Programme outline
Learning objectives
By the end of the course, participants will be able to:
- Develop a structured organisational and technical roadmap to strengthen the cybersecurity posture of their Operational Technology (OT) environment.
- Apply industry best practices in OT cybersecurity to improve the security of plant operations and industrial control systems.
- Conduct basic risk-based assessments using vulnerability and threat frameworks, and identify appropriate risk mitigation strategies.
- Design a basic incident response approach tailored to their OT environment to support effective response and recovery during cyber incidents.
Day 1
- Concepts and Terminology in Operational Technology (OT)
- Operational Technology (OT) Cybersecurity Fundamentals
- Details of OT Components – Purdue Enterprise Reference Architecture (PERA) / Purdue Model
- Introduction to IEC 62443 Industrial Cybersecurity Standard
Day 2
- Introduction to Cybersecurity Management System (CSMS)
- CSMS – People
- CSMS – Process
- CSMS – Technology
Day 3
- Introduction to Cyber Attack Frameworks
- Incident Response for OT Environments
- Tabletop Exercise for Incident Response Practice
- Best Practices for Supervisory Control and Data Acquisition (SCADA) Security
- Assessment
Assessment
- Written test
- Online quiz