Cybersecurity Training

Similar documents
Cybersecurity Training

Industrial Communications Training

Industrial Security Solutions

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Network Security Administrator

Cisco Advanced Services for Network Security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Which cybersecurity standard is most relevant for a water utility?

Networking (Exploration 1)

Redesigning automation network security

Using ISA/IEC Standards to Improve Control System Security

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Symphony Plus Cyber security for the power and water industries

IT Security and OT Security. Understanding the Challenges

This is a preview - click here to buy the full publication

CompTIA Network+ (Exam N10-005)

Innovative Defense Strategies for Securing SCADA & Control Systems

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

Session 14: Functional Security in a Process Environment

Protecting productivity with Plant Security Services

Cyber Security for NERC CIP Version 5 Compliance

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

CYBER SECURITY. Is your Industrial Control System prepared?

Principles of Information Assurance Syllabus

Four Top Emagined Security Services

Remote Maintenance with Security Appliances FL MGuard RS2000 and RS4000. Economic and Reliable Service

Document ID. Cyber security for substation automation products and systems

Three Simple Steps to SCADA Systems Security

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines

Course Outline. ttttttt

Industrial Security for Process Automation

DeltaV System Cyber-Security

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Remote Services. Managing Open Systems with Remote Services

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

CyberNEXS Global Services

Plant Maintenance Training

Check Point Security Administrator R70

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Payment Card Industry Data Security Standard

A Systems Approach to HVAC Contractor Security

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

Are you prepared to be next? Invensys Cyber Security

Fundamentals of a Windows Server Infrastructure MOC 10967

How To Secure Your System From Cyber Attacks

Scalable Secure Remote Access Solutions for OEMs

Analyze. Secure. Defend. Do you hold ECSA credential?

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

EC-Council Certified Security Analyst (ECSA)

SCADA Security Training

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

NETWORK SECURITY (W/LAB) Course Syllabus

Network and Security Controls

Implementing Cisco IOS Network Security v2.0 (IINS)

IoT & SCADA Cyber Security Services

Bellevue University Cybersecurity Programs & Courses

CNE Network Assessment

Understanding SCADA System Security Vulnerabilities

White Paper. Information Security -- Network Assessment

The rocky relationship between safety and security

Sample Career Ladder/Lattice for Information Technology

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Does Aligning Cyber Security and Process Safety Reduce Risk?

Hackers are here. Where are you?

White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012

Performing a Cybersecurity Risk Assessment on an IACS or SIS. Marco Ayala, aesolutions John Cusimano, aesolutions

S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a t i o n a l i n t e g r i t y R A H U L G U P TA

Update On Smart Grid Cyber Security

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

Defending Against Data Beaches: Internal Controls for Cybersecurity

ICANWK406A Install, configure and test network security

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Computer System Security Updates

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

MCSA: Windows Server 2008

CCNA Security 2.0 Scope and Sequence

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Transcription:

Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn

Expert-led training with real-world application from a global leader in industrial cybersecurity Given the increasing reliance on open standards and interconnectivity in industrial networks and control systems, the risks of cyberattack are growing and present serious threats to economic and national security. Large-scale cyberwarfare through acts of espionage, sabotage, and terrorism could dismantle a nations power grids, transportation and telecommunications systems, financial networks, manufacturing, and government functions. As a widely recognized, world leader in cybersecurity standards development and training, the International Society of Automation (ISA) provides the proven expertise and know-how to help safeguard industrial automation and control systems. As an example, the US government is looking to integrate ISA s industrial automation and control systems standards (ANSI/ISA-62443) as part of its national cybersecurity initiative. ISA s world-renowned cybersecurity experts provide the comprehensive, practical instruction needed to immediately apply your knowledge in the workplace, and through a wide variety of learning formats: One-day classroom courses Multi-day classroom courses Multi-week, online, instructor-assisted courses Live webinars Pre-recorded webinars In addition, to ensure flexibility and to meet varying customer needs, ISA offers cybersecurity training at a variety of locations: at ISA headquarters in North Carolina, at ISA s many regional training centers, and onsite directly at customer facilities. Who is ISA? Founded in 1945, ISA is a global organization that serves automation and control professionals through standards development, certification, education, training, publishing, and technical conferences and events. To learn more about ISA, visit www.isa.org/cybetrn. ISA Training: World-class subject-matter expertise ISA s courses are known and respected worldwide for their unbiased, practical approach to technology application. For more than 65 years, ISA has built on its proven track record of identifying the real-world training needs of organizations and automation and control professionals, and working with leading content experts to deliver rapid, customized solutions. Taking an ISA training course will: Enhance on-the-job training Fill in missing knowledge gaps Teach you the Hows and Whys Provide continuing education credits Expand your professional network Table of Contents ISA99/IEC 62443 Cybersecurity Certificate Programs 3 Using the ANSI/ISA-62443 Standards to Secure Your Control System (IC32) 4 Cybersecurity for Automation, Control, and SCADA Systems (IC32E) 5 Assessing the Cybersecurity of New or Existing IACS Systems (IC33) NEW! 6 IACS Cybersecurity Design & Implementation (IC34) NEW! 7 IACS Cybersecurity Operations & Maintenance (IC37) NEW! 8 Industrial Networking and Security (TS12) 9 Advanced Industrial Networking and Cyber Security (TS20) NEW! 10 Control Systems Security and ANSI/ISA-62443 Webinar Series 11

ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate Program ISA has developed a knowledge-based certificate recognition program designed for professionals involved in IT and control system security roles that need to develop a command of industrial cybersecurity terminology and an understanding of the material embedded in the ISA99/IEC 62443 standards: PROGRAM REQUIREMENTS ISA99/IEC 62443 Cybersecurity Fundamentals Specialist designations and certificates will be awarded to individuals who meet the following program requirements: Successfully complete an intensive two-day, classroom training course from ISA: Using the ANSI/ISA-62443 Standards to Secure Your Industrial Control System (IC32) course information listed on the next page. Earn a passing score on the 75-question multiple-choice exam. PROGRAM PRE-REQUISITES There are no required prerequisites for this program; however, it is highly recommended that applicants have: Three to five years of experience in the IT cybersecurity field with some experience in an industrial setting with at least two years specifically in a process control engineering setting Some level of knowledge or exposure to the ANSI/ISA-62443 standards RENEWAL Because these are certificates and not certifications, they do not have to be renewed ; however, a certificate will only be considered current for three years. In order to extend the current status of a certificate, you will be required to score 70% or above on a 20-question ISA999/IEC 62443 Certificate Knowledge Review Exam. COMING SOON! In addition to ISA s Fundamentals Specialist certificate above, watch for information on subsequent courses and related exams in our cyber security suite of certificate programming. Knowledge/skills topic areas covered will include: Certificate 2: Risk Assessment Certificate 3: Design Certificate 4: Maintenance Learn more about this certificate program, eligibility criteria, renewal, and upcoming courses at www.isa.org/isa99certificate. 3

Using the ANSI/ISA-62443 Standards to Secure Your Control System The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA-62443 standards can be used to protect your critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. Discuss the principles behind creating an effective long-term security program Interpret the ANSI/ISA-62443 industrial security guidelines and apply them to your operation Explain the concepts of defense-in-depth, zone, and conduit models of security Analyze the trends in industrial system security incidents and methods hackers use to attack Define the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks And more YOU WILL COVER: How Cyberattacks Happen Creating A Security Program Risk Analysis Addressing Risk Monitoring and Improving the CSMS And more CLASSROOM/LABORATORY EXERCISES: Develop a business case for industrial security Conduct security threat analysis Investigate scanning and protocol analysis tools Apply basic security analysis tools software Required for ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate Program (See page 3.) Course No.: IC32 Length: 2 Days CEUs: 1.4 Price: $1,265 ISA Member/Group Rate $1,425 Affiliate Member $1,585 Community Member/List $1,265 Multi-Registration Rate Includes ISA Standards and Technical Reports: ANSI/ISA-62443-1-1 (99.00.01)-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA-62443-2-1 (99.02.01)-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA-62443-3-3 (99.03.03)-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) Recommended Resource: ISA Text: Industrial Network Security by David J. Teumin 2015 SCHEDULE Research Triangle Park, NC 13 14 August Cerritos, CA 1 2 April Part of ISA s Technical Training Camp Denver, CO 30 31 March Houston, TX 29 30 June; 1 2 October Philadelphia, PA 30 August 1 September Atlanta, GA 7 8 December 4

