Upload
daniel-barber
View
76
Download
0
Embed Size (px)
DESCRIPTION
Advanced SCADA System (Design, Commissioning, Start Up and Troubleshooting)
Citation preview
Advanced SCADA System (Design, Commissioning, Start up and Troubleshooting)
Senior Wastewater Treatment and process Engineer at Engicon with a B.Sc. in chemical and Environmental Engineering from Sarajevo Universityand Alexandria University, Egypt (Pollution Control). He has 38 years of a unique experience in the water and environmental sectors both nationally and international. Capacity building and training has been an integral part of Abdul WahabMatar’s work throughout his career. He was an expert responsible for upgrading and training local staff and operation of Sana’ treatment plant with a capacity of 50,000 m3/day and extended aeration process.
Who Should Attend • SCADA Systems Personnel
• Engineers and Operations
• Process Engineers and Managers
• Operations and Maintenance Managers, Engineers and Technicians
• Hardware and Instrument Specialists
• Business System Analysts Who Support SCADA Interfaces
• System and Application Programmers
• Project Managers
• Telecommunications and Wireless Support Personnel
ICTD International Center for
Training and Development
Tel.: +971 (0) 2 6322275
Fax: +971 (0) 2 6342422
Abu Dhabi – UAE
14–18 Sep 2014
Dubai, UAE
12–16 Oct 2014
Al Khobar, KSA
INTRODUCTION This course provides advanced SCADA technical overview of the emerging trends, advanced applications, operations, management and security.
COURSE OUTLINES Module (01) Introduction to SCADA Operations and Security
1.1 Industrial Computing Applications and SCADA Systems
1.2 Telecommunications Services 1.3 Types of SCADA Networks 1.4 SCADA Network Operations and Management 1.5 Communications Media and Signals 1.6 SCADA Reliability, Redundancy and Safety 1.7 Planning and Managing SCADA Projects 1.8 SCADA Technical Operations' 1.9 SCADA Project Management 1.10 SCADA Characteristics, Threats and
Vulnerabilities 1.11 Comparing SCADA and IT Systems 1.12 Threats 1.13 Potential SCADA Vulnerabilities 1.14 Policy and Procedure Vulnerabilities 1.15 Platform Vulnerabilities 1.16 Network Vulnerabilities 1.17 Risk Factors 1.18 Standardized Protocols and Technologies 1.19 Increased Connectivity 1.20 Insecure and Rogue Connections 1.21 Public Information 1.22 Possible Incident Scenarios 1.23 Sources of Incidents 1.24 Documented Incidents
Module (02) SCADA Security Program Development and Deployment
2.1 Business Case for Security 2.2 Potential Consequences 2.3 Key Components of the Business Case 2.4 Resources for Building Business Case 2.5 Presenting the Business Case to Leadership 2.6 Developing a Comprehensive Security
Program 2.7 SCADA Security Network Architecture 2.8 Firewalls 2.9 Logically Separated Control Network 2.10 Network Segregation 2.11 Dual-‐Homed Computer/Dual Network
Interface Cards (NIC) 2.12 Firewall between Corporate Network and
Control Network 2.13 Firewall and Router between Corporate
Network and Control Network 2.14 Firewall with DMZ between Corporate
Network and Control Network 2.15 Paired Firewalls between Corporate
Network and Control Network
COURSE OBJECTIVES By the end of this program, Participants will: § Explain the basic SCADA operations
§ Explore Advanced SCADA Systems
§ Review telecommunications services related to SCADA
§ SCADA Network Operations and Management
§ Describe SCADA security architecture
§ Describe the security issues with a SCADA system
§ Design a SCADA Security Policy
§ Look at access control to field devices with Microsoft Active Directory
§ Review interception and analyzing Modbus/TCP network traffic with a sniffer
§ Understand unauthorized commands to field device
§ Setup and configure a Modbus/TCP firewall
§ Review SCADA security policies
§ Understand Firewall architecture, DMZ, and rule bases § Review SCADA protocol security issues § Understand Securing field communications § Explore user authentication technologies and integration with SCADA
applications § Review access control principles and implementation § Look at active Directory integration with SCADA applications § Explore how to Detect cyber attacks on SCADA systems § Explore vulnerability scanning § Review security patch management § Review anti-‐virus protection and management § Review SCADA security standards
TRAINING METHODOLOGY This training program is lecture-‐based and customized to the needs of the audience, providing meaningful experience. Daily sessions include formal presentation, prepared in the Power Point, interspersed with directed discussion and case study. In addition to formal lectures and discussions, the delegates will learn by active participation through the use of self-‐assessment, group discussions, analysis of real-‐life case studies.
