand why is the Industry, in general, slowly reacting to the new threat.
understand the justification to start a project to make a company more robust and resilient against Cyber Attacks, doing nothing is not an option.
have seen how to change your organisation to support this new threat and how detail a job description with the responsibility for OT-Cybersecurity.
have been taken through a checklist of what Managers and Decision Makers, and Engineers can do to support and help.
Who should attend this course
Senior Managers and Decision Makers
Process Automation Engineers of End-users
IT Engineers and System Architects
Operators of End-users
Project Managers
Cybersecurity Engineers
Research Engineers of End-users
Automation Engineers of Vendors
Sales Engineers of Vendors
Prerequisites:
No experience is required, only a good understanding of your business and industry.
Level: Beginner
Live sessions
This course consists of instructor-led group sessions, these group sessions can be Virtual or Onsite. During these sessions participants can ask questions to the instructor which are discussed, as well as questions submitted beforehand in the learning portal.
After each live session used slides and exercise documents are made available to participants on the learning portal. Please note that for privacy reasons no recordings of the live sessions are made or provided. You receive 1-year unlimited access to the online course material. This allows you to watch content again if this is beneficial for your daily work activities and benefit from any material updates.
The live sessions are scheduled together with the customer and are private for their team only.
Typically the training course would be scheduled as:
Virtual: 2 sessions of 90min each
Onsite: 1/2 day classroom session
After each live session used slides and exercise documents are made available to participants on the learning portal. Please note that for privacy reasons no recordings of the live sessions are made or provided. You receive 1-year unlimited access to the online course material. This allows you to watch content again if this is beneficial for your daily work activities and benefit from any material updates.
A personal digital certificate will be made available to each participant upon full attendance.
Example Certificate:
FAQ
This course consists of instructor-led live sessions which consist of presentations, demonstrations and discussions of questions. During each live session participants can ask questions to the instructor (through chat or microphone) which will be answered.
Please note that for privacy reasons no recordings of the live sessions are made or provided.
The training material used in the live sessions, for example the slides or exercises, will be available in the EngineeringTrainer portal for a year after the date of the training allowing you to refresh your knowledge or review material if needed.
No, course content is not available for download.
The training material used in the sessions, for example the slides or exercises, will be available in the EngineeringTrainer portal for a year after the date of the training allowing you to refresh your knowledge or review material if needed.
Please note that for privacy reasons no recordings of the live sessions are made or provided.
Yes, interactive Q&A sessions are part of the live sessions in this course and allow you to interact with the instructor and ask questions.
To respect the privacy of the participants the live sessions will not be recorded, and as such the live sessions cannot be played back. Therefore it is important for all participants to block the time slots of the live sessions in their calendars and be present.
No software licenses are provided as part of this course.
Yes, this course qualifies for PDH hours as per the NCEES CPC Guidelines.
Want your team to be aware of cybersecurity risks?
Related Courses
Virtual or Classroom upon request
Industrial Automation System Architecture and OT Cybersecurity