International Society of Automation (ISA) introduces its expanded suite of industrial automation and control system (IACS) cybersecurity training, including three new technical training courses with associated certificate programs.
By combining these three new courses and aligned certificate programs with its current course offerings in IACS security—Using the ANSI/ISA-62443 Standards to Secure Your Industrial Control System (IC32); Cybersecurity for Automation, Control and SCADA Systems (IC32E); and Introduction to Industrial Automation Security and the ANSI/ISA-62443 Standards (IC32C)—ISA is able to deliver a comprehensive set of industrial cybersecurity training solutions and address the complete "lifecycle" of cybersecurity training requirements.
Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
This course provides students with the information and skills needed to assess the cybersecurity of a new or existing IACS and to develop a cybersecurity requirements specification that can be used to document the needs of the project. Students will develop the necessary skills to organize and facilitate a cybersecurity risk assessment for an IACS, identify gaps in existing policies and more. Learn more.
IACS Cybersecurity Design & Implementation (IC34)
Learn how to implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit with this new course. Additionally, students will learn how to develop and execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification. Upon completing the course, students should be able to perform a basic firewall configuration and commissioning, develop a Cybersecurity Acceptance test plan (CFAT/CSAT) and more. Learn more.
IACS Cybersecurity Operations & Maintenance (IC37)
In an ever-changing threat environment, skills needed to detect and troubleshoot potential cybersecurity events and to maintain the security level of an operating system throughout its lifecycle have become more important than ever. In this course, students will be provided the necessary tools to perform a multitude of cybersecurity operations, including developing and follow IACS backup and restoration procedure, conducting a basic IACS cybersecurity audit and interpreting the results of IACS device diagnostic alarms and event logs. Learn more.