Essentials for Operational Technology (OT) Cybersecurity

Programme outline

Learning objectives

By the end of the course, participants will be able to:

  • Develop a structured organisational and technical roadmap to strengthen the cybersecurity posture of their Operational Technology (OT) environment.
  • Apply industry best practices in OT cybersecurity to improve the security of plant operations and industrial control systems.
  • Conduct basic risk-based assessments using vulnerability and threat frameworks, and identify appropriate risk mitigation strategies.
  • Design a basic incident response approach tailored to their OT environment to support effective response and recovery during cyber incidents.
Day 1
  • Concepts and Terminology in Operational Technology (OT)
  • Operational Technology (OT) Cybersecurity Fundamentals
  • Details of OT Components – Purdue Enterprise Reference Architecture (PERA) / Purdue Model
  • Introduction to IEC 62443 Industrial Cybersecurity Standard
Day 2
  • Introduction to Cybersecurity Management System (CSMS)
  • CSMS – People
  • CSMS – Process
  • CSMS – Technology
Day 3
  • Introduction to Cyber Attack Frameworks
  • Incident Response for OT Environments
  • Tabletop Exercise for Incident Response Practice
  • Best Practices for Supervisory Control and Data Acquisition (SCADA) Security
  • Assessment
Assessment
  • Written test
  • Online quiz
What’s next

Find out more

Mailing list

Subscribe to our mailing list and learn about the latest developments in SUTD Academy.

Get in touch

Submit an enquiry or schedule a call with our friendly team at +65 6499 7171.