🙌 Karriere-Woche - 1 Woche Live-Online-Trainings für nur 49 €

Digitalisierung

Industrial Security: Threats and Requirements

by University4Industry
Back to Courses
Proceed to Checkout Edit Shopping Cart Got a voucher? Book for others? Go to the shopping cart!
Preview image for training Industrial Security: Threats and Requirements
including VAT 89,00

Course Features

  • Certified by TÜV Rheinland
  • Lifetime Access
  • Course Level: Beginner
  • Learning Extent: Does not exist
  • Language: english
Target Audiences:
All Target Audiences

Course Overview

About this online Course

Nowadays, everyone knows about the importance of IT security but there is also industrial security. Unfortunately, knowledge in the area of industrial security is usually not as good as the knowledge about office IT security. In this Skill, you will acquire basic knowledge of this essential topic. You will learn why there is such a great need for action in the field of industrial security and the cornerstones for implementation. You will get a first overview of methods and technologies to make IT secure in the industrial sector.

This Skill raises awareness of threats in industrial environments and provides basic knowledge about typical attacks and protective measures.

Target group

This online course is aimed at all employees who have an active influence on cybersecurity in production. It is also aimed at all employees who need to acquire basic knowledge in this area.

Learning objectives

  • Understand why Industrial Security is important.
  • Know what the objective of Industrial Security is.
  • Know what the top 10 threats according to the BSI are.
  • Know various methods of implementing Industrial Security.
  • Know the different types of attackers.
  • Know various methods of implementing Industrial Security.
  • Know additional counter measures for Industrial Security.
  • Know how risk can be defined.
  • Understand what a risk analysis is.
  • Understand why a risk analysis is necessary.
  • Know tips for the practical implementation of a risk analysis.
  • Understand how technology, processes, and people are related.
  • Know the Defense-in-Depth security concept.
  • Know what network IDS is.
  • Know what anomaly detection is.
  • Know for which systems anomaly detection is important.
  • Understand why detecting attacks is important.
  • Know which components and access points should be monitored.
  • Understand why system monitoring should be centrally integrated.
  • Know what emergency management is.
  • Understand how incident handling works.
  • Understand how IT forensics contributes to emergency management.
  • Understand how these concepts are part of a holistic approach Industrial Security.
  • Know what a recovery plan is.
  • Understand, why you shouldn't go without a recovery plan.
  • Know practical tips for creating a recovery plan.

Learning content

Industrial Security: What and Why?

What is Industrial Security? And why do we need it? Understand how industrial plants are threatened by attacks targeted at IT and get to know the goals of Industrial Security. We will also discuss what types of attacks and attackers there are. It is important to understand why and how to protect yourself.

Industrial Security Implementation

This chapter gives you an initial overview of the technical and organizational measures required to implement Industrial Security.

Systematic Identification of Threats

The basis for successful protection of industrial plants is to systematically identify what needs to be protected. This is achieved by means of risk analysis. In this chapter, you will first learn what risk is and then see how to perform a risk analysis.

A Systematic Approach to the Protection of Facilities

Get to know the role of technology and people in industrial security. Understand what is behind the "Defense in Depth" concept and how it is a central approach to achieving security in the industrial environment.

Detect Attacks

A goal for industrial security is not only to make life as difficult as possible for attackers, but also to detect threats as early as possible. This is exactly what we want to discuss in this Chapter.

Attack Response and Recovery

The goal of industrial security is to avoid attacks. However, this can never be 100% guaranteed. Therefore it is absolutely necessary to know what to do if something should happen. In this Chapter, we will discuss how to react when something happens and what role good recovery plans play in this context.

Test: Industrial Security

Test your knowledge on the basic concepts of industrial security with this short multiple-choice test.


Learning Contents

Summary of Learning Contents

Industrial Security: Threats and Requirements 

timelapse 0h 00m
  • Industrial Security: Threats and Requirements 
    extension interactive content

Ratings

Overall Rating

Average Rating
{{ summary.avg }}
{{ summary.total }} Rating {{ summary.total }} Ratings
{{ 5 - summaryRating }} stars:
{{ summaryCount }} Ratings

Reviews

from {{ rating.user.display_name }} am {{ rating.created_at | formatDate }}

Answer from {{ rating.answer_user.display_name }} Adminstrator am {{ rating.answered_at | formatDate }}

star_border

This training does not yet have ratings.

Questions & Discuss

Comments and Questions about the course

Do you have any questions about this course? Do you need more information about the process? Feel free to come back with your queries or share your experiences with us.

Please login to participate in this course discussion.
chat_bubble_outline

No comment available. Be the first one to leave a reply.


Courses you may also be interested in:

Preview image for training Social Media Guidelines Online Kurs
Digitalisierung
Social Media Guidelines
Preview image for training Online Kurs Digitale Transformation - Einführung
Digitalisierung
Digitale Transformation - Einführung
Preview image for training Online Kurs Digitale Welt - Einführung
Digitalisierung
Digitale Welt - Einführung
Preview image for training Online Kurs Social Media Revolution
Digitalisierung
Social Media Revolution