SlideShare a Scribd company logo
Critical Infrastructure Protection
(CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Price: $1,699.00 Length: 2 Days
Why Tonex ?
Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and
consulting services across a wide range of topics to Fortune 500 companies, government organizations,
universities and privately owned businesses from around the world. Visit our Clients Page for a complete list of
Tonex customers.
Who is TONEX for?
Tonex is for any organization in need of leading edge technology training. That includes:
Companies, from Fortune 500 to small businesses in all industries Government agencies, Contractors and System
Integrator, Defense and Military, Educational Institutes, Colleges and Universities.
What types of courses are offered?
You name it, we provide it. Our courses are constantly updated to keep up with the latest technology, and we
continuously monitor business trends and world events to provide the most relevant subject matter anywhere.
Critical Infrastructure Protection (CIP) NERC Training
TAKE THIS COURSE
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Topic in this presentation
• Course Description
• Audience
• Training Objectives
• Training Outline
• Introduction to CIP
• Threat Assessment and Vulnerability Assessment
• Review of NERC CIP Program
• Bulk Electric System (BES) Cyber System Categorization
• Security Management Control
• Cybersecurity Awareness
• Asset Identification
• Access Control and Monitoring
• System Security Management
• Incident Response
• CIP Audit and Compliance Program
• Hands On, Workshops, and Group Activities
• Sample Workshops and Labs for Critical Infrastructure Protection (CIP) NERC Training
Who Should Attend
• IT and ICS cybersecurity personnel
• Field support personnel and security operators
• Auditors, vendors and team leaders
• All individuals who need to understand the Critical
Infrastructure Protection (CIP) NERC concepts
• Electric utility engineers working in electric
industry security
• Electric utility personnel who recently started
career involved with Critical Infrastructure
Protection (CIP) NERC standards.
• Technicians, operators
• Investors and contractors who plan to make
investments in electric industry considering
security standards.
• Managers, accountants, and executives of electric
industry.
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Critical Infrastructure Protection
(CIP) NERC Training
TAKE THIS COURSE
Course description
Critical Infrastructure Protection (CIP) NERC training course will show you the CIP measures
created by Federal Energy Regulatory Commission (FERC) and North American Electric Reliability
Corporation (NERC) and will assist you with understanding the prerequisites for work force and
training, physical security of Bulk Electric Systems (BES) cybersecurity and data protection.
NERC is resolved to ensure the BES against cybersecurity bargains prompting unsteadiness.
Another progress started in 2014 with a specific end goal to move from CIP variant 3 guidelines
to CIP rendition 5. The objective is to enhance the specialized security necessities for BES and
desires for consistence and requirement.
In this manner, TONEX as a pioneer in showing industry with over 15 long periods of
involvement in giving classes, workshops and hands on training and additionally far reaching
training courses is satisfied to offer a point by point training for Critical Infrastructure Protection
(CIP) training in light of NERC standard.
This training depends on protection of transient electronic gadgets utilized at low-affect mass
electric framework digital frameworks, protection of correspondence arrange parts between
control focuses and low-affect outside routable network measures.
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
TAKE THIS COURSE
Audience
• Critical Infrastructure Protection (CIP) NERC training is a 2-day course designed for:
• IT and ICS cybersecurity personnel
• Field support personnel and security operators
• Auditors, vendors and team leaders
• All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC
concepts
• Electric utility engineers working in electric industry security
• System personnel worried about NERC standard for system security
• System operators and individuals in electric utility organizations
• Independent system operator personnel working with utility companies
• Electric utility personnel who recently started career involved with Critical Infrastructure
Protection (CIP) NERC standards.
• Technicians, operators, and maintenance personnel who are or will be working at electric
utility companies.
• Investors and contractors who plan to make investments in electric industry considering
security standards.
• Managers, accountants, and executives of electric industry.
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Critical Infrastructure Protection
(CIP) NERC Training
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Training Objectives
• Understand the new terms and revised definitions of CIP NERC standard
• Learn about Cyber asset categories
• Apply gap analysis with new standards applications
• Recognize the role FERC and NERC on CIP
• Determine the requirements to implement strategies for CIP
• Apply CIP requirements to balance cybersecurity benefits and regulatory compliances
• Understand how the electric sector regulatory structure fit into the reliability standards
• Explore BES cyber asset identification to protect grids
• Learn about common physical controls and monitoring schemes in CIP
• Understand the system security management requirements and compliance challenges
• Apply vulnerability assessment for ensuring the stable operation of system
• Apply methods in order to identify, classify and response to each incident in CIP
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Training Outline
Critical Infrastructure Protection (CIP) NERC training course consists of the following lessons,
which can be revised and tailored to the client’s need:
Introduction to CIP
• Scope of Critical Infrastructure (CI) and Critical Infrastructure Protection (CIP)
