IAAE Logo

Course 6

OT Cybersecurity

(5 MODULES)

Register and Pay for Course

"*" indicates required fields

Name*
Credit Card
American Express
Discover
MasterCard
Visa
Supported Credit Cards: American Express, Discover, MasterCard, Visa
Expiration Date
 

Course 6 Overview

This online course consists of five modules as described and illustrated below.

Module 1: IT and OT Networks

Module 1

This module aims to provide a clear understanding of the comparisons and contrasts between IT and OT.

Participants will identify both the physical and digital connections between a network, while understanding the security threats, with an emphasis on OT.

  1. Define and contrast IT systems and OT systems.
  2. Define and contrast IT networks and OT networks.
  3. Compare and contrast both IT networks and OT networks.
  4. Define and explain IP naming, as well as Static and Dynamic referencing.
  5. Label and explain terms, servers, ports, communication pathways, LANs and VLANs.
  6. Demonstrate an understanding of the significance of above concepts in the context of OT Security.

Module 2: Network Segmentation

Module 2

This module aims to provide a clear understanding of network segmentation and firewalls.

Participants will identify the principles of OT segmentation and OT applications in segments and gain an understanding of network zones and different segmentation approaches, both their advantages and disadvantages.

  1. Define Network Segmentation in a conceptual model 
  2. Explain the benefits and challenges of segmentation 
  3. Explain the concept of firewalls 
  4. Understand general OT security principles 
  5. Understand OT application security principles 
  6. How nodes can be seen or not seen
  7. Explain how networks can be segmented
  8. Define ways that IT and OT networks can be segmented and their advantages and disadvantages

Module 3: Removable Media

Module 3

This module aims to provide a clear understanding of Removable Media Management. During this module we will define and identify the types of removal media.

Progression through this module will introduce the usage, storage and transport of Removable Media. We will also examine viruses and their potential impact in loss or theft of data in removable media.

  1. Compare and contrast removable media in an operational technology environment relating to business technology 
  2. Understand the usage, storage and transport requirements for removable media in an operational technology (OT) environment  
  3. Explain how viruses and other malicious software can be introduced to the OT environment via removable storage devices and media 
  4. Classify examples of removable media management that can lead to either loss or theft of data

Module 4: Portable Device Management

Module 4

This module will provide a clear understanding of Portable Device Management by demonstrating general physical and digital security techniques to protect Portable devices. 

Participants will gain an understanding of how portable devices are necessary to minimize cyber security risk to the OT environment. 

To ensure precautionary measures against Cybersecurity threats, we will also examine viruses and their potential impact in loss or theft of data in Portable Devices.

  1. Understand how portable devices may lead to loss or theft of data
  2. List the typical requirements of a corporate OT Security standard
  3. Define how portable devices need to be used to minimize cyber security risk to the OT environment
  4. Classify examples of portable device management that can lead to either loss or theft of data

Module 5: Management of OT VLANs and IP Addressing

Module 5

This module will provide a clear understanding of OT VLANs by demonstrating their benefits to the work process and the overall need for OT VLANs. 

Participants will gain an understanding of IP addressing through analysis of IP Subnet Ranges, Default Gateways, and Subnet Masks.

We will also detail the key role responsibilities within the workflow for the creation, modification and deletion of VLAN in an OT Infrastructure.

A hands-on activity allows participants to test the VLAN environment and implement learned skills.

  1. Explain Virtual Local Area Network.
  2. Explain IP subnet ranges, range sizing, default gateway and subnet mask.
  3. Review the process workflow .
  4. Define the key role responsibilities within the workflow for the creation/modification/deletion of VLAN in an OT Infrastructure.
  5. Sort typical tasks into the VLAN requester role and OT Design Team role.
  6. Understand the components of a VLAN request form and which fields need to be entered or are automatically populated.
  7. Populate an example VLAN request form for a given system design example.