top of page

Acerca de

Image by krakenimages

Certifications

COSS CERTIFICATIONS:

The COSS (Certified OT Security Specialist) knowledge-based certificate recognition program is founded on Cyber Security Principles, as well as internationally recognized security standards like ISA/IEC 62443, NIST (National Institute of Standards and Technology - USA), and CCOP (Cybersecurity Code of Practice for Critical Information Infrastructure - Singapore). ISA/IEC 62443 is the world's exclusive series of automation cybersecurity standards, built on consensus, and an integral part of government cybersecurity strategies. This comprehensive program encompasses all stages of the industrial automation and control system (IACS) lifecycle, including assessment, design, implementation, operations, and maintenance.

There are 2 Certifications under this section:

Image by Tim van der Kuip

Courses

GENERAL COURSE STRUCTURE:

In the context of a modern industrial system, it has become essential for all staff members to possess basic IT and OT security knowledge. This knowledge is crucial in identifying security issues and ensuring that their actions do not pose risks to industrial operations. The training provided aims to enhance participants' awareness of security threats by educating them about current, common attack methods.

We offer a customised training program that combine the industrial standards of IEC 62443 and technical cyber security know-how that that caters to the specific needs of the industry. This specialized industrial IT security training equips participants with the competence to safely design, maintain, and operate their plants in a secure manner.

Image by Jason Goodman

ICS CYBERSECURITY
FOUNDATION TRAINING COURSE

SERIES 1- ICS CYBERSECURITY FOUNDATION TRAINING COURSE

ICS CYBERSECURITY FOUNDATION TRAINING COURSE has been specifically developed to empower industrial personnel with the most essential IT and OT security principles. Completing this series allows the trainee to be cyber aware in their daily job, knowing their roles and responsibilities and how it will impact their organisation.

For example, consider a scenario we see far too often: a plant employee receives and clicks on a phishing email designed to mimic a reputable sender in order to gain sensitive information. This computer becomes compromised, allowing bad actors to harvest employee credentials and access the plant’s ICS network. From there, the hackers can move laterally throughout the network installing malware, exploiting unpatched vulnerabilities, and wiping all control stations to cause a production line disruption.

There will be 2 courses under this section:

Image by CHUTTERSNAP

ICS CYBERSECURITY
PRACTITIONER TRAINING COURSE

SERIES 2- ICS CYBERSECURITY PRACTITIONER TRAINING COURSE

The ICS CYBERSECURITY PRACTITIONER TRAINING COURSE is specifically tailored for cybersecurity professionals who play a critical role in safeguarding and maintaining security in an OT plant. These professionals may include CISOs, security operations personnel, threat hunters, or incident responders who are directly tasked with detecting and thwarting cyber-attacks. Additionally, in the event of a cyber-attack, they are responsible for initiating recovery measures and responding effectively to the incident.

There will be 4 courses under this section:

bottom of page