• CIP Concepts and Principles
• CI Information and Information Sharing
• CI Stakeholders and Sectors
• CIP Risk Management Model
• CIP Challenges
• CIP and Business Continuity Planning
• CIP in Asset Protection Organization
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Critical Infrastructure Protection
(CIP) NERC Training
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Threat Assessment and Vulnerability Assessment
• Hazards Approach to CIP
• Threat Assessment Methodologies
• Threat Sources
• Threat Level and CI Design
• Threat, Vulnerability and Risk
• Vulnerability Assessment Introduction
• Attributes of Vulnerability
• Vulnerability Assessment Methodologies
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Review of NERC CIP Program
• History and Background of NERC
• Reliability Standards of NERC
• CIP Background
• CIP-001
• CIP-002: Identification and Documentation of Critical Cyber Assets
• CIP-003: Security Management Control
• CIP-004: Personnel Risk Assessment and Security Awareness Training
• CIP-005: Electronic Security Perimeters
• CIP-006 Physical Security Program
• CIP-007: Security Planning and Management
• CIP-008: Incident Identification and Incident Response
• CIP-009: Recovery Plans
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Bulk Electric System (BES) Cyber System Categorization
• CIP-002 Version 5
• Criteria for Determining Impact Ratings
• Generating Units at a Single Plant Location
• BES Reactive Resources
• Transmission Facilities
• Interconnection Reliability Operating Limit (IROL)
• Control Centers and Backup Control Centers
• Low Impact Category for Control Centers and Transmission Stations
• Low Impact Category for Distribution Providers
• Low Impact Category of Special Protection Systems
• Impact Category Control: CIP-011-1
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Critical Infrastructure Protection
(CIP) NERC Training
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Security Management Control
• Review of CIP-003 Version 5
• Personnel and Training
• Electronic Security Perimeters: CIP-005-Version 5
• Interactive Remote Access
• System Security Management
• Incident Reporting and Response Planning
• Physical Security of BES Cyber Systems: CIP-006 Version 5
• Physical Security of Transmission Stations and Substations: CIP-014
• Recovery Plans for BES Cyber Systems
• Configuration Change Management
• Vulnerability Assessment
• Information Protection
• Responding to CIP Exceptional Circumstances
• Physical Access Control Systems (PACS)
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Cybersecurity Awareness
• CIP-004 Version 5: Cybersecurity- Personnel and Training
• Security Awareness
• Cybersecurity Training
• Personnel Risk Assessment
• Access Management Program
• Access Revocation Program
• Interactive Remote Access: CIP-005 Version 5
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Asset Identification
• Asset Classifications
• Bright Line Criteria
• Impact Level Determination
• High/Medium/Low Impact Systems
• NERC Functional Mode
• NERC Reliability Standards
• CIP History
• CIP-002: Cyber System Categorization
• CIP-003: Security Management Controls
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Critical Infrastructure Protection
(CIP) NERC Training
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Access Control and Monitoring
• CIP-005: Electronic Security Perimeters
• Interactive Remote Access
• External Routable Communication and Electronic Access Points
• Physical Access Control System (PACS) Maintenance and Testing
• Visitor Control
• Unauthorized Access Monitoring
System Security Management
• CIP-007 Version 5: System Security Management
• Ports and Services
• Security Patch Management
• Malicious Code prevention
• Account Management
• Security Event Monitoring
• CIP-010: Configuration Change Management and Vulnerability Assessment
• System Access Control
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Incident Response
• CIP-008 Version 5: Incident Reporting and Response Planning
• Identify/Classify/Respond to Cybersecurity Incidents
• Reportable Cybersecurity Incident
• Roles and Responsibility of Incident Response Group
• Incident Handling Procedure
• Testing Cyber Security Incident Response Plan
• CIP-009 Version 5, Recovery Plans for BES Cyber Systems
• CIP-011-1 Information Protection
• System Backup
• Phases of Response and Recovery
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Critical Infrastructure Protection
(CIP) NERC Training
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
CIP Audit and Compliance Program
• CIP Processes of Maintaining Compliance
• Audits
• Accountability
• Transparency
• Consistency
• Sustainability
• Audit Etiquette
• Compliance Framework
• Reliability Assurance Initiative
• Culture of Compliance
• Annual Assessment
• Gap Analysis
• TFE and Self Reporting
• Audit Tools
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Hands On, Workshops, and Group Activities
• Labs
• Workshops
• Group Activities
Sample Workshops and Labs for Critical Infrastructure Protection (CIP) NERC Training
• Types of Documentation in Scope of CIP Security Example
• Nmap Software For Vulnerability Assessment Case Study
• Assessment of Low/Medium/High Impact BES Cyber Systems
• PACS and Monitoring (EACMS) Assets
• Baseline Definition for Two Computers/Servers/Devices with Items in Common
• Security Patches and Functionality Patches Example
• Monitoring Requirements for new Field Devices such as PLCs, Relays, or Monitoring Devices
• Protection of Devices in Substations such as Transformer Monitoring Devices, Distribution
Relays and PLCs.
• Physical Security Tests on Firewalls, IDS, and Proxies
• How to Preserve Incident Data, Integrity of Distributed Files
• Cybersecurity Capability Maturity Model (C2M2) Tutorial
TAKE THIS COURSE
Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
TAKE THIS COURSE
Critical Infrastructure Protection (CIP)
NERC Training
Price: $1,699.00 Length: 2 Days
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
https://www.tonex.com/

