Programme Outline
Learning Objectives
- Learn how to defend IT/OT connected systems, include maintaining an oversight on the cybersecurity architecture
- Learn about common cyber vulnerabilities and the importance of understanding the environment they are tasked to protect so as to improve and maintain Information Technology/Operational Technology/(IT/OT) cybersecurity posture
- Learn the strengths and weaknesses of systems to identify mitigation strategies, policies, programs and security technologies that will provide the defence-in-depth needed to ensure a more secure Operational Technology(OT) environment and its integration
- Enhance cyber skills through hands-on exercise where participants are either attacking (Red Team) or defending (Blue Team) Information Technology/Operational Technology/(IT/OT) networks
- Build an understanding on best practices to better protect our critical information infrastructure
Day 1
- IT versus OT network
- Wireless technologies, attacks, and defences
- ICS Architecture
- Defence 1 – Corporate IT
- Network Discovery
Day 2
- Defence 2 – IDS / Firewall
- Cyber Defence 1
- Cyber Defence 2
- Attacker Perspective 1
- iTrust testbed tour
Day 3
- Attacker Perspective 2
- Can you hack it?
- Red and Blue Team Strategy discussion
- In-class Open-ended/MCQ assessment
Day 4
- Cyber Exercise
Assessment
- MCQ
- Open-ended Assessment