IndustrialCybersecurity CICP
IndustrialCybersecurity CICP
IndustrialCybersecurity CICP
Certification Course
On successfully completing this course, passing the associated exam and successfully submitting
the assignments, learners qualify as a CICP-Certified Industrial Cybersecurity Professional.
Every year, there are a large number of attacks on Industrial Control, Automation and Safety
Instrumented systems, as well as on other OT systems and the number keeps growing. Many of
these systems are legacy systems that were designed many years ago, when today ’s cyber threats
were not present. The consequences of attacks on unsecured Industrial systems and other critical
infrastructure related systems, can be very severe. This may result in not just loss of confidential
information, but also physical damage to assets, process upsets that may lead to fire, explosion,
possible loss of containment and /or injury to humans.
Abhisam is a global leader in technical e-learning and certification for engineers, technical
professionals and managers all over the world. Since 2003, Abhisam courses have been taken by
thousands of professionals, working for marquee corporations (including Fortune 500 companies)
and government authorities, as well as by individuals, consultants and universities/colleges.
In the year 2018, Abhisam introduced this Industrial Cybersecurity course, a complete e-learning
course, designed by experts in Industrial Cybersecurity, so that it becomes very easy to learn
everything that you need to know about this important subject. The course has animated
simulations, videos, interactive exercises and other material that make learning the subject, fun
and easy! Since then, the course has been updated several times and is frequently updated so that
it remains current.
Compared to courses from other providers, Abhisam courses have better content, but cost much
less and can be deployed to even thousands of learners, simultaneously, via the Abhisam Learning
Management System, or via your organization’s own SCORM or xAPI compliant LMS.
D. Anbudurai, FLSmidth
DEMO
To view a demo of the course, please click the picture below. You must be online for this to work.
Please allow Autoplay in your browser if it does not load.
Representational Image
Participate in this simulated real life thriller that deals with attack/defense, of an Industrial
Control System at a manufacturing plant. This is a tabletop Red Team/Blue Team exercise that
you will enjoy. Watch the trailer below to know more. Click on the picture to view (will open in
your browser– you need to be online in order to view it). You can choose to participate in the
Red Team (Attackers) or the Blue Team (Defenders).
Advanced Modules
Also get several advanced modules that include the MITRE ATT&CK® for ICS matrix model,
Honeypots, Shodan alternatives and more. The “Understanding IEC 62443-2-4” module is also
included in the Professional version of the course.
COURSE CONTENTS
• Introduction to Industrial Automation & • DCS as a group of controllers
Control Systems (IACS) • DCS Connection to field devices
• IACS Application Areas • Fieldbuses
• Cyber physical systems • MODBUS
• Evolution of IACS • Programmable Logic Controllers (PLC)
• Pneumatic Controllers • PLC HMI
• Single Loop Controller architecture • SCADA
• Control Rooms • PLC-SCADA
• Control Room & Field • Safety Instrumented Systems
• Analog Electronic Signals • SIS Cybersecurity
• Traditional Controls • Typical IACS Architecture
• Point to Point Architecture • Automation Hierarchy
• Direct Digital Control (DDC) to Distributed
Control Systems (DCS)
• Cybersecurity Basics
• Cybersecurity Policy • Types of Trojans
• Authorized Access • Ransomware
• Unauthorized Access • Scareware
• Brute Force Attacks • Spyware
• Secure Communication • Command & Control
• Authentication • Firewalls
• Non Repudiation • Firewall Basic Working
• Encryption • Classes of Firewalls
• Public and Private Keys • Deep Packet Inspection Firewalls
• Locking and Unlocking • Intrusion Detection Systems (IDS)
• Public Key Cryptography- • Denial of Service
• Digital Signature • Distributed Denial of Service (DDoS)
• Defense in Depth • Telephonic Denial of Service (TDoS)
• Privileges • Penetration Testing
• Role of Malware • Backdoors
• Understanding malware delivery • Backdoor Examples
• Attack Surface • Demilitarized Zone
• Threats & Vulnerabilities • Privilege Escalation Vulnerability
• Viruses • Network Hardening
• Worms
• Trojans
©2022. Abhisam Software. All rights reserved [email protected]
abhisam
MODULE 3 - Threats to IACS
COURSE CONTENTS
• IACS Threat Severity • Devices and Software with Vulnerabilities
• Vulnerability Causes • Buffer Overflow
• Increased Connectivity • SQL Injection
• Insecure by design • Advanced Persistent Threats (APT)
• Use of COTS • Port Scanning
• Shodan • Cross Site Scripting
• Skill Levels needed • Packet Sniffing
• Lack of awareness • Zero Day Exploits
• Predisposing Conditions • Exploit Markets
• Four Steps to an Attack • ICS Attack Categories
• Vectors • ICS Targeted attacks
• Phishing • Attack Sequence of Events
• Spear Phishing • Man in the middle attack
• Social Engineering • MITM in ICS
