HTME

COURSE OVERVIEW

IE0700 : Cyber Security | Digital Forensics
Cyber Security | Digital Forensics
OVERVIEW
COURSE TITLE : IE0700 : Cyber Security | Digital Forensics
COURSE DATE : May 04 - May 08 2025
DURATION : 5 Days
INSTRUCTOR : Dr. Abedallah Al-Oqaili
VENUE : Dubai, UAE
COURSE FEE : $ 5500
Register For Course Outline

Course Description

This practical and highly-interactive course includes various practical sessions and exercises. Theory learnt will be applied using one of our state-of-theart simulators. The use of interconnected microprocessors in industrial systems has grown exponentially over the past decade. Deployed for process control in Programmable Logic Controllers (PLC) and Distributed Control Systems (DCS) for many years, they have now moved into Intelligent Electronic Devices (IED) in applications such as substations, Motor Control Centers (MCC), and heat trace systems. The concern is that their connecting networks have grown as well, usually without much attention to the security ramifications. Intrusions, intentional and unintentional, can cause safety, environmental, production and quality problems. The need for protecting Industrial Control Systems has grown significantly over the last few years. The combination of open systems; an increase in joint ventures; alliance partners and outsourced services; growth in intelligent manufacturing equipment; increased connectivity to other equipment/software; enhanced external connectivity; along with rapidly increasing incidents of network intrusion, more intelligent hackers, and malicious software, all lead to increased threats and probability of attack. As these threats and vulnerabilities increase, so does the need for protection of Industrial and Control Systems.The course provides participants with practical methods for evaluation and assessment of many current types of electronic security technologies and tools that apply to the Industrial Control Systems environment, including development, implementation, operations, maintenance, engineering and other user services. It provides guidance to manufacturers, vendors, and security practitioners at end-user companies on the technological options for securing these systems against electronic (cyber) attack.

link to course overview PDF

TRAINING METHODOLOGY

This interactive training course includes the following training methodologies:

Lectures
Workshops & Work Presentations
Case Studies & Practical Exercises
Videos, Software & Simulators

In an unlikely event, the course instructor may modify the above training methodology for technical reasons.

VIRTUAL TRAINING (IF APPLICABLE)

If this course is delivered online as a Virtual Training, the following limitations will be applicable:

Certificates : Only soft copy certificates will be issued
Training Materials : Only soft copy materials will be issued
Training Methodology : 80% theory, 20% practical
Training Program : 4 hours per day, from 09:30 to 13:30

RELATED COURSES

Understanding and Tuning Controllers and Control Loops

IE0131 : Understanding and Tuning Controllers and Control Loops

Maintain Process Control Systems

IE0031 : Maintain Process Control Systems

PLC & SCADA for Automation & Process Control

IE0190 : PLC & SCADA for Automation & Process Control

GWR Level Transmitter, Process Measurement Products III Level and HART Radar Level Transmitter

IE0711 : GWR Level Transmitter, Process Measurement Products III Level and HART Radar Level Transmitter