(Design, Commissioning, Start up and Troubleshooting)
Senlor WasLewaLer 1reaLmenL and process Lnglneer aL Lnglcon wlLh a 8.Sc. ln chemlcal and LnvlronmenLal Lnglneerlng from Sara[evo Un|vers|tyand Alexandrla unlverslLy, LgypL (olluLlon ConLrol). Pe has 38 years of a unlque experlence ln Lhe waLer and envlronmenLal secLors boLh naLlonally and lnLernaLlonal. CapaclLy bulldlng and Lralnlng has been an lnLegral parL of Abdu| WahabMatar's work LhroughouL hls career. Pe was an experL responslble for upgradlng and Lralnlng local sLaff and operaLlon of Sana' LreaLmenL planL wlLh a capaclLy of S0,000 m3]day and exLended aeraLlon process.
Who Should Attend SCADA Systems Personnel Engineers and Operations Process Engineers and Managers Operations and Maintenance Managers, Engineers and Technicians Hardware and Instrument Specialists Business System Analysts Who Support SCADA Interfaces System and Application Programmers Project Managers Telecommunications and Wireless Support Personnel
"#$% International Center for Training and Development Tel.: +971 (0) 2 6322275 Fax: +971 (0) 2 6342422 Abu Dhabi UAE 1418 Sep 2014
Dubai, UAE 1216 Oct 2014
Al Khobar, KSA
ln18CuuC1lCn 1hls course provldes advanced SCAuA Lechnlcal overvlew of Lhe emerglng Lrends, advanced appllcaLlons, operaLlons, managemenL and securlLy.
CCu8SL Cu1LlnLS Modu|e (01) Introduct|on to SCADA Cperat|ons and Secur|ty 1.1 lndusLrlal CompuLlng AppllcaLlons and SCAuA SysLems 1.2 1elecommunlcaLlons Servlces 1.3 1ypes of SCAuA neLworks 1.4 SCAuA neLwork CperaLlons and ManagemenL 1.3 CommunlcaLlons Medla and Slgnals 1.6 SCAuA 8ellablllLy, 8edundancy and SafeLy 1.7 lannlng and Managlng SCAuA ro[ecLs 1.8 SCAuA 1echnlcal CperaLlons' 1.9 SCAuA ro[ecL ManagemenL 1.10 SCAuA CharacLerlsLlcs, 1hreaLs and vulnerablllLles 1.11 Comparlng SCAuA and l1 SysLems 1.12 1hreaLs 1.13 oLenLlal SCAuA vulnerablllLles 1.14 ollcy and rocedure vulnerablllLles 1.13 laLform vulnerablllLles 1.16 neLwork vulnerablllLles 1.17 8lsk lacLors 1.18 SLandardlzed roLocols and 1echnologles 1.19 lncreased ConnecLlvlLy 1.20 lnsecure and 8ogue ConnecLlons 1.21 ubllc lnformaLlon 1.22 osslble lncldenL Scenarlos 1.23 Sources of lncldenLs 1.24 uocumenLed lncldenLs
Modu|e (02) SCADA Secur|ty rogram Deve|opment and Dep|oyment 2.1 8uslness Case for SecurlLy 2.2 oLenLlal Consequences 2.3 key ComponenLs of Lhe 8uslness Case 2.4 8esources for 8ulldlng 8uslness Case 2.3 resenLlng Lhe 8uslness Case Lo Leadershlp 2.6 ueveloplng a Comprehenslve SecurlLy rogram 2.7 SCAuA SecurlLy neLwork ArchlLecLure 2.8 llrewalls 2.9 Loglcally SeparaLed ConLrol neLwork 2.10 neLwork SegregaLlon 2.11 uual-Pomed CompuLer/uual neLwork lnLerface Cards (nlC) 2.12 llrewall beLween CorporaLe neLwork and ConLrol neLwork 2.13 llrewall and 8ouLer beLween CorporaLe neLwork and ConLrol neLwork 2.14 llrewall wlLh uMZ beLween CorporaLe neLwork and ConLrol neLwork 2.13 alred llrewalls beLween CorporaLe neLwork and ConLrol neLwork
CCu8SL C8!LC1lvLS 8y Lhe end of Lhls program, arLlclpanLs wlll: ! Lxplaln Lhe baslc SCAuA operaLlons ! Lxplore Advanced SCAuA SysLems ! 8evlew LelecommunlcaLlons servlces relaLed Lo SCAuA ! SCAuA neLwork CperaLlons and ManagemenL ! uescrlbe SCAuA securlLy archlLecLure ! uescrlbe Lhe securlLy lssues wlLh a SCAuA sysLem ! ueslgn a SCAuA SecurlLy ollcy ! Look aL access conLrol Lo fleld devlces wlLh MlcrosofL AcLlve ulrecLory ! 8evlew lnLercepLlon and analyzlng Modbus/1C neLwork Lrafflc wlLh a snlffer ! undersLand unauLhorlzed commands Lo fleld devlce ! SeLup and conflgure a Modbus/1C flrewall ! 8evlew SCAuA securlLy pollcles ! undersLand llrewall archlLecLure, uMZ, and rule bases ! 8evlew SCAuA proLocol securlLy lssues ! undersLand Securlng fleld communlcaLlons ! Lxplore user auLhenLlcaLlon Lechnologles and lnLegraLlon wlLh SCAuA appllcaLlons ! 8evlew access conLrol prlnclples and lmplemenLaLlon ! Look aL acLlve ulrecLory lnLegraLlon wlLh SCAuA appllcaLlons ! Lxplore how Lo ueLecL cyber aLLacks on SCAuA sysLems ! Lxplore vulnerablllLy scannlng ! 8evlew securlLy paLch managemenL ! 8evlew anLl-vlrus proLecLlon and managemenL ! 8evlew SCAuA securlLy sLandards
18AlnlnC ML1PCuCLCC? 1hls Lralnlng program ls lecLure-based and cusLomlzed Lo Lhe needs of Lhe audlence, provldlng meanlngful experlence. ually sesslons lnclude formal presenLaLlon, prepared ln Lhe ower olnL, lnLerspersed wlLh dlrecLed dlscusslon and case sLudy. ln addlLlon Lo formal lecLures and dlscusslons, Lhe delegaLes wlll learn by acLlve parLlclpaLlon Lhrough Lhe use of self- assessmenL, group dlscusslons, analysls of real-llfe case sLudles.