More Related Content

What's hot

CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
Infosec
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
Maganathin Veeraragaloo
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
ShivamSharma909
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
John Gilligan
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
EC-Council
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
Infosec
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Phil Agcaoili
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
Redspin, Inc.
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
Cprime
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
Divya Tiwari
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
Greenway Health
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Tuan Phan
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
InfosecTrain
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
Lori McInnes
 

What's hot (20)

CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
Soc
SocSoc
Soc
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and ImplementationCISA Domain 3 - Information Systems Acquisition, Development and Implementation
CISA Domain 3 - Information Systems Acquisition, Development and Implementation
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 

Similar to Critical Infrastructure Protection (CIP) NERC Training

NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course
Tonex
 
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex TrainingCritical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Bryan Len
 
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) WorkshopCPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
Bryan Len
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
Tonex
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Bryan Len
 
Cybersecurity Test and Evaluation Workshop - Tonex Training
Cybersecurity Test and Evaluation Workshop - Tonex TrainingCybersecurity Test and Evaluation Workshop - Tonex Training
Cybersecurity Test and Evaluation Workshop - Tonex Training
Bryan Len
 
Computer Network Architecture Training
Computer Network Architecture TrainingComputer Network Architecture Training
Computer Network Architecture Training
Tonex
 
Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...
Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...
Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...
Bryan Len
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
Koenig Solutions Ltd.
 
SOC Analyst Course
SOC Analyst CourseSOC Analyst Course
SOC Analyst Course
redteamacademypromo
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
TI Safe
 
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxUMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
Abid Ur Rehman
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
Kaspersky
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Tripwire
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
Global Knowledge Training
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
 
List of cybersecurity training courses by Tonex
List of cybersecurity training courses by TonexList of cybersecurity training courses by Tonex
List of cybersecurity training courses by Tonex
Wesley Comal
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsLiving Online
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
 

Similar to Critical Infrastructure Protection (CIP) NERC Training (20)

NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course
 
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex TrainingCritical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
 
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) WorkshopCPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
CPS, Cybersecurity Workshop, Cyber Physical Systems (CPS) Workshop
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
 
Cybersecurity Test and Evaluation Workshop - Tonex Training
Cybersecurity Test and Evaluation Workshop - Tonex TrainingCybersecurity Test and Evaluation Workshop - Tonex Training
Cybersecurity Test and Evaluation Workshop - Tonex Training
 
Computer Network Architecture Training
Computer Network Architecture TrainingComputer Network Architecture Training
Computer Network Architecture Training
 
Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...
Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...
Aviation Cyber Security Airworthiness Certification Course ( 3 Days ) | Tonex...
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
SOC Analyst Course
SOC Analyst CourseSOC Analyst Course
SOC Analyst Course
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxUMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
List of cybersecurity training courses by Tonex
List of cybersecurity training courses by TonexList of cybersecurity training courses by Tonex
List of cybersecurity training courses by Tonex
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
 

