• Skip to main content
  • Skip to primary sidebar

crackthe.net

SINCE 2010

  • Hacking
  • Security
    • Cloud Security
    • Network Security
    • OS Security
    • OT Security
    • SoC Security
    • Web Security
  • VPN
    • Filesharing
    • Streaming
  • Hosting
crackthe.net / Security / OT Security / OT Security Certifications (GICSP, GRID, GCIP)

OT Security Certifications (GICSP, GRID, GCIP)

Global Industrial Cyber Security Professional (GICSP)

The GICSP bridges together IT, engineering and cyber security to achieve security for industrial control systems from design through retirement. This unique vendor-neutral, practitioner focused industrial control system certification is a collaborative effort between GIAC and representatives from a global industry consortium involving organizations that design, deploy, operate and/or maintain industrial automation and control system infrastructure. GICSP will assess a base level of knowledge and understanding across a diverse set of professionals who engineer or support control systems and share responsibility for the security of these environments.

ICS410: ICS/SCADA Security Essentials

ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.

GIAC Response and Industrial Defense (GRID)

The GRID certification is for professionals who want to demonstrate that they can perform Active Defense strategies specific to and appropriate for an Industrial Control System (ICS) network and systems. Candidates are required to demonstrate an understanding of the Active Defense approach, ICS-specific attacks and how these attacks inform mitigation strategies. Candidates must also show an understanding of the strategies and fundamental techniques specific to core subjects with an ICS-focus such as network security monitoring (NSM), digital forensics and incident response (DFIR).

ICS515: ICS Active Defense and Incident Responsey

ICS515: ICS Active Defense and Incident Response will help you deconstruct industrial control system cyber attacks, leverage an active defense to identify and counter threats in your ICS, and use incident response procedures to maintain the safety and reliability of operations.

GIAC Critical Infrastructure Protection (GCIP)

“The bulk electric system or “the grid” is arguably the most critical of the critical infrastructures demanding that personnel charged with supporting it, understand the impact of their actions and inactions with regard to system reliability, safety and security. The GIAC Critical Infrastructure Protection will help validate that the professionals who access, support and maintain the critical systems that keep the grid running have an understanding of the regulatory requirements of NERC CIP as well as practical implementation strategies to achieve both regulatory compliance and its cyber security objectives.” -Ted Gutierrez, co-author of SANS ICS456: Essentials for NERC Critical Infrastructure Protection.

ICS612: ICS Cybersecurity In-Depth

ICS612 is an in-classroom lab setup that move students through a variety of exercises that demonstrate how an adversary can attack a poorly architected ICS and how defenders can secure and manage the environment. Representative of a real ICS environment, the classroom setup includes a connection to the enterprise, allowing for data transfer (i.e., Historian), remote access, and other typical corporate functions.

  • ATT&CK® for Industrial Control Systems (ICS)
  • Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities
  • Adversarial Attacks on Machine Learning Cybersecurity Defences in ICS
  • Cybersecurity for Industrial Control Systems: A Survey
  • Architecture and Security of SCADA Systems: A Review
  • Assessing Cyber-Physical Security in Industrial Control Systems
  • Anomaly Detection for Industrial Control Networks using Machine Learning
  • An IT-Security Fuzzing Framework for Proprietary ICS Protocols
  • Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams
  • A Public Network Trace of a Control and Automation System

Primary Sidebar

posts

  • Ethical Hacking Online Courses
  • IT Security Online Courses
  • CISSP Exam Preparation
  • CEH, LPT & OSCP Exam Preparation
  • Top Ethical Hacker Forums
  • Virtual Penetration Testing Labs
  • Best VPN Service Provider
  • Best Filehoster
  • Best Public Torrent Sites
  • Managed WordPress Hosting
  • WordPress Security

contact

If you have any questions, don’t hesitate to get in touch: mail [at] crackthe.net, XING or LinkedIn. You can also follow me on Twitter.
© 2010 - 2021 crackthe.net • Site Notice • Privacy Policy