CL81lllCA1LS CerLlflcaLe wlll be lssued from Lhe lnLernaLlonal CenLre for 1ralnlng & uevelopmenL (lC1u) Lo all aLLendees compleLlng mlnlmum of 83 of Lhe LoLal Lralnlng hours.
CCu8SL Cu1LlnL 2.16 neLwork SegregaLlon Summary 2.17 8ecommended uefense-ln-uepLh ArchlLecLure 2.18 Ceneral llrewall ollcles for SCAuA 2.19 8ecommended llrewall 8ules for Speclflc Servlces 2.20 uomaln name SysLem (unS) 2.21 PyperLexL 1ransfer roLocol (P11) 2.22 l1 and 1rlvlal llle 1ransfer roLocol (1l1) 2.23 1elneL 2.24 Slmple Mall 1ransfer roLocol (SM1) 2.23 Slmple neLwork ManagemenL roLocol (SnM) 2.26 ulsLrlbuLed ComponenL Cb[ecL Model (uCCM) 2.27 SCAuA and lndusLrlal roLocols 2.28 neLwork Address 1ranslaLlon (nA1 ) 2.29 Speclflc SCAuA llrewall lssues 2.30 uaLa PlsLorlans 2.31 8emoLe SupporL Access 2.32 MulLlcasL 1rafflc 2.33 Slngle olnLs of lallure 2.34 8edundancy and laulL 1olerance 2.33 revenLlng Man-ln-Lhe-Mlddle ALLacks Modu|e (03) SCADA Secur|ty Contro|s 3.1 ManagemenL ConLrols 3.2 8lsk AssessmenL 3.3 lannlng 3.4 SysLem and Servlces AcqulslLlon 3.3 CerLlflcaLlon, AccredlLaLlon, and SecurlLy AssessmenLs 3.6 CperaLlonal ConLrols 3.7 ersonnel SecurlLy 3.8 hyslcal and LnvlronmenLal roLecLlon 3.9 ConLlngency lannlng 3.10 ConflguraLlon ManagemenL 3.11 MalnLenance 3.12 SysLem and lnformaLlon lnLegrlLy 3.13 Medla roLecLlon 3.14 lncldenL 8esponse 3.13 Awareness and 1ralnlng 3.16 ldenLlflcaLlon and AuLhenLlcaLlon 3.17 Access ConLrol 3.18 AudlL and AccounLablllLy 3.19 SysLem and CommunlcaLlons roLecLlon 3.20 rogrammable Loglc ConLrollers (LC) 3.21 lndusLrlal SecLors and 1helr lnLerdependencles MCDULL (04) W|re|ess Secur|ty App||ed to SCADA 4.1 Cvervlew of CurrenL Wlreless 1echnologles 4.2 802.11, 802.13 and 802.16 1echnologles 4.3 Cvervlew of Wlreless SecurlLy 4.4 WL 4.3 1kl and Lhe WA/WA2 4.6 lLLL 802.11l 4.7 AuLhenLlcaLlon, LncrypLlon, and lnLegrlLy MeLhods 4.8 Cellular/Moblle lnLerworklng
REGISTRATION FORM IC1D - Internat|ona| Center for 1ra|n|ng and Deve|opment 1o reglsLer, please emall/fax Lhls page Lo us. lor more lnformaLlon or ln-PCuSL, conLacL:
Mr. Ahmed Al Cohary +971 (0) 326472884 agohary[lcLd.ae Ior fu|| ||st of courses, v|s|t our webs|te at http:]]www.|ctd.org
Ior us to serve you better |n the future, p|ease |nd|cate your mode of referra| for th|s tra|n|ng course: LxlsLlng lC1u CllenL lC1u WebslLe lC1u Lmall-llyers Cnllne CLhers
lease lndlcaLe by puLLlng an x" ln Lhe relevanL box,.
Company Name: Company Address:
keg|strat|on Contact - A ] nk nAML !C8 1l1LL LMAlL Auu8LSS 1LLLPCnL
ayment 1erms 9?-"(%" $*,$3(&" @ABCDBE@F/A E GFHIJ!FHKB!> ?-"(%" conLacL lC1u
1erms and Cond|t|ons 1. arLlclpanL reglsLraLlon ls conflrmed upon recelpL of reglsLraLlon form. 2. Courses wlll be conflrmed 3 weeks before daLe of commencemenL of course. 3. Cnce a course ls conflrmed, full paymenL has Lo be made lmmedlaLely. 4. lC1u, Abu uhabl reserves Lhe rlghL Lo reschedule or cancel any course ln Lhe evenL of unforeseen clrcumsLances, every efforL wlll be made Lo lnform Lhe parLlclpanLs. 3. lull fees are refundable provlded wrlLLen noLlflcaLlon ls recelved 14 days before course commencemenL, and 30 of Lhe fee ls chargeable lf noLlflcaLlon ls recelved wlLhln 14 days precedlng course commencemenL. AfLer whlch full course fees wlll be charged. 6. 8y submlLLlng Lhls reglsLraLlon form, you have accepLed and agreed Lo Lhe Lerms and condlLlons as sLaLed