This webpage, from National Cybersecurity Training and Education (NCYTE) Center, is a course titled Critical Infrastructure Cybersecurity. The course introduces students to "basic security concepts as they apply to critical infrastructure systems." The course is available by way of e-book and consists of 12 modules with the following titles: Introduction to Critical Infrastructure, Introduction to Control Systems and SCADA, Technologies, Risk Management, Threats, Vulnerabilities, Risk Assessments, Remediation, Incident Response, Policy & Governance, Trends, and Sector Reports Out. Also included in the e-book are the following sections: Course Description, Prerequisites, Technology Requirements, Objectives & Outcomes, Supplemental Materials & Resources, and More. 

Also included on the webpage is a two-hour webinar that introduces the new Critical Infrastructure Cybersecurity course sponsored, published, and made available to instructors for their free use by NCYTE Center. In the video community college instructors will learn from presenters Stephen Miller (Eastern New Mexico University - Ruidoso), Margaret Leary (Northern Virginia Community College), and Christie Jones (George Mason University) how to adapt the eleven-lesson course for their institutions.To view the webinar users will need to download the WebEx Network Recording Player. This player is available free for download.

At the conclusion of the course, students will be able to:

  • Define CI sectors and identify legislation and standards addressing CI protection.
  • Define common terms and concepts associated with CI, including ICS, SCADA, PCS, and DCS.
  • Identify the components and process of implementing a CISR risk management program.
  • Describe cybersecurity services such as confidentiality, integrity, availability, and authentication as they apply to CI systems.
  • Select appropriate vulnerability assessment frameworks and tools as part of a risk assessment of a CI system.
  • Identify and describe cybersecurity threats, risks, vulnerabilities, and attacks as they apply to CI systems.
  • Identify an appropriate risk management strategy for CISR.
Add Comment

Comments

(no comments available yet)