CERTIFICATES Certificate will be issued from the International Centre for Training & Development (ICTD) to all attendees completing minimum of 85% of the total training hours.
COURSE OUTLINE
2.16 Network Segregation Summary 2.17 Recommended Defense-‐in-‐Depth Architecture 2.18 General Firewall Policies for SCADA 2.19 Recommended Firewall Rules for Specific Services 2.20 Domain Name System (DNS) 2.21 Hypertext Transfer Protocol (HTTP) 2.22 FTP and Trivial File Transfer Protocol (TFTP) 2.23 Telnet 2.24 Simple Mail Transfer Protocol (SMTP) 2.25 Simple Network Management Protocol (SNMP) 2.26 Distributed Component Object Model (DCOM) 2.27 SCADA and Industrial Protocols 2.28 Network Address Translation (NAT ) 2.29 Specific SCADA Firewall Issues 2.30 Data Historians 2.31 Remote Support Access 2.32 Multicast Traffic 2.33 Single Points of Failure 2.34 Redundancy and Fault Tolerance 2.35 Preventing Man-‐in-‐the-‐Middle Attacks
Module (03) SCADA Security Controls
3.1 Management Controls
3.2 Risk Assessment 3.3 Planning 3.4 System and Services Acquisition 3.5 Certification, Accreditation, and Security Assessments 3.6 Operational Controls 3.7 Personnel Security 3.8 Physical and Environmental Protection 3.9 Contingency Planning 3.10 Configuration Management 3.11 Maintenance 3.12 System and Information Integrity 3.13 Media Protection 3.14 Incident Response 3.15 Awareness and Training 3.16 Identification and Authentication 3.17 Access Control 3.18 Audit and Accountability 3.19 System and Communications Protection 3.20 Programmable Logic Controllers (PLC) 3.21 Industrial Sectors and Their Interdependencies
MODULE (04) Wireless Security Applied to SCADA
4.1 Overview of Current Wireless Technologies 4.2 802.11, 802.15 and 802.16 Technologies 4.3 Overview of Wireless Security 4.4 WEP 4.5 TKIP and the WPA/WPA2 4.6 IEEE 802.11i 4.7 Authentication, Encryption, and Integrity Methods 4.8 Cellular/Mobile Interworking
TIMING SCHEDULE
Daily Course Timings
07:30 – 08:00 Morning Coffee / Tea
08:00 -‐ 10:00 First Session
10:00 -‐ 10:20 Coffee / Tea / Snacks
10:20 -‐ 12:20 Second Session
12:20 -‐ 13:30 Lunch Break & Praying Time
13:30 -‐ 15:00 Last Session
COURSE FEES
3,300 US$ This rate includes participant’s
manual, Hands-‐Outs, buffet lunch,
coffee/tea on arrival, morning & afternoon
of each day.
Registration deadlines:
Seven days prior to course offering
Send (3) delegates and get a 10% discount on the third participant.
IN-‐HOUSE BENEFITS
ü A tailored approach
ü Reduced costs
ü Reduce disruption
ü Convenient
REGISTRATION FORM ICTD -‐ International Center for Training and Development
To register, please email/fax this page to us. For more information or IN-‐HOUSE, contact: Mr. Ahmed Al Gohary +971 (0) 526472884 [email protected] For full list of courses, visit our website at http://www.ictd.org Course/Seminar Title: Course Date: Participant Details (for additional participants, please make copies of this form) NAME JOB TITLE EMAIL ADDRESS
MOBILE
1.
2.
3.
4.
For us to serve you better in the future, please indicate your mode of referral for this training course:
Existing ICTD Client ICTD Website ICTD Email-‐Flyers Online Others Please indicate by putting an “X” in the relevant box,.
Company Name: Company Address:
Registration Contact -‐ QA / HR NAME JOB TITLE EMAIL ADDRESS TELEPHONE
Accounts / Billing Contact NAME JOB TITLE EMAIL ADDRESS TELEPHONE
Payment Terms (Please indicate CHEQUE/CASH / BANKTRANFER) Please contact ICTD
Terms and Conditions 1. Participant registration is confirmed upon receipt of registration form. 2. Courses will be confirmed 3 weeks before date of commencement of course. 3. Once a course is confirmed, full payment has to be made immediately. 4. ICTD, Abu Dhabi reserves the right to reschedule or cancel any course in the event of unforeseen circumstances; every effort will be made to inform the participants. 5. Full fees are refundable provided written notification is received 14 days before course commencement, and 50% of the fee is chargeable if notification is received within 14 days preceding course commencement. After which full course fees will be charged. 6. By submitting this registration form, you have accepted and agreed to the terms and conditions as stated
©2014 -‐ 2015 International Center for Training and Development. LLC, Abu Dhabi, UAE