Industrial Network Security for SCADA, Automation, Process Control and PLC Systems

THE WORKSHOP

This workshop will give you a fundamental understanding of security in effective industrial networking and data communications technology. It will also present you with the key issues associated with security in industrial communications networks and will assist managers, system operators and industrial data communications specialists in setting up secure systems.

On completion of the workshop you will have developed a practical insight into how to achieve optimum industrial network security for your organisation.

Topics covered include: introduction and terminology; firewalls; authentication, authorisation and anonymity; remote access to corporate networks; cryptography; VPN’s; data security; desktop and network security; security precautions in a connected world; and internet security.

WHAT IS INCLUDED?

  • Receive a certificate of attendance in support of your continuing professional commitment
  • All workshops include the associated hardcopy technical manual
  • Printed workshop handouts
  • Lunch and refreshments
  • Interact and network with workshop attendees and experienced instructors
  • Practical, industry driven content to assist you in your continuing professional development (CPD)
  • Attendees automatically become IDC subscribers and receive exclusive deals and technical content every month

WHO SHOULD ATTEND?

If you are using any form of communication system this workshop will give you the essential tools in securing and protecting your industrial networks whether they be automation, process control, PLC or SCADA based. It is not an advanced workshop – but a hands-on one. Anyone who will be designing, installing and commissioning, maintaining, securing and  troubleshooting TCP/IP and intra/internet sites will benefit including:

  • Design engineers
  • Electrical engineers
  • Engineering managers
  • Instrumentation engineers
  • Network engineers
  • Network system administrators
  • Technicians

CONTENT SUMMARY

DANGERS

  • Hackers
  • Viruses
  • Denial-of-service
  • Information leakage
  • File manipulation
  • Database access
  • Elevation of privileges
  • Spoofing
  • SYN flooding
  • Router attacks
  • Sniffing

SECURITY POLICIES AND ADVISORY SERVICES

  • Corporate policies
  • CERT
  • Audits
  • Threats
  • Vulnerabilities
  • Countermeasures
  • Disaster recovery

PHYSICAL SECURITY

  • Physical and logical access to networked equipment
  • Network segmentation

AUTHENTICATION

  • Authentication basics
  • Client-side certificates
  • Passwords
  • Smart cards
  • Tokens
  • Biometrics
  • PAP
  • CHAP
  • RADIUS
  • TACACS/TACACS+

ENCRYPTION

  • Symmetrical encryption schemes (DES, RC4)
  • Public-key encryption schemes (RSA)
  • Certificate Authorities (CAs)

PROXIES/FIREWALLS

  • Basic firewall operation
  • Natural Address Translation (NAT)
  • Firewall types (IP filtering, stateful inspection, proxy, DMZ) 

INTRUSION DETECTION SYSTEMS (IDSS)

  • Types
  • Deployment

ROUTER SECURITY

  • Administrator access
  • Firmware upgrades
  • Logging
  • Access Control Lists (ACLs)

SWITCH SECURITY

  • Administrator access
  • Port based MAC address management
  • ACL filtering
  • Virtual LAN (VLAN) implementation

VPNS

  • Virtual Private Network (VPN) concept
  • Tunnelling
  • L2TP
  • IPSec
  • SOCKS 5

WIRELESS LANS

  • Encryption and authentication - current problems and developments
  • IEEE 802.1x
  • WEP
  • WZC
  • WPA
  • AES
  • LEAP
  • EAP-TLS
  • EAP-TTLS

Book Now