More from Tonex

5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course
Tonex
 
MBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingMBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering Training
Tonex
 
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Tonex
 
Revenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseRevenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training Course
Tonex
 
5G Systems Engineering Training
5G Systems Engineering Training5G Systems Engineering Training
5G Systems Engineering Training
Tonex
 
Root Cause Analysis Training
Root Cause Analysis TrainingRoot Cause Analysis Training
Root Cause Analysis Training
Tonex
 
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsLearning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Tonex
 
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Tonex
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
Tonex
 
Bluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingBluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
Tonex
 
Learn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersLearn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturers
Tonex
 
Spacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingSpacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On Training
Tonex
 
CBRS
CBRSCBRS
CBRS
Tonex
 
C Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingC Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C Programming
Tonex
 
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation Training
Tonex
 
Join Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearJoin Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clear
Tonex
 
Conflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictConflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of Conflict
Tonex
 
Big Data for Project and Program Managers
Big Data for Project and Program ManagersBig Data for Project and Program Managers
Big Data for Project and Program Managers
Tonex
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 

More from Tonex (20)

5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course5G AI & Digital Twins Training Course
5G AI & Digital Twins Training Course
 
MBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering TrainingMBSE for Dod, Digital Engineering Training
MBSE for Dod, Digital Engineering Training
 
Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...Engineering Project Management Training, Learn the PMI keys, Project manageme...
Engineering Project Management Training, Learn the PMI keys, Project manageme...
 
Revenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training CourseRevenue Assurance (RA), Telecom RA Training Course
Revenue Assurance (RA), Telecom RA Training Course
 
5G Systems Engineering Training
5G Systems Engineering Training5G Systems Engineering Training
5G Systems Engineering Training
 
Root Cause Analysis Training
Root Cause Analysis TrainingRoot Cause Analysis Training
Root Cause Analysis Training
 
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, ToolsLearning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
Learning PFMEA, Process Failure Mode Effects Analysis, PFMEA Advantages, Tools
 
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
Proposal Engineering Hands-On Workshop, Architecture, Construction and Engine...
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Bluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On TrainingBluetooth Low Energy BLE, Hands-On Training
Bluetooth Low Energy BLE, Hands-On Training
 
Learn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturersLearn how manufacturers use root cause analysis, rca training for manufacturers
Learn how manufacturers use root cause analysis, rca training for manufacturers
 
Spacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On TrainingSpacecraft MBSE-SysML, Hands-On Training
Spacecraft MBSE-SysML, Hands-On Training
 
CBRS
CBRSCBRS
CBRS
 
C Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C ProgrammingC Programming and Coding Standards, Learn C Programming
C Programming and Coding Standards, Learn C Programming
 
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
Tonex "Software Engineering Training" Top 5 Courses For Cybersecurity Profess...
 
Electronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation TrainingElectronic Warfare Threat Modeling and Simulation Training
Electronic Warfare Threat Modeling and Simulation Training
 
Join Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clearJoin Business Writing Skills Training and Write clear
Join Business Writing Skills Training and Write clear
 
Conflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of ConflictConflict Management Training, Learn The Causes Of Conflict
Conflict Management Training, Learn The Causes Of Conflict
 
Big Data for Project and Program Managers
Big Data for Project and Program ManagersBig Data for Project and Program Managers
Big Data for Project and Program Managers
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 

