About this course
Welcome to the course on “Fundamentals of cybersecurity in OT environments”! In this course you will explore the field of OT cybersecurity, will learn why it is crucial for any organization and worker to understand, implement and promote a cybersecurity culture and will develop knowledge and skills relevant for this field.
Although you do not need prior knowledge in cybersecurity to profit from this course, the course is addressed to IT professionals working or teaching in the field of network management and OT professionals working or teaching in the field of automation, so basic knowledge of IT and OT concepts will definitely help.
Learning outcomes
- Understanding what a cybersecurity culture is, being able to implement it within the profession and to promote it within an organization.
- Understanding what is the intersection between IT and OT in terms of cybersecurity
- Identification of vulnerabilities in the interconnected industry
- Description of the main industrial communication protocols used in OT networks
- Identification of the roles and responsibilities of IT and OT workers related to network segmentation
- Description and comparison of network segmentation models
- Knowledge and understanding of intrusion detection and prevention
- Knowledge and understanding of industrial firewalls and packet inspection.
- Knowledge and understanding of the main cybersecurity standards and regulations applied to OT environments in Europe
- Understanding of centralized security management systems
- Knowledge of real-time threat detection techniques using AI tools and applications
Skills (tags cloud, linked to ESCO)
Cybersecurity, manage system security, internal risk management policy, security threats, implement a firewall, levels of software testing, ICT security legislation, cyber-attack counter-measures, assessment of risks and threats, ICT performance analysis methods, information security strategy
Curriculum
- 5 Sections
- 8 Lessons
- 20 Hours
- Module 1. Introduction to cybersecurity in OT environmentsBRIEF DESCRIPTION OF THE MODULE. TRAINER: NAME + BRIEF DESCRIPTION. DURATION: . TOPICS: TAKE THE ONES FROM THE LESSON PLAN / DIDACTIC UNIT9
- 1.1CHAPTER 1. PROMOTING A CYBERSECURITY CULTURE
- 1.2CHAPTER 2. WHAT IS OPERATIONAL TECHNOLOGY (OT)?
- 1.3CHAPTER 3. OT VERSUS IT: TWO DISTINCT WORLDS
- 1.4CHAPTER 4. THE PURDUE MODEL: A REFERENCE FOR OT SECURITY
- 1.5CHAPTER 5. CYBERSECURITY IN OT. CHALLENGES AND APPROACHES
- 1.6CHAPTER 6. REAL-WORLD OT CYBERATTACKS
- 1.7CHAPTER 7. CONSEQUENCES AND RESPONSES TO OT ATTACKS
- 1.8CHAPTER 8. MAJOR CHALLENGES IN OT CYBERSECURITY
- 1.9EVALUATION TEST20 Minutes5 Questions
- Module 2. Segmentation and industrial protocolsModule 2. Segmentation and industrial protocols0
- Module 3. Intrusion Detection Systems (IDS) for business continuity managementModule 3. Intrusion Detection Systems (IDS) for business continuity management0
- Module 4. OT cybersecurity standards and regulationsModule 4. OT cybersecurity standards and regulations0
- Module 5. Centralized security management systems and AI applicationsModule 5. Centralized security management systems and AI applications0

