Formation EC-Council ICS/SCADA Cybersecurity (2024)

  • Référence EICS-SCADA
  • Durée 3 jour(s)

Modalité pédagogique

  • Toutes
  • Classe inter à distance
  • Classe inter en présentiel

Classe inter à distance Prix

EUR2590,00

hors TVA

Demander une formation en intra-entreprise

S'inscrire

Aller à:

  • Résumé
  • Prochaines dates
  • Public
  • Programme détaillé
  • Pré-requis
  • Bon à savoir

Modalité pédagogique

La formation est disponible dans les formats suivants:

Demander cette formation dans un format différent

Résumé

Haut de page

Le cours ICS/SCADA Cybersecurity est un module de formation pratique qui enseigne les bases de la sécurité et de la défense des architectures réseau contre les attaques. Les participants apprendront à penser comme un pirate informatique malveillant pour défendre leurs organisations.

ICS/SCADA enseigne des méthodes puissantes pour analyser les risques possédés par l'infrastructure réseau dans les espaces informatiques et d'entreprise. Une fois queles concepts de base sont clairs, vous apprendrez un processus systématique d'analyse des intrusions et des logiciels malveillants. Après cela, vous découvrirez le processus d'investigation numérique et les techniques de réponse aux incidents lors de la détection d'une violation.

Cette formation interactive peut être suivie depuis n'importe quel site, votre bureau ou votre domicile.Global Knowledge vous enverra toutes les informations nécessaires avant le début du cours et vous pourrez tester les connexions.

Mise à jour : 03.03.2023

Prochaines dates

Haut de page

Contactez-nous pour les dates

Demander une formation en intra-entreprise Plus de dates dans d'autres pays

Autre sessions en cours de chargement

Public

Haut de page

This course is designed for IT professionals who manage or direct their organization’s IT infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

- SCADA Systems personnel.

- Business System Analysts who support SCADA interfaces.

- System Administrators, Engineers, and other IT professionals who are administering, patching, securing SCADA, and/or ICS.

- Security Consultants who are performing security assessments of SCADA and/or ICS.

Plus...

Programme détaillé

Haut de page

Module 1: Introduction to ICS/SCADA Network Defense

  • IT Security Model
  • ICS/SCADA Security Model

LAB: Security Model

  • Security Posture
  • Risk Management in ICS/SCADA
  • Risk Assessment
  • Defining Types of Risk
  • Security Policy

LAB: Allowing a Service

Module 2: TCP/IP 101

  • Introduction and Overview
  • Introducing TCP/IP Networks
  • Internet RFCs and STDs
  • TCP/IP Protocol Architecture
  • Protocol Layering Concepts
  • TCP/IP Layering
  • Components of TCP/IP Networks
  • ICS/SCADA Protocols

Module 3: Introduction to Hacking

  • Review of the Hacking Process
  • Hacking Methodology
  • Intelligence Gathering
  • Footprinting
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • Covering Tracks

LAB: Hacking ICS/SCADA Networks Protocols

  • How ICS/SCADA Are Targeted
  • Study of ICS/SCADA Attacks
  • ICS/SCADA as a High–Value Target
  • Attack Methodologies In ICS

Module 4: Vulnerability Management

  • Challenges of Vulnerability Assessment
  • System Vulnerabilities
  • Desktop Vulnerabilities
  • ICS/SCADA Vulnerabilities
  • Interpreting Advisory Notices
  • CVE
  • ICS/SCADA Vulnerability Sites
  • Life Cycle of a Vulnerability and Exploit
  • Challenges of Zero-Day Vulnerability
  • Exploitation of a Vulnerability
  • Vulnerability Scanners
  • ICS/SCADA Vulnerability Uniqueness
  • Challenges of Vulnerability Management Within ICS/SCADA

LAB: Vulnerability Assessment

  • Prioritizing Vulnerabilities
  • CVSS
  • OVAL

Module 5: Standards and Regulations for Cybersecurity

  • ISO 27001
  • ICS/SCADA
  • NERC CIP
  • CFATS
  • ISA99
  • IEC 62443
  • NIST SP 800-82

Module 6: Securing the ICS network

  • Physical Security
  • Establishing Policy – ISO Roadmap
  • Securing the Protocols Unique to the ICS
  • Performing a Vulnerability Assessment
  • Selecting and Applying Controls to Mitigate Risk
  • Monitoring
  • Mitigating the Risk of Legacy Machines

Module 7: Bridging the Air Gap

  • Do You Really Want to Do This?
  • Advantages and Disadvantages
  • Guard
  • Data Diode
  • Next Generation Firewalls

Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

  • What IDS Can and Cannot Do
  • Types IDS
  • Network
  • Host
  • Network Node
  • Advantages of IDS
  • Limitations of IDS
  • Stealthing the IDS
  • Detecting Intrusions

LAB: Intrusion Detection

  • Log Analysis
  • ICS Malware Analysis

LAB: ICS Malware Analysis

  • Essential Malware Mitigation Techniques
  • ICS/SCADA Network Monitoring
  • ICS/SCADA IDS
Plus...