Recently uploaded

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 

Critical Infrastructure Protection (CIP) NERC Training

  • 1. Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Price: $1,699.00 Length: 2 Days
  • 2. Why Tonex ? Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services across a wide range of topics to Fortune 500 companies, government organizations, universities and privately owned businesses from around the world. Visit our Clients Page for a complete list of Tonex customers. Who is TONEX for? Tonex is for any organization in need of leading edge technology training. That includes: Companies, from Fortune 500 to small businesses in all industries Government agencies, Contractors and System Integrator, Defense and Military, Educational Institutes, Colleges and Universities. What types of courses are offered? You name it, we provide it. Our courses are constantly updated to keep up with the latest technology, and we continuously monitor business trends and world events to provide the most relevant subject matter anywhere.
  • 3. Critical Infrastructure Protection (CIP) NERC Training TAKE THIS COURSE https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Topic in this presentation • Course Description • Audience • Training Objectives • Training Outline • Introduction to CIP • Threat Assessment and Vulnerability Assessment • Review of NERC CIP Program • Bulk Electric System (BES) Cyber System Categorization • Security Management Control • Cybersecurity Awareness • Asset Identification • Access Control and Monitoring • System Security Management • Incident Response • CIP Audit and Compliance Program • Hands On, Workshops, and Group Activities • Sample Workshops and Labs for Critical Infrastructure Protection (CIP) NERC Training
  • 4. Who Should Attend • IT and ICS cybersecurity personnel • Field support personnel and security operators • Auditors, vendors and team leaders • All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC concepts • Electric utility engineers working in electric industry security • Electric utility personnel who recently started career involved with Critical Infrastructure Protection (CIP) NERC standards. • Technicians, operators • Investors and contractors who plan to make investments in electric industry considering security standards. • Managers, accountants, and executives of electric industry. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
  • 5. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Critical Infrastructure Protection (CIP) NERC Training
  • 6. TAKE THIS COURSE Course description Critical Infrastructure Protection (CIP) NERC training course will show you the CIP measures created by Federal Energy Regulatory Commission (FERC) and North American Electric Reliability Corporation (NERC) and will assist you with understanding the prerequisites for work force and training, physical security of Bulk Electric Systems (BES) cybersecurity and data protection. NERC is resolved to ensure the BES against cybersecurity bargains prompting unsteadiness. Another progress started in 2014 with a specific end goal to move from CIP variant 3 guidelines to CIP rendition 5. The objective is to enhance the specialized security necessities for BES and desires for consistence and requirement. In this manner, TONEX as a pioneer in showing industry with over 15 long periods of involvement in giving classes, workshops and hands on training and additionally far reaching training courses is satisfied to offer a point by point training for Critical Infrastructure Protection (CIP) training in light of NERC standard. This training depends on protection of transient electronic gadgets utilized at low-affect mass electric framework digital frameworks, protection of correspondence arrange parts between control focuses and low-affect outside routable network measures. Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
  • 7. TAKE THIS COURSE Audience • Critical Infrastructure Protection (CIP) NERC training is a 2-day course designed for: • IT and ICS cybersecurity personnel • Field support personnel and security operators • Auditors, vendors and team leaders • All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC concepts • Electric utility engineers working in electric industry security • System personnel worried about NERC standard for system security • System operators and individuals in electric utility organizations • Independent system operator personnel working with utility companies • Electric utility personnel who recently started career involved with Critical Infrastructure Protection (CIP) NERC standards. • Technicians, operators, and maintenance personnel who are or will be working at electric utility companies. • Investors and contractors who plan to make investments in electric industry considering security standards. • Managers, accountants, and executives of electric industry. Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
  • 8. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Critical Infrastructure Protection (CIP) NERC Training
  • 9. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Training Objectives • Understand the new terms and revised definitions of CIP NERC standard • Learn about Cyber asset categories • Apply gap analysis with new standards applications • Recognize the role FERC and NERC on CIP • Determine the requirements to implement strategies for CIP • Apply CIP requirements to balance cybersecurity benefits and regulatory compliances • Understand how the electric sector regulatory structure fit into the reliability standards • Explore BES cyber asset identification to protect grids • Learn about common physical controls and monitoring schemes in CIP • Understand the system security management requirements and compliance challenges • Apply vulnerability assessment for ensuring the stable operation of system • Apply methods in order to identify, classify and response to each incident in CIP