• Fake Profiles • Denial of Service
• Insecure Connections & Firewalls • Replay attack
• Malicious Websites • Spoofing
• Waterholing • Blended Attacks
COURSE CONTENTS
• Introduction • Self Assessment
• IEC 62443-2-1
• IEC 62443-2-3 Section 7 – Other Standards & Schemes
• IEC 62443-2-4 • Introduction
• Vendors & System Integrators • ISA Secure Scheme
• Relationships • ISO 31000
• Example– Simple • ISO 27000
• Example– Complex • IEC 61508 Functional Safety
• IEC 61508 Security Clauses
Section 5 – IEC 62443-3 • IEC 61511 Process industries Standard
• Introduction • IEC 61511– Security Clauses
• IEC 62443-3-1 • Cybersecurity - Safety Instrumented Systems
• IEC 62443-3-2
• The IEC 62443-3-2 Process MODULE 5 – IACS Risk Assessment
• IEC 62443-3-2 Process details
• IEC 62443-3-3 Overview • Introduction
• IEC 62443-3-3 Details • Risk Assessment Case Study
• Security Levels • Risk Assessment & Mitigation, Incident
• Mapping SLs to FRs Response
• Mapping FRs and REs to SLs • Non Safety Consequences
• Self Assessment • Risk Assessment Process
• Security Vulnerability Analysis
Section 6 – IEC 62443-4 • ICS Security Evaluation
• Introduction • Initial Risk Assessment
• IEC 62443-4-1 and IEC 62443-4-2 • Threat Assessment
• IEC 62443-4-1 • ICS Vulnerabiility Assessment
• Secure Product Development Lifecycle • Consequence Analysis
• IEC 62443-4-1 and 2-Applicability • Example Calculations
• Capability Maturity Model • Tolerable Risk
• SDLC Practices ( 1-8) • Modification-Small Site
• IEC 62443-4-2 • Modification-Medium Site
• Technical Security Requirements • Modification-Large Site
• Foundational Requirements revisited • Modification-Remote Site
• Component Requirements (CRs) • Seven Steps to be carried out
• CRs and REs • Secondary Risk Assessment
• Mapping CRs and REs to SLs • Periodic Assessment
• Common Component Security Constraints • Cyberattack Mitigation
• CSSC-1 Support of Essential Functions
Section 1 to Section 10
This module has TEN sections that cover the following topics in detail:
COURSE CONTENTS
1. People, Policies, Procedures and Standards
2. Hazard and Risk Assessment
3. Asset Inventory
4. Training & Competency
5. Secure Architecture, Devices, Configuration, Software
6. Intrusion Detection & Prevention
7. Event Logging and Analysis
8. Incident Response
9. Backup & Restore
10. Patch Management & Testing
In this module, take a Self Assessment Test to know how well you have understood the subject so
far.
ADVANCED MODULES
These Advanced Modules are in two parts, Advanced Module-1 and Advanced Module-2.
Advanced Module-1
COURSE CONTENTS
Advanced Module-2
• Understanding and Complying with IEC 62443-2-4
CICP EXAM
After completing the modules, you are eligible to take the CICP Exam. This is an online exam that
you can take anytime after course completion (but within 1 year of enrolment).
The exam will have questions drawn from a large database of questions, based on what you
learned in the course.
On passing, you earn the title of CICP – Certified Industrial Cybersecurity Professional.
Your badge and certification information will then appear under the Certifications section of your
LinkedIn profile. The title of the achievement, will link to a verification page where additional
information is available, including a longer description, evidence, the badge image and criteria for
the accomplishment, details about the issuer, and validation of the achievement's authenticity. Thus
your skill is easily verifiable by any third parties including clients, customers, employers and peers.
This is a great way to enhance your public profile regarding your skills and is available for all
learners. You can also add your Badge to the LinkedIn feed, where you can announce your
achievement to your LinkedIn connections.
Note: The Badgr, Linkedin, Facebook and Mozilla OpenBadges logos belong to the respective organizations
Standard Version
The Standard version has all the modules, including the Advanced Module-1 and comes with 1 year
online access to the course, accessible from any smart device. It also includes the CICP certification .
It does not include the Advanced Module-2.
Professional Version
The Professional version has everything in the Standard version plus access to the course for 3 years,
and also includes the Advanced Module-2 that includes the “Understanding IEC 62443-2-4”
module.
Enterprise Version
This version is for organizations with multiple numbers of learners (5 or more). It Includes
everything in the Professional version, except the access period which is for 1 year. It can also be
purchased as a SCORM/xAPI version (optional addon price) for use in your own Enterprise LMS.
Understanding IEC
62443-2-4 module
Other modules in
Advanced Module –2
(coming soon)
Access Devices PC, Mac, Tablet or PC, Mac, Tablet or PC, Mac, Tablet or
Smartphone via any Smartphone via any Smartphone via any brows-
browser that supports browser that supports er that supports HTML5
HTML5 HTML5
How to order
US INDIA
Abhisam Software Abhisam Software Pvt Ltd
8345 NW 66th St #9035 Pokhran Road #2
Miami FL 33166-2626 Thane
USA India
Phone: +1 (305) 407 2679 Phone: +91 7208060349
Email: [email protected]
www.abhisam.com