Digitalisierung

Industrial Security: Threats and Requirements

von University4Industry
Zurück zu 'Online-Kurse'
Zur Kasse Warenkorb bearbeiten Gutschein vorhanden? Für andere buchen? Dann auf zum Warenkorb!
Vorschaubild für das Training Industrial Security: Threats and Requirements
inkl. MwSt. 89,00

Kursmerkmale

  • Teilnahmebescheinigung von TÜV Rheinland
  • Unbegrenzter Zugriff
  • Kursniveau: Einsteiger
  • Lernumfang: Nicht vorhanden
  • Sprache: englisch
Zielgruppen:
für alle Zielgruppen

Kursübersicht

Über den Online-Kurs

Nowadays, everyone knows about the importance of IT security but there is also industrial security. Unfortunately, knowledge in the area of industrial security is usually not as good as the knowledge about office IT security. In this Skill, you will acquire basic knowledge of this essential topic. You will learn why there is such a great need for action in the field of industrial security and the cornerstones for implementation. You will get a first overview of methods and technologies to make IT secure in the industrial sector.

This Skill raises awareness of threats in industrial environments and provides basic knowledge about typical attacks and protective measures.

Target group

This online course is aimed at all employees who have an active influence on cybersecurity in production. It is also aimed at all employees who need to acquire basic knowledge in this area.

Learning objectives

  • Understand why Industrial Security is important.
  • Know what the objective of Industrial Security is.
  • Know what the top 10 threats according to the BSI are.
  • Know various methods of implementing Industrial Security.
  • Know the different types of attackers.
  • Know various methods of implementing Industrial Security.
  • Know additional counter measures for Industrial Security.
  • Know how risk can be defined.
  • Understand what a risk analysis is.
  • Understand why a risk analysis is necessary.
  • Know tips for the practical implementation of a risk analysis.
  • Understand how technology, processes, and people are related.
  • Know the Defense-in-Depth security concept.
  • Know what network IDS is.
  • Know what anomaly detection is.
  • Know for which systems anomaly detection is important.
  • Understand why detecting attacks is important.
  • Know which components and access points should be monitored.
  • Understand why system monitoring should be centrally integrated.
  • Know what emergency management is.
  • Understand how incident handling works.
  • Understand how IT forensics contributes to emergency management.
  • Understand how these concepts are part of a holistic approach Industrial Security.
  • Know what a recovery plan is.
  • Understand, why you shouldn't go without a recovery plan.
  • Know practical tips for creating a recovery plan.

Learning content

Industrial Security: What and Why?

What is Industrial Security? And why do we need it? Understand how industrial plants are threatened by attacks targeted at IT and get to know the goals of Industrial Security. We will also discuss what types of attacks and attackers there are. It is important to understand why and how to protect yourself.

Industrial Security Implementation

This chapter gives you an initial overview of the technical and organizational measures required to implement Industrial Security.

Systematic Identification of Threats

The basis for successful protection of industrial plants is to systematically identify what needs to be protected. This is achieved by means of risk analysis. In this chapter, you will first learn what risk is and then see how to perform a risk analysis.

A Systematic Approach to the Protection of Facilities

Get to know the role of technology and people in industrial security. Understand what is behind the "Defense in Depth" concept and how it is a central approach to achieving security in the industrial environment.

Detect Attacks

A goal for industrial security is not only to make life as difficult as possible for attackers, but also to detect threats as early as possible. This is exactly what we want to discuss in this Chapter.

Attack Response and Recovery

The goal of industrial security is to avoid attacks. However, this can never be 100% guaranteed. Therefore it is absolutely necessary to know what to do if something should happen. In this Chapter, we will discuss how to react when something happens and what role good recovery plans play in this context.

Test: Industrial Security

Test your knowledge on the basic concepts of industrial security with this short multiple-choice test.


Lerninhalte

Übersicht der Lerninhalte

Industrial Security: Threats and Requirements 

timelapse 0h 00m
  • Industrial Security: Threats and Requirements 
    extension Interaktiver Inhalt

Bewertungen

Gesamtbewertung

Durchschnittliche Bewertungen
{{ summary.avg }}
{{ summary.total }} Bewertungen
{{ 5 - summaryRating }} stars:
{{ summaryCount }} Bewertungen

Rezensionen

von {{ rating.user.display_name }} am {{ rating.created_at | formatDate }}

Antwort von {{ rating.answer_user.display_name }} Mitarbeiter am {{ rating.answered_at | formatDate }}

star_border

Dieses Training hat noch keine Rezension erhalten.

Fragen & Diskussion

Kommentare und Fragen zum Kurs

Du hast noch Fragen zum Kurs? Du möchtest Dir ein genaueres Bild vom Ablauf machen? Egal ob Du Deine eigenen Erfahrungen mit der Lerngemeinschaft teilen möchtest oder Rückfragen zu einzelnen Inhalten hast: Beteilige Dich einfach an den Diskussionen zu diesem Kurs.

Bitte logge Dich ein um das Training zu kommentieren.
chat_bubble_outline

Es ist noch kein Kommentar vorhanden. Schreib den ersten Kommentar.


Kurse, die Dich ebenfalls interessieren könnten:

Vorschaubild für das Training Social Media Guidelines Online Kurs
Digitalisierung
Social Media Guidelines
Vorschaubild für das Training Online Kurs Digitale Transformation - Einführung
Digitalisierung
Digitale Transformation - Einführung
Vorschaubild für das Training Online Kurs Digitale Welt - Einführung
Digitalisierung
Digitale Welt - Einführung
Vorschaubild für das Training Online Kurs Social Media Revolution
Digitalisierung
Social Media Revolution