Web Content Display

Undoubtedly, the emergence of industrial systems such as DCS and SCADA and its connection to the global network has had a tremendous impact on the development of critical infrastructure control processes in countries, especially remote equipment monitoring and control. However, this progress and development has also brought new vulnerabilities that have challenged the cyber security of industrial control systems. From this point of view, it is necessary to fully understand the platforms and vulnerable sectors as well as the threats caused by them. After knowing the vulnerable parts of industrial systems, examining defensive solutions and improving the safety level are actions that play a significant role in reducing possible threats and risks. Among the most important of these measures, it is possible to mention the use of certificates and recommendation letters to improve cyber security.

Undoubtedly, the emergence of industrial systems such as DCS and SCADA and its connection to the global network has had a tremendous impact on the development of critical infrastructure control processes in countries, especially remote equipment monitoring and control. However, this progress and development has also brought new vulnerabilities that have challenged the cyber security of industrial control systems.

From this point of view, it is necessary to fully understand the platforms and vulnerable sectors as well as the threats caused by them. After knowing the vulnerable parts of industrial systems, examining defensive solutions and improving the safety level are actions that play a significant role in reducing possible threats and risks. Among the most important of these measures, it is possible to mention the use of certificates and recommendation letters to improve cyber security.

Syllabus:

  • Familiarity with industrial control systems
  • Familiarity with programmable controllers (PLC)
  • Familiarity with distributed control systems (DCS)
  • Familiarity with supervisory and data collection systems (SCADA)
  • An overview of the history of security incidents in industrial control systems
  • Identification and investigation of industrial cyber threats
  • Introducing the road map for the security of energy industries in America
  • Analysis of existing vulnerabilities in industries
  • Providing security solutions for industrial control systems in the world
  • Introduction of important standards and guidelines in the field of industrial cyber security
  • Examining defense-in-depth implementation methods for industrial control networks
  • Initial introduction of various security tools to improve the cyber security of the industry
  • Introduction and review of threat detection systems in the industrial network
  • An overview of the workings of industrial malware similar to Stuxnet for a better understanding of security requirements