ptarzh-CNenfrdeitjarues

In order to protect critical infrastructures it is necessary to know the risks to which an industrial network and control systems are subjected, what are the main safety standards available in the market and how to correctly implement and monitor the CSMS (Cyber ​​Security Management System) defined by the ISA / IEC 62443 standard. The TI Safe Academy provides specific training and certification for critical infrastructure protection that prepares students for the complicated task of securing industrial networks and control systems against cyber attacks.

In recent years there has been a steep rise in security incidents in critical infrastructures around the world. Training fills a market segment with tremendous demand from industries whose infrastructures are critical to nations.

The course is based on methodology TI Safe ICS.SecurityFramework® and teaches how to apply the best practices of the ANSI / ISA-99 standard (current ISA / IEC 62443) in critical infrastructure industrial environments.

20 class hours are available at the TI Safe Academy (Rio de Janeiro, Brazil) or at any location for a minimum group of 10 students. It is suitable for IT or Industrial Automation professionals who have knowledge of operating systems, network protocols, programming languages, hardware and software. Knowledge of information security and industrial control systems (ICS) is desirable.

Figure: Classroom Training

Training Tools

The training materials were prepared in Portuguese and English and distributed in digital format (PDF file). They are constantly updated and improved. One week before the start date of each training, TI Safe will send the data so that enrolled students can download the handout and supporting material from the Internet. It is up to each student to print the handout or take their laptop or tablet to classes with the handout in digital format.

Practical classes and technical demonstrations

During the training will be held practical classes and technical demonstrations of attacks and defenses against simulated automation networks.

For the demonstration of attacks against industrial networks, we have simulators of industrial plant automation networks shown in the figure below:

Figure: Industrial network simulators used in Industrial Automation Safety Training

Training content:

  • 1 Module - Introduction: Presents the objectives of the training, its rules, instructors and students.
  • Module 2 - Risks and Planning: Overview of a control and monitoring system, its elements, protocols and typical architecture. Definition of what are critical infrastructures, their importance and presentation of recent cases of cyberterrorism. It presents the types of attackers, the market that feeds the cyber attacks, documented attacks, the main challenges for implementation of security in critical infrastructures and techniques for elaboration of risk analysis in industrial networks according to the ISA / IEC 62443 standard and the methodology TI Safe ICS.SecurityFramework®. Presentation of methods for the development of an Industrial Cybersecurity Plan.
  • 3 Module - Controls: It presents the domains of the methodology TI Safe ICS.SecurityFramework®: Edge Security, Industrial Network Protection, Malware Control, Data Security, Education and Awareness.
  • 4 Module - Monitoring: It presents methods for implementing continuous monitoring in automation plants, including SIEM technologies and managed security services.
  • Module 5 - Attacks and Countermeasures: It puts the student in contact with the main attack tools used by hackers and also the main industrial cyber security countermeasures presented during the training.

See testimony of former students download the full course Local Guide ou English.


Online Training

The same content of classroom training available in our virtual teaching environment. Study when and where you want.

Start right now and get ahead to take advantage of opportunities in the industrial cybersecurity market, which is growing in Brazil.

Click here to access our virtual teaching environment.

CASE certification determines if a professional has the appropriate knowledge to properly ensure an industrial network with SCADA systems. Completely in Portuguese, certification offers industry managers and their managers an objective measure of competence, as well as a recognizable standard of knowledge.

Who is CASE certified for?

This certification was specifically developed for professionals responsible for auditing, installing and securing the national critical infrastructure, including:

  • Generation, Transmission and Distribution of Energy
  • Water Treatment and Sewage Stations
  • Oil and Gas
  • Telecommunication Services
  • Transportation and Logistics
  • Financial services
  • Food production and distribution
  • Security Services (Police and Armed Forces)

Figure: Certificate of CASE certification completion

CASE Certification Rules

  • The CASE certification test is comprised of 60 multiple choice questions.
  • The test time is 90 minutes and the candidate will have two attempts to take the exam.
  • The student will be approved if he obtains a number of hits equal to or greater than 70% of the total value of the points assigned to the exam.
  • In case of approval the candidate will be entitled to the CASE certificate.
  • The CASE certificates have 2 years (24 months) of validity from their date of issue.

Preparation for the test

The certification is open to all professionals who have an interest in the area, however TI Safe expressly recommends that candidates consider conducting the Industrial Automation Safety Training before the test. This training fills all areas of knowledge of certification and is performed in regular classes according to the calendar published on the TI Safe website. TI Safe provides study guide with the main topics that should be reviewed and a simulated for you to measure the level of your knowledge before the exam.

SUBSCRIBE

* By clicking "Subscribe" you are agreeing to the sharing of your personal information, and then taking responsibility for its use, as governed by the General Personal Data Protection Act (LGPD or LGPDP), Law No. 13.709 / 2018 .

Copyright © 2007-2020 - IT Safe Information Security - All rights reserved.