Cybersecurity for Automation, Control, and SCADA Systems (Online) The move to using open standards such as Ethernet, TCP/IP, and web technologies in supervisory control and data acquisition (SCADA) systems and process control networks has begun to expose these systems to the same cyberattacks that have wreaked so much havoc on corporate information systems. This course provides a detailed look at how the ANSI/ISA-62443 standards can be used to protect your critical control systems. You will also explore the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. Identify the principles behind creating an effective long-term security program Interpret the ANSI/ISA-62443 industrial security guidelines and apply them to your operation Learn the basics of risk and vulnerability analysis methodologies Explain the principles of security policy development Define the concepts of defense-in-depth, zone, and conduit models of security Analyze the trends in industrial system security incidents and methods hackers use to attack Identify the principles behind the key risk mitigation techniques, including anti-virus and patch management, firewalls, and virtual private networks YOU WILL COVER: Week 1/Module 1: Defining Industrial Cybersecurity Week 2/Module 2: Risk Assessment Week 3/Module 3: Threats and Vulnerabilities Week 4/Module 4: Security Policies, Programs, and Procedures Week 5/Module 5: Understanding TCP/IP, Hackers, and Malware Week 6/Module 6: Technical Countermeasures Week 7/Module 7: Architectural and Operational Strategies Week 8: Final Course Examination COURSE MATERIALS: Course Noteset and Syllabus ISA Standards and Technical Reports: ANSI/ISA-62443-1-1 (99.00.01)-2007: Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models (A $155 Value!) ANSI/ISA-62443-2-1 (99.02.01)-2009: Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program (A $215 Value!) ANSI/ISA-62443-3-3 (99.03.03)-2013: Security for Industrial Automation and Control Systems Part 3-3: System Security Requirements and Security Levels (A $260 Value!) Recommended Resource: ISA Text: Industrial Network Security by David J. Teumin Course No.: IC32E Length: 8 Weeks CEUs: 1.4 Price: $1,265 ISA Member/Group Rate $1,425 Affiliate Member $1,585 Community Member/List $1,265 Multi-Registration Rate Required for ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate Program (See page 3.) 2015 SCHEDULE Online...6 April 29 May; 20 July 11 September; 21 September 13 November 5

