Overview
The Operational Technology (OT) Cybersecurity Defense course is designed for technical professionals who need to deepen their expertise in securing OT systems. With a focus on attack methodologies, risk analysis, and security protocols, the course equips participants with the knowledge and tools required to address increasingly complex threats targeting OT environments.
Using the Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) framework for Industrial Control Systems (ICS), participants will examine modern attack techniques and adversary methodologies used against OT systems. This enables them to better identify vulnerabilities, understand attacker behaviour, and respond proactively to potential threats.
The course also covers risk analysis, OT security architecture, and cybersecurity lifecycle management, providing a structured and comprehensive approach to protecting OT environments.
Through technical discussions and practical scenarios, participants will strengthen their ability to defend OT systems and apply advanced cybersecurity strategies to manage evolving threats.
Course details
Course date: Currently unavailable.
Duration: 3 days, 9.00 AM – 5.00 PM
Who should attend
This course is designed for professionals involved in the operation, management, and maintenance of industrial and plant environments, including:
- Operations Executives / Operations Managers (OT / Plant Operations)
- Project Managers / Production Managers (OT Projects & Manufacturing)
- Product Development Executives / Product Development Managers (OT / Industrial Systems)
- OT Engineers / Technical Specialists (e.g., Control Systems, SCADA, ICS Engineers)
- Cybersecurity Engineers / Cybersecurity Specialists (OT / Industrial Control Systems – Plant Environment)
- Plant Maintenance Engineers / Plant Technicians (Responsible for plant upkeep with foundational cybersecurity awareness)
Minimum entry requirements
- GCE ‘O’ Level qualification or equivalent
- Proficiency in English
- Basic knowledge of IT systems
- Basic understanding of cybersecurity principles
- Basic networking knowledge