Pré-requis

Haut de page
  • Linux operating system fundamentals, including basic command line usage.
  • Conceptual knowledge of programming/scripting.
  • Solid grasp of essential networking concepts (OSI model, TCP/IP, networking devices, and transmission media).
  • Understanding of basic security concepts (e.g., malware, intrusion detection systems, firewalls, and vulnerabilities).
  • Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.
Plus...

Bon à savoir

Haut de page

The EC-Council Advantage

With EC-Council, you’ll get a chance to learn ICS/SCADA from industry experts. The training program is spearheaded by renowned SCADA expert, Kevin Cardwell. EC-Council’s SCADA training uses multimedia learning with interactive formats such as lectures, illustrations, and simulations.

Apart from this, the training program is interactive, and the learning module is activity-focused, which is helpful for skill development.

Plus...
  • <table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Délais d’inscription</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">Avant le début de la formation&nbsp;<strong>jusqu’à 5 jours ouvrés&nbsp;sous réserve de disponibilité. </strong>Dans le cas d’une formation finançable par votre <a style="display: inline;" href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-style="display: inline;">CPF,</a> jusqu’à 11 jours ouvrés avant le début de la formation. <a style="display: inline;" href="mailto:cpf@globalknowledge.fr" data-mce-href="mailto:cpf@globalknowledge.fr" data-mce-style="display: inline;">Contactez-nous</a> pour connaître les formations éligibles.</p></td></tr></tbody></table><p><br /></p>
  • <p><br /></p><table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Modalité d'évaluation</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">A l'issue de la formation, le participant est invité à s’auto-évaluer par rapport aux objectifs énoncés.</p></td></tr></tbody></table>
  • /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/reviews/fr-global-review-q1-q2-fy25.png #000000
  • #000000
  • #000000
  • EICS-SCADA
  • Le cours ICS/SCADA Cybersecurity est un module de formation pratique qui enseigne les bases de la sécurité et de la défense des architectures réseau contre les attaques. Les participants apprendront à penser comme un pirate informatique malveillant pour défendre leurs organisations.
  • Formation EC-Council ICS/SCADA Cybersecurity
  • EC-Council ICS/SCADA Cybersecurity + Voucher d'examen
  • Cybersecurity Operations
  • Formation EC-Council ICS/SCADA Cybersecurity
  • EC-Council
Formation EC-Council ICS/SCADA Cybersecurity (2024)

FAQs

What is EC-Council cyber security? ›

International Council of E-Commerce Consultants, also known as EC-Council, is the world's largest cyber security technical certification body.

What is an ICS in cyber security? ›

Industrial control system (ICS) security focuses on ensuring the security and safe function of industrial control systems. This includes the hardware and software the system and its operators use.

What is the best ICS certification for cybersecurity? ›

International Society of Automation (ISA)

This one of the most popular certificate course provider for ICS/OT Cybersecurity skills. Their training is totally based on IEC/ISA 62443 standard and has total Four certificates. A fundamental Specialist is must to pursue any of the three specialization certificate.

What is ICS and SCADA? ›

ICS refers to integrated hardware and software designed to monitor and control industrial processes. SCADA is a type of ICS focused on real-time data collection and process control, often in large-scale operations.

Is EC-Council worth IT? ›

EC-Council certifications are typically a must have for you to take up positions in cybersecurity and ethical hacking. This makes them a valuable asset if you are pursuing a career in these fields. CompTIA certifications are not as specialized, but they are popular in the IT industry.

Which is better CompTIA or EC-Council? ›

CompTIA's Security+ certification is a good starting point for foundational knowledge, while EC-Council's CEH is a more advanced option focusing on ethical hacking skills. Choose based on your career goals.

What is SCADA in cyber security? ›

A supervisory control and data acquisition system involves monitoring and controlling processes from a central location. The system is intended for remote monitoring and management of complex processes, making it susceptible to ransomware, malware and other cyberthreats.

What is ICS SCADA Cyber security Essentials? ›

The ICS/SCADA Cyber Security Training Course is a hands-on training that teaches the foundation of security and defending architectures from attacks. Students will learn to think like a hacker to protect their organizations from attacks commonly conducted against ICSs.

What protocols are used in SCADA security? ›

Protocols for Secure SCADA Communication

SCADA systems rely on secure communication protocols. Some of these include DNP3, IEC 60870-5-101, and IEC 60870-5-104. These protocols help protect critical infrastructure. They use encryption, authentication, and data integrity methods to secure communication channels.