Assessing the Cybersecurity of New or Existing IACS Systems Part of the ISA s Cybersecurity Certificate Program The first phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) is to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment in order to identify and understand the high-risk vulnerabilities that require mitigation. Per ISA 62443-2-1 these assessments need to be performed on both new (i.e. greenfield) and existing (i.e. brownfield) applications. Part of the assessment process involves developing a zone and conduit model of the system, identifying security level targets, and documenting the cybersecurity requirements into a cybersecurity requirements specification (CRS). This course will provide students with the information and skills to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the cybersecurity requirements the project. Identify and document the scope of the IACS under assessment Specify, gather or generate the cybersecurity information required to perform the assessment Identify or discover cybersecurity vulnerabilities inherent in the IACS products or system design Interpret the results of a process hazard analysis (PHA) Organize and facilitate a cybersecurity risk assessment for an IACS Identify and evaluate realistic threat scenarios Identify and assess the effectiveness of existing countermeasures Identify gaps in existing policies, procedures and standards Evaluate the cost, complexity and effectiveness of new countermeasures in order to make meaningful recommendations Establish and document security zones and conduits Develop a cybersecurity requirements specification (CRS) CLASSROOM/LABORATORY EXERCISES: Performing an IACS asset criticality assessment Critiquing system architecture diagrams Developing a data flow diagrams Researching IACS vulnerabilities Using vulnerability scanning tools Cybersecurity Risk Assessment Exercise Creating a zone & conduit diagram Critiquing a cybersecurity requirements specification Developing a cybersecurity test specification WHO SHOULD ATTEND: Control systems engineers and managers System Integrators IT engineers and managers industrial facilities IT corporate/security professionals Plant Safety and Risk Management RECOMMENDED PRE-REQUISITE: ISA Course IC32 or equivalent knowledge/ experience. Course No.: IC33 Length: 3 days CEUs: 2.1 Price: $1,485 ISA Member/Group Rate $1,770 Affiliate Member $1,855 Community Member/List $1,485 Multi-Registration Rate 2015 SCHEDULE Coming Soon! No dates are currently scheduled for this course offering. 6

IACS Cybersecurity Design & Implementation Part of the ISA s Cybersecurity Certificate Program The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This involves the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the Assess phase. This phase also includes cybersecurity acceptance testing of the integrated solution, in order to validate countermeasures are properly implemented and that the IACS has achieved the target security level. This course will provide students with the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification. Interpret the results of an ICS cybersecurity risk assessment Interpret a cybersecurity requirements specification (CRS) Develop a conceptual design based upon information in a well-crafted CRS Explain the security development lifecycle process and deliverables Perform a basic firewall configuration and commissioning Design a secure remote access solution Develop system hardening design specification Implement a basic network intrusion detection system Develop a Cybersecurity Acceptance test plan (CFAT/CSAT) Perform a basic CFAT or CSAT YOU WILL COVER: Introduction to the ICS Cybersecurity Lifecycle Assessment phase Implementation phase Maintenance phase Conceptual Design Process Interpreting risk assessment results Cybersecurity requirements specifications Developing a conceptual design Conceptual design specification Detailed Design Process Security Development Lifecycle (SDL) Types of technology Selecting appropriate technology Developing a detailed design Documenting the design/specification Design & Implementation Examples Firewall design example Remote access design example System hardening design example Intrusion detection design example Testing Developing test plans Cybersecurity Factory Acceptance Testing Cybersecurity Site Acceptance Testing CLASSROOM/LABORATORY EXERCISES: Firewall configuration & commissioning Remote access Intrusion detection System Hardening WHO SHOULD ATTEND: Control systems engineers and managers System Integrators IT engineers and managers industrial facilities Plant managers Plant Safety and Risk Management RECOMMENDED PRE-REQUISITE: ISA Courses IC32 and IC33 or equivalent knowledge/experience. Course No.: IC34 Length: 3 days CEUs: 2.1 Price: $1,485 ISA Member/Group Rate $1,770 Affiliate Member $1,855 Community Member/List $1,485 Multi-Registration Rate 2015 SCHEDULE Coming Soon! No dates are currently scheduled for this course offering. 7

