Prérequis
No industrial safety experience required. However, knowledge of industrial systems and some notions of IT, electronics and embedded software are desirable.
- A PC / MAC with Teams installed and unrestricted access to the Internet.
If remote :
- Stable Internet access via Ethernet or Wi-Fi with a decent bandwidth (1.2 Mb/s minimum downstream is recommended).
Public concerné
This course is aimed at people interested in the design aspects of industrial architecture. Electronics enthusiasts and professionals, as well as IT security professionals (developers, architects, integrators, hardware designers, project managers).
Objectif
This training course aims to raise awareness among system and product architects of the cybersecurity concerns, issues, constraints and challenges that can impact their current responsibilities, deliverables and day-to-day work.
Formateur
Expert in industrial cybersecurity.
Teaching methods
- Projected PowerPoint presentation
- Interactive web platform (Klaxoon)
- Practical attack/defense scenario on a connected mini-factory
Assessment methods
Assessments at the beginning and end of the course, quizzes, etc.
A training certificate complying with the provisions of Article L.6353-1 paragraph 2 is issued to the trainee.
Registration deadline
5 working days before the start of the course (if OPCO funding).
Programme
INTRODUCTION AND SECURITY STANDARDS
- Introduction with key concepts and differences between IT and OT environments
- Threat overview and industrial cybersecurity risk analysis
- Introduction to IEC 62443 methodology and risk assessment
- Practical workshops on the definition of a SuC (System under consideration) and risk assessment according to IEC 62443
- Key concepts of IEC 62443 (zones, conduits and risk analysis methodologies)
- Defense-in-depth and the different layers of security (organizational, physical, perimeter)
- Demonstration: access system security, using Mifare technology as an example
NETWORK SECURITY AND CRYPTOLOGY
- System security and basic network security principles
- Demonstration of a brute-force attack on a WPA2 network
- Introduction to cryptology: presentation of key concepts (symmetric and asymmetric encryption, hash, salt and pepper)
- Demonstration of how to exploit a vulnerability in precompiled Python files containing secrets
PRODUCT SECURITY AND SECURE ARCHITECTURE
- Secure Software Lifecycle (SDLC) and best practices for secure software development
- Host and application security
- Demonstration of vulnerabilities affecting poorly protected USB ports with personnel unaware of attacks from seemingly innocuous devices.
- Demonstration of a replay attack using exploits on a bulletin board.
- Data security
- Practical workshops on detailed risk assessment, risk estimation and definition of security levels according to IEC 62443.
- Methods for identifying and dealing with vulnerabilities
- Presentation of best practices for designing a robust and secure architecture
Detailed programm
DAY 1
INTRODUCTION
- Introducing SERMA
CYBERSECURITY IN THE INDUSTRIAL WORLD
- Understanding cybersecurity in an industrial context
- Threats and attack methodologies
- IT / OT divergence and convergence
ISA/IEC 62443 STANDARD
- Understanding the concepts of the standard
- Risk assessment process
- Initial assessment of detailed risks
- Risk acceptance and comparison
WORKSHOPS
- WS1 – Define the system under consideration
- WS2 – Perform initial risk assessment
- WS3 – Partition Zones and Conduits
DAY 2
ISA/IEC 62443 STANDARD
- Detailed risk assessment process
DEFENSE IN DEPTH
- Systems – Physical security
- Systems – Perimeter security
- Systems – Internal network security
DEMONSTRATION
- Classic Mifare case
- Brute force WPA2 attack and ARP spoofing
- Crypto: poorly implemented encryption
CRYPTOGRAPHY
- Symmetric and asymmetric
- Certificate and PKI (Public Key Infrastructure)
- Hash function with salt and pepper
WORKSHOPS
- WS4 – Detailed risk assessment (1/2) – Threat scenarios
DAY 3
ISA/IEC 62443 STANDARD
- Secure product development lifecycle
- Fundamental requirements
DEFENSE IN DEPTH
- Product – Host security
- Product – Application security
- Product – Data security
DEMONSTRATION
- Rubber Ducky – USB attack
- Radio frequency – Replay attack
WORKSHOPS
- WS5 – Detailed risk assessment (2/2) – Risk estimation
- WS6 – Definition of security levels
- WS7 – Specification of cybersecurity requirements
VULNERABILITY DETAILS
- MCS, CVE & CVSS
Sessions
- Date sur demande, toute l'année (Remote learning)
Tarif
- Price intra-company : On request
- Price Online : On request
2023 :
Satisfaction rate : 81%
Number of sessions : 2
Number of trainees : 11
REGISTRATIONS and INFORMATIONS :
- Email : formation@serma.com
- Tel. : +33 (0)5 57 26 29 92
- Fax : +33 (0)5 57 26 08 98
- Via the Contact form