  • 10. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Training Outline Critical Infrastructure Protection (CIP) NERC training course consists of the following lessons, which can be revised and tailored to the client’s need: Introduction to CIP • Scope of Critical Infrastructure (CI) and Critical Infrastructure Protection (CIP) • CIP Concepts and Principles • CI Information and Information Sharing • CI Stakeholders and Sectors • CIP Risk Management Model • CIP Challenges • CIP and Business Continuity Planning • CIP in Asset Protection Organization
  • 11. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Critical Infrastructure Protection (CIP) NERC Training
  • 12. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Threat Assessment and Vulnerability Assessment • Hazards Approach to CIP • Threat Assessment Methodologies • Threat Sources • Threat Level and CI Design • Threat, Vulnerability and Risk • Vulnerability Assessment Introduction • Attributes of Vulnerability • Vulnerability Assessment Methodologies
  • 13. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Review of NERC CIP Program • History and Background of NERC • Reliability Standards of NERC • CIP Background • CIP-001 • CIP-002: Identification and Documentation of Critical Cyber Assets • CIP-003: Security Management Control • CIP-004: Personnel Risk Assessment and Security Awareness Training • CIP-005: Electronic Security Perimeters • CIP-006 Physical Security Program • CIP-007: Security Planning and Management • CIP-008: Incident Identification and Incident Response • CIP-009: Recovery Plans
  • 14. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Bulk Electric System (BES) Cyber System Categorization • CIP-002 Version 5 • Criteria for Determining Impact Ratings • Generating Units at a Single Plant Location • BES Reactive Resources • Transmission Facilities • Interconnection Reliability Operating Limit (IROL) • Control Centers and Backup Control Centers • Low Impact Category for Control Centers and Transmission Stations • Low Impact Category for Distribution Providers • Low Impact Category of Special Protection Systems • Impact Category Control: CIP-011-1
  • 15. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Critical Infrastructure Protection (CIP) NERC Training
  • 16. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Security Management Control • Review of CIP-003 Version 5 • Personnel and Training • Electronic Security Perimeters: CIP-005-Version 5 • Interactive Remote Access • System Security Management • Incident Reporting and Response Planning • Physical Security of BES Cyber Systems: CIP-006 Version 5 • Physical Security of Transmission Stations and Substations: CIP-014 • Recovery Plans for BES Cyber Systems • Configuration Change Management • Vulnerability Assessment • Information Protection • Responding to CIP Exceptional Circumstances • Physical Access Control Systems (PACS)
  • 17. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Cybersecurity Awareness • CIP-004 Version 5: Cybersecurity- Personnel and Training • Security Awareness • Cybersecurity Training • Personnel Risk Assessment • Access Management Program • Access Revocation Program • Interactive Remote Access: CIP-005 Version 5
  • 18. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Asset Identification • Asset Classifications • Bright Line Criteria • Impact Level Determination • High/Medium/Low Impact Systems • NERC Functional Mode • NERC Reliability Standards • CIP History • CIP-002: Cyber System Categorization • CIP-003: Security Management Controls
  • 19. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Critical Infrastructure Protection (CIP) NERC Training
  • 20. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Access Control and Monitoring • CIP-005: Electronic Security Perimeters • Interactive Remote Access • External Routable Communication and Electronic Access Points • Physical Access Control System (PACS) Maintenance and Testing • Visitor Control • Unauthorized Access Monitoring System Security Management • CIP-007 Version 5: System Security Management • Ports and Services • Security Patch Management • Malicious Code prevention • Account Management • Security Event Monitoring • CIP-010: Configuration Change Management and Vulnerability Assessment • System Access Control
  • 21. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Incident Response • CIP-008 Version 5: Incident Reporting and Response Planning • Identify/Classify/Respond to Cybersecurity Incidents • Reportable Cybersecurity Incident • Roles and Responsibility of Incident Response Group • Incident Handling Procedure • Testing Cyber Security Incident Response Plan • CIP-009 Version 5, Recovery Plans for BES Cyber Systems • CIP-011-1 Information Protection • System Backup • Phases of Response and Recovery
  • 22. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Critical Infrastructure Protection (CIP) NERC Training
  • 23. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ CIP Audit and Compliance Program • CIP Processes of Maintaining Compliance • Audits • Accountability • Transparency • Consistency • Sustainability • Audit Etiquette • Compliance Framework • Reliability Assurance Initiative • Culture of Compliance • Annual Assessment • Gap Analysis • TFE and Self Reporting • Audit Tools
  • 24. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Hands On, Workshops, and Group Activities • Labs • Workshops • Group Activities Sample Workshops and Labs for Critical Infrastructure Protection (CIP) NERC Training • Types of Documentation in Scope of CIP Security Example • Nmap Software For Vulnerability Assessment Case Study • Assessment of Low/Medium/High Impact BES Cyber Systems • PACS and Monitoring (EACMS) Assets • Baseline Definition for Two Computers/Servers/Devices with Items in Common • Security Patches and Functionality Patches Example • Monitoring Requirements for new Field Devices such as PLCs, Relays, or Monitoring Devices • Protection of Devices in Substations such as Transformer Monitoring Devices, Distribution Relays and PLCs. • Physical Security Tests on Firewalls, IDS, and Proxies • How to Preserve Incident Data, Integrity of Distributed Files • Cybersecurity Capability Maturity Model (C2M2) Tutorial
  • 25. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
  • 26.
  • 27. TAKE THIS COURSE Critical Infrastructure Protection (CIP) NERC Training Price: $1,699.00 Length: 2 Days https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/