IACS Cybersecurity Operations & Maintenance Part of the ISA s Cybersecurity Certificate Program The third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change, backup and recovery procedures and periodic cybersecurity audits. This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an every changing threat environment. Perform basic network diagnostics and troubleshooting Interpret the results of IACS device diagnostic alarms and event logs Develop and follow IACS backup and restoration procedure Understand the IACS patch management lifecycle Develop and follow an IACS patch management procedure Develop and follow an antivirus management procedure Define the basics of application control and whitelisting tools Define the basics of network and host intrusion detection Define the basics of security incident and event monitoring tools Develop and follow an incident response plan Develop and follow an IACS management of change procedure Conduct a basic IACS cybersecurity audit YOU WILL COVER: Introduction to the ICS Cybersecurity Lifecycle Network Diagnostics and Troubleshooting Application Diagnostics and Troubleshooting IACS Cybersecurity Operating Procedures & Tools IACS incident response CLASSROOM/LABORATORY EXERCISES: Network diagnostics and troubleshooting Intrusion detection alarm Event monitoring Configuration management Patch management Anti-virus management Whitelisting Vulnerability scanning tools Incident response Backup and recovery WHO SHOULD ATTEND: Operations and maintenance personnel Control systems engineers and managers System Integrators IT engineers and managers industrial facilities Plant Safety and Risk Management RECOMMENDED PRE-REQUISITE: ISA Courses TS06, TS12, TS20, IC32, IC33 and IC34 or equivalent knowledge/experience. Course No.: IC37 Length: 3 days CEUs: 2.1 Price: $1,485 ISA Member/Group Rate $1,770 Affiliate Member $1,855 Community Member/List $1,485 Multi-Registration Rate 2015 SCHEDULE Coming Soon! No dates are currently scheduled for this course offering. 8

Industrial Networking and Security You will learn about the latest developments in networking, including practical tips on designing, implementing, and testing TCP/IP-based networks and how to apply them securely and reliably in an industrial environment. You will discuss the functions and purposes of the elements used to create and protect an industrial network, including switches, routers, firewalls, and intrusion detection/prevention systems. This course will expand your practical knowledge of LAN, WAN, and Web technologies. This course illustrates what is safe and practical for today s plant floor, including Internet technologies such as web servers, TCP/IP, and fiber optics. Special focus will be placed on the questions of security in the industrial setting drawing on the work of the ISA99 standards committee and the National Institute of Standards and Technology (NIST). Identify standards for analog dial-up connections and modems Apply TCP/IP protocols, addressing, and troubleshooting Estimate where web technologies can safely be used for process control Identify security technologies such as firewalls, proxy servers, virus scanning, and intrusion protection Perform basic security scanning on your networks and perform hardening of your computers And more... YOU WILL COVER: TCP/IP Networking Secure Architectures Packets and Protocols Building a Plant Floor Web Server Network Security Issues And more... CLASSROOM/LABORATORY EXERCISES: Use TCP/IP diagnostic tools in Windows-2000/XP Use network analyzers to troubleshoot Configure a security firewall for the plant floor Perform a basic security scan on a target system And more... Course No.: TS12 Length: 5 days CEUs: 3.5 Price: $2,720 ISA Member/Group Rate $3,060 Affiliate Member $3,400 Community Member/List $2,720 Multi-Registration Rate 2015 SCHEDULE Research Triangle Park, NC... 17 21 August Cerritos, CA...8 12 June 9

Advanced Industrial Networking and Cyber Security NEW! In this course you will learn about the latest developments in Industrial Control System (ICS) networking and cybersecurity. The course provides a review of networking and cybersecurity technology and expands your understanding of industrial network concepts by reviewing networking principals including TCP/UDP, IPv4/IPv6, ICS protocols, addressing and troubleshooting. You will explore network security architectures and learn how to use layering and segmentation to improve security, as well as how web technology works and how web server capability is used in industry and the security problems engendered by such use. Pre-requisite: This is an advanced course with a minimum satisfactory completion of TS06 (or equivalent in experience/training) is recommended for successful completion. Expand your understanding of industrial network concepts Review networking principles Apply the TCP/UCP & IPv4/IPv6 protocols, addressing, and troubleshooting Review how web technology works and how web server capability is used in industry and the security problems engendered by such use Place web technologies where they can be used securely for process control Develop network security architectures and learn how to use layering and segmentation to improve security, and more! YOU WILL COVER: The ISO-OSI Reference Model IPv4 & IPv6 Structure Converting from IPv4 to IPv6 Without Causing Security Problems Making Networks Secure Commercial Off The Shelf Operating Systems Security/Performance Problems Associated with Patch/Virus Update Management And more! CLASSROOM/LABORATORY EXERCISES: Assessing a Local Area Network (LAN) Using Windows and Linux CLI Commands Windows Networking Using Basic Scanner Tools Establishing a VPN Hacker Tools Hardening Using HTML Development Tools Capture TCP HTTP Session Course No.: TS20 Length: 4.5 days CEUs: 3.2 Price: $2,720 ISA Member/Group Rate $3,060 Affiliate Member $3,400 Community Member/List $2,720 Multi-Registration Rate Includes ISA Standard: ANSI/ISA-62443-2-1 (ANSI/ISA-99.02.01-2009): Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program 2015 SCHEDULE Research Triangle Park, NC... 9 13 March; 30 November 4 December Houston, TX... 27 31 July 12 16 October Cerritos, CA... 4 8 May 10

