CYBATI Introduces a New Portable Hands-On Control System Cybersecurity Training Kit and Course

Share Article

CYBATI today announced the availability of the new Hands-On, Portable Control System Cybersecurity Training Kit and 3-day commercial class. The course material and hands-on training kit is currently being utilized at Tiger Trap, an annual FBI Infragard / ISACA, Capture & Defend the Flag cybersecurity event. The kit and course are also used in DePaul University’s CNS 366/466 control system cybersecurity course.

CYBATI Critical Infrastructure Control System Cybersecurity Portable Training Kit

CYBATI Critical Infrastructure Control System Cybersecurity Portable Training Kit

This hands-on training environment and course material allows participants to focus on the vulnerabilities associated with control systems, tactically understand the risks and identify security controls.

Control Systems (Distributed and SCADA systems) provide reliable and safe automation for such critical infrastructure as the Bulk Electric System (BES), natural gas, oil, transportation, fresh water/waste water, manufacturing, food, and defense. Many control systems are in some way electronically connected to networks of less trust, potentially even a slight distance away from the Internet. It is paramount to the safety of our society to sufficiently understand their architecture and to protect these critical systems.

The CYBATI 3-day hands-on course entitled “Critical Infrastructure Control System Cybersecurity” is a real-world training session for intermediate to advanced programmers, cyber professionals and engineers covering control system vulnerabilities, threats and mitigating controls. This course provides hands-on analysis of a control system environment (DCS and SCADA) allowing the participants to understand the environmental impacts of attacks like Stuxnet and supporting mitigating controls as defined in the NERC reliability standards, Department of Homeland Security CFATs and other industry and government based recommended controls (eg. ISA, NIST, NNSA, IEC, NRC, EPA, INGAA, FDA, CPNI).

  •     3-day course
  •     Hands-on environment (PLC, HMI, CYBATIFIED Backtrack)
  •     Regulations (CFATS, NERC CIP)
  •     Defense in Depth Protective Solutions
  •     Training Kits Provided

Participants learn control system cyber architecture, ladder logic programming, cyber vulnerability assessments, attack surface analysis and mitigating physical, cyber and operational controls. Hands-on laboratories include attacking and protecting PLCs and other control system hardware. The participants perform actual man-in-the-middle injections leading to false operator displays, rogue PLC administration and automation and safety-system ladder logic analysis to identify potential failure models and mitigating controls.

“We are excited to bring this course material and training kit to the world. Recent events such as Stuxnet, and exploits and vulnerabilities discussed at conferences such as Blackhat and Defcon are a concern to any modern society. This hands-on training environment and course material allows participants to focus on the vulnerabilities associated with control systems, tactically understand the risks and identify security controls. “ – Matthew E. Luallen, co-Founder and President

The control system training kit and courseware provides real world examples of cybersecurity risks and controls that can help asset owners protect their investment. For more information about the training kit or to have this training delivered at your organization contact CYBATI at 855.6CYBATI.

About CYBATI
CYBATI provides cybersecurity workforce development and consulting expertise to asset owners, industry and government to protect workforce productivity associated with automation. Learn more at cybati.org

Contact Information
Matthew E. Luallen
co-Founder and President
(855) 6CYBATI
info9at)cybati(dot)org

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Matthew Luallen

3123754715
Email >
Visit website