Industrial Security: Threats and Requirements

by Education4Industry GmbH
Back to Courses
Proceed to Checkout Edit Shopping Cart Got a voucher? Book for others? Go to the shopping cart!
Preview image for training Industrial Security: Threats and Requirements
including VAT 89,99

Course Features

  • Certified by TÜV Rheinland
  • Lifetime Access
  • Course Level: Beginner
  • Learning Extent: 1 hrs. 55 min.
  • Language: english
Target Audiences:

Course Overview

About this online Course

Nowadays, everyone knows about the importance of IT security but there is also industrial security. Unfortunately, knowledge in the area of industrial security is usually not as good as the knowledge about office IT security. In this Skill, you will acquire basic knowledge of this essential topic. You will learn why there is such a great need for action in the field of industrial security and the cornerstones for implementation. You will get a first overview of methods and technologies to make IT secure in the industrial sector.

This Skill raises awareness of threats in industrial environments and provides basic knowledge about typical attacks and protective measures.

Target group

This online course is aimed at all employees who have an active influence on cybersecurity in production. It is also aimed at all employees who need to acquire basic knowledge in this area.

Learning objectives

  • Understand why Industrial Security is important.
  • Know what the objective of Industrial Security is.
  • Know what the top 10 threats according to the BSI are.
  • Know various methods of implementing Industrial Security.
  • Know the different types of attackers.
  • Know various methods of implementing Industrial Security.
  • Know additional counter measures for Industrial Security.
  • Know how risk can be defined.
  • Understand what a risk analysis is.
  • Understand why a risk analysis is necessary.
  • Know tips for the practical implementation of a risk analysis.
  • Understand how technology, processes, and people are related.
  • Know the Defense-in-Depth security concept.
  • Know what network IDS is.
  • Know what anomaly detection is.
  • Know for which systems anomaly detection is important.
  • Understand why detecting attacks is important.
  • Know which components and access points should be monitored.
  • Understand why system monitoring should be centrally integrated.
  • Know what emergency management is.
  • Understand how incident handling works.
  • Understand how IT forensics contributes to emergency management.
  • Understand how these concepts are part of a holistic approach Industrial Security.
  • Know what a recovery plan is.
  • Understand, why you shouldn't go without a recovery plan.
  • Know practical tips for creating a recovery plan.

Learning content

Industrial Security: What and Why?

What is Industrial Security? And why do we need it? Understand how industrial plants are threatened by attacks targeted at IT and get to know the goals of Industrial Security. We will also discuss what types of attacks and attackers there are. It is important to understand why and how to protect yourself.

Industrial Security Implementation

This chapter gives you an initial overview of the technical and organizational measures required to implement Industrial Security.

Systematic Identification of Threats

The basis for successful protection of industrial plants is to systematically identify what needs to be protected. This is achieved by means of risk analysis. In this chapter, you will first learn what risk is and then see how to perform a risk analysis.

A Systematic Approach to the Protection of Facilities

Get to know the role of technology and people in industrial security. Understand what is behind the "Defense in Depth" concept and how it is a central approach to achieving security in the industrial environment.

Detect Attacks

A goal for industrial security is not only to make life as difficult as possible for attackers, but also to detect threats as early as possible. This is exactly what we want to discuss in this Chapter.

Attack Response and Recovery

The goal of industrial security is to avoid attacks. However, this can never be 100% guaranteed. Therefore it is absolutely necessary to know what to do if something should happen. In this Chapter, we will discuss how to react when something happens and what role good recovery plans play in this context.

Test: Industrial Security

Test your knowledge on the basic concepts of industrial security with this short multiple-choice test.

Learning Contents

Summary of Learning Contents

Industrial Security: Threats and Requirements 

timelapse 1 hrs. 55 min.
  • Industrial Security: Threats and Requirements 
    extension interactive content
    timelapse 1 hrs. 55 min.


Overall Rating

Average Rating
{{ summary.avg }}
{{ }} Rating {{ }} Ratings
{{ 5 - summaryRating }} stars:
{{ summaryCount }} Ratings


from {{ rating.user.display_name }} am {{ rating.created_at | formatDate }}

Answer from {{ rating.answer_user.display_name }} Adminstrator am {{ rating.answered_at | formatDate }}


This training does not yet have ratings.

Questions & Discuss

Comments and Questions about the course

Do you have any general questions about the course? Would you like to get a more detailed picture of the structure of the course? Whether you want to share your own experiences with the learning community or have questions about a specific content: Feel free to join the discussions with other learners on this course.

Please login to participate in this course discussion.

No comment available. Be the first one to leave a reply.

Courses you may also be interested in:

Preview image for training Produktivitätssteigerung durch Datenverfügbarkeit - wie geht das?
Produktivitätssteigerung durch Datenverfügbarkeit - wie geht das?
Preview image for training Online Kurs Digitalisierung des Vertriebs
Digitalisierung des Vertriebs
Preview image for training Corporate Innovation - Online-Seminar
Corporate Innovation
Preview image for training Digital Intelligence Management - Online-Seminar
Digital Intelligence Management