Sunday, 9 November 2014

Industrial Network Security for SCADA, Automation | Process Control and PLC Systems

THE WORKSHOP
This workshop will give you a fundamental understanding of security in effective industrial networking and data communications technology. It will also present you with the key issues associated with security in industrial communications networks and will assist managers, system operators and industrial data communications specialists in setting up secure systems.
On completion of the workshop you will have developed a practical insight into how to achieve optimum industrial network security for your organisation.
Topics covered include: introduction and terminology; firewalls; authentication, authorisation and anonymity; remote access to corporate networks; cryptography; VPN’s; data security; desktop and network security; security precautions in a connected world; and internet security.

WHO SHOULD ATTEND?
If you are using any form of communication system this workshop will give you the essential tools in securing and protecting your industrial networks whether they be automation, process control, PLC or SCADA based. It is not an advanced workshop – but a hands-on one. Anyone who will be designing, installing and commissioning, maintaining, securing and  troubleshooting TCP/IP and intra/internet sites will benefit including:
  • Design engineers
  • Electrical engineers
  • Engineering managers
  • Instrumentation engineers
  • Network engineers
  • Network system administrators
  • Technicians

CONTENT SUMMARY
DANGERS
  • Hackers
  • Viruses
  • Denial-of-service
  • Information leakage
  • File manipulation
  • Database access
  • Elevation of privileges
  • Spoofing
  • SYN flooding
  • Router attacks
  • Sniffing
SECURITY POLICIES AND ADVISORY SERVICES
  • Corporate policies
  • CERT
  • Audits
  • Threats
  • Vulnerabilities
  • Countermeasures
  • Disaster recovery
PHYSICAL SECURITY
  • Physical and logical access to networked equipment
  • Network segmentation
AUTHENTICATION
  • Authentication basics
  • Client-side certificates
  • Passwords
  • Smart cards
  • Tokens
  • Biometrics
  • PAP
  • CHAP
  • RADIUS
  • TACACS/TACACS+
ENCRYPTION
  • Symmetrical encryption schemes (DES, RC4)
  • Public-key encryption schemes (RSA)
  • Certificate Authorities (CAs)
PROXIES/FIREWALLS
  • Basic firewall operation
  • Natural Address Translation (NAT)
  • Firewall types (IP filtering, stateful inspection, proxy, DMZ) 
INTRUSION DETECTION SYSTEMS (IDSS)
  • Types
  • Deployment
ROUTER SECURITY
  • Administrator access
  • Firmware upgrades
  • Logging
  • Access Control Lists (ACLs)
SWITCH SECURITY
  • Administrator access
  • Port based MAC address management
  • ACL filtering
  • Virtual LAN (VLAN) implementation
VPNS
  • Virtual Private Network (VPN) concept
  • Tunnelling
  • L2TP
  • IPSec
  • SOCKS 5
WIRELESS LANS

  • Encryption and authentication - current problems and developments
  • IEEE 802.1x
  • WEP
  • WZC
  • WPA
  • AES
  • LEAP
  • EAP-TLS
  • EAP-TTLS

No comments:

Post a Comment