What is the hardest certification in cyber security? ›

The Global Information Assurance Certification (GIAC) Information Security Fundamentals (GISF) is among the toughest cybersecurity certifications. The reason for this is that it covers quite an extensive material. The exam is also quite difficult, and it requires a high level of professional conduct.

What is the highest paying cyber security certification? ›

Certified Information Systems Security Professional (CISSP)

What is the strongest cybersecurity certificate? ›

The best certifications for cybersecurity professionals include credentials from ISACA, ISC2, CompTIA, AWS, GIAC, EC-Council and Google. These organizations offer credentials to suit security and IT professionals with varying experience levels and professional specializations.

What is ICS in cyber security? ›

ICS security, short for Industrial Control System security, is a specialized branch of cybersecurity focused on protecting the critical systems that control and monitor industrial processes.

What are the critical elements for an ICS SCADA security program? ›

Key components of ICS and SCADA security include network segmentation, regular patch management, strong authentication, and continuous monitoring. For example, using firewalls to segment network traffic and updating software to protect against known vulnerabilities.

What is considered SCADA? ›

SCADA is the acronym for Supervisory Control and Data Acquisition. SCADA is a computer-based system for gathering and analyzing real-time data to monitor and control equipment that deals with critical and time-sensitive materials or events.

Why does EC-Council have a bad reputation? ›

The lack of commitment to professional and ethical standards in content marketing, as highlighted by plagiarism accusations, has further strained the organisation's reputation. The outcry from industry professionals has put the EC-Council under scrutiny.

What is EC in security? ›

EC-Council is a global leader in cybersecurity certification programs, providing training and certification in areas such as ethical hacking, network defense, and penetration testing. They offer certifications like Certified Ethical Hacker , Certified Network Defender , and Certified Security Analyst (ECSA).

What is ECE in cyber security? ›

Recognizing the urgent need for expertise in this critical domain, the Department of Electrical and Computer Engineering (ECE) offers a comprehensive 12-credit graduate certificate program in Cybersecurity.

What is CEH in cyber security? ›

Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the ...

Top Articles
Harris sees opening in Vance pick as she considers her own choice for vice president | CNN Politics
Top 70 Best Manga Panels That Will Make You Stare
Moonrise Tonight Near Me
Non-Identity Functions
Understanding Filmyzilla - A Comprehensive Guide to Movies
Munsif Epaper Urdu Daily Online Today
0.0Gomovies
Kcrubicon
Job Shop Hearthside Schedule
Pga Us Open Leaderboard Espn
Adt First Responder Discount
Old Navy Student Discount Unidays
C.J. Stroud und Bryce Young: Zwei völlig unterschiedliche Geschichten
Apple Nails & Spa, 3429 Toringdon Way, Charlotte, Reviews and Appointments
Rocky Bfb Asset
Craigslist Siloam Springs
Sitel Group®, leader mondial de l’expérience client, accélère sa transformation et devient Foundever®
Les Schwab Product Code Lookup
Somewhere In Queens Showtimes Near The Maple Theater
Atl To London Google Flights
Iowa Image Trend
Hotleak.vip
What Times What Equals 82
When modern Eurasia was born: Genetics yield clues to origins of Eurasians
Names of the dead: September 11, 2001
Walgreens Shopper Says Staff “Threatened” And “Stalked” Her After She Violated The “Dress Code”
All Obituaries | Dante Jelks Funeral Home LLC. | Birmingham AL funeral home and cremation Gadsden AL funeral home and cremation
Midsommar 123 Movies
Bfri Forum
Forum Train Europe FTE on LinkedIn: #freight #traffic #timetablingeurope #fted
Weer Maasbracht - Vandaag - Morgen - 14 dagen
Algebra 1 Unit 1 Interactive Notebook Pages – The Foundations of Algebra
Craftybase Coupon
Foreign Languages Building
In Branch Chase Atm Near Me
Antique Wedding Favors
Meaty Sugar Lump
Dr Yakubu Riverview
Live Gold Spot Price Chart | BullionVault
9 best hotels in Atlanta to check out in 2023 - The Points Guy
Ice Quartz Osrs
Liv Morgan Wedgie
Spearmint Rhino Coi Roll Call
Make An Appointment Att
Sayuri Pilkey
Cvs Pharmacy Tb Test
Vegan Eggplant Parmesan
Exposedrealfun Collage
Who To Start for Fantasy Football Friday Night Football: Week 1 (2024)
2024 USAF & USSF Almanac: DAF Personnel | Air & Space Forces Magazine
Gatlinburg SkyBridge: Is It Worth the Trip? An In-Depth Review - Travel To Gatlinburg
Lubbock Avalanche Journal Newspaper Obituaries
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 6003

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.