Control Systems Security and ANSI/ISA-62443 Webinar Series Improve your ANSI/ISA-62443 knowledge with these 90-minute, live webinars! Save up to 25% when you register for all three webinars in this series at one time! To take advantage of the series pricing, you must call ISA Customer Service at +1 919-549-8411 to register as this offer is not available online. Cybersecurity Risk Assessment for Automation Systems Course No.: IC32CW1 Dates: 18 March and 10 June Risk analysis is an important step in creating a cybersecurity plan for your automation system. Risk analysis not only identifies security vulnerabilities but also provides the business case for the countermeasures that reduce risk. This webinar introduces control engineers to the concepts of risk analysis and how they are applied to industrial manufacturing and control systems based on the ANSI/ ISA-62443 standards. This webinar is also valuable for IT professionals who wish to learn the special considerations for performing risk analysis on automation systems. Using Firewalls and Security Zones on the Plant Floor Course No.: IC32CW2 Dates: 25 March and 17 June The network firewall is one of the most important tools in any cybersecurity designer s toolbox. This webinar introduces the industrial controls engineer to the world of firewall system design, focusing on how these devices can be effectively deployed on the typical plant floor to help meet the ANSI/ISA- 62443 security standards. A Tour of the ANSI/ISA-62443 Security Standards Course No.: IC32CW3 Dates: 1 April and 24 June This webinar introduces you to the ANSI/ISA-62443 Security for Industrial Automation and Control Systems standards and how these are organized. You will be given a brief introduction to the terminology, concepts, and models of ANSI/ISA-62443 cybersecurity and elements of creating a cybersecurity management system. WEBINAR DETAILS (PER SEMINAR): You can provide these live quality seminars at your location for an unlimited number of participants for one low site fee: Pricing (per site): $250 ISA Member $280 Affiliate Member $310 Community Member/List $250 Multi-Registration Rate Can t attend? Missed the live events? Recorded versions of these sessions are also available, and are free for ISA members. 11

Bring ISA cybersecurity training right to you! All of ISA s cybersecurity training courses can be taught at your company location through ISA s Onsite Training. Contact ISA at +1 919-549-8411 or at info@isa.org for more information. ISA has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, ISA has demonstrated that it complies with the ANSI/ IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, ISA is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. Provider #1001262 Founded in 1945, the International Society of Automation (www.isa.org) is a leading, global, nonprofit organization that is setting the standard for automation by helping over 30,000 worldwide Members and other professionals solve difficult technical problems, while enhancing their leadership and personal career capabilities. Based in Research Triangle Park, North Carolina, ISA develops standards, certifies industry professionals, provides education and training, publishes books and technical articles, and hosts conferences and exhibitions for automation professionals. ISA is the founding sponsor of the Automation Federation (www.automationfederation.org). EP30-4344-0215 International Society of Automation 67 T.W. Alexander Drive P.O. Box 12277 Research Triangle Park, NC 27709 Get the security and data communications training you need from the ANSI/ISA-62443 experts!