IoT Talent Consortium Logo IoT Talent Consortium
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Click anywhere outside to close

ICS Security Foundations Badging Requirements

Overview

Earners of the IoT Talent Consortium's ICS Security Foundations badge have completed a 5-module self-study course and passed a formal assessment certifying their understanding of the security management principles and exposures, risk management strategies, and best practices as they apply to industrial control systems.


ICS Security Foundations – Cyber Security for ICS, Module 1: Overview of Industrial Control Systems (ICS)

The first module of this e-learning course provides an overview of Cyber Security for Industrial Control Systems. ICS is defined and key terminology is introduced. A learning activity centers on your understanding of key acronyms. Special attention is given to attackers and a discussion of prominent incidents covered in the major media. The importance of ICS Security is emphasized. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. There is no time limit.


ICS Security Foundations – Cyber Security for ICS, Module 2: Threats to ICS

The second module addresses threats to ICS. The difference between a threat and a vulnerability is covered in depth. Then specific threats to different operating environments are elaborated. Those specific to Information Technology (IT) are discussed in depth. This is followed by a review of the situational differences unique to Operational Technology (OT) settings. A learning activity centers on your ability to distinguish between the major kinds of IT and OT threats. Special attention is given to attacks against different configurations of industrial control systems. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.


ICS Security Foundations – Cyber Security for ICS, Module 3: Protocols and Standards

The third module delves into ICS protocols and standards. The difference between a protocol and a standard is covered in detail. Then specific threats to different kinds of protocols are described. Those specific to ICS are discussed in depth. A learning activity reinforces your grasp of the various ICS protocols. Special attention is then given to securing ICS protocols. Specific standards for ICS are also discussed. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.


ICS Security Foundations – Cyber Security for ICS, Module 4: Security Controls

The fourth module dives deeper into ICS security controls. The differences among security controls, management controls and operational controls are investigated in detail. A learning activity reinforces your grasp of the differences between management controls and security controls. Special attention is then given to technical controls. Implementations of ICS security controls are covered next. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.


ICS Security Foundations – Cyber Security for ICS, Module 5: Myths and Worst Case Scenarios

The fifth and final content module teases apart the key myths that are still predominant in IT and OT circles. Most of the focus is on enumerating and describing each myth and the fallacies behind it. A learning activity reinforces your grasp of the main myths and the realities that are actually at play. Special attention is then given ICS security worst case scenarios. Specific contrasts between the wrong and right ways to implement and manage ICS security are discussed. Key takeaways are summarized before a knowledge check, which provides correct answers to missed questions and an overall score. You may repeat the quiz as many times as you’d like. There is no time limit.


ICS Security Foundations – Cyber Security for ICS, Module 6: Comprehensive Exam

A formal assessment of your learning uptake concludes this ICS Cyber Security e-course. There are 20 questions. Your success answering these questions determines whether you have earned the IoTTC’s ICS Security Foundations Badge. You must achieve a score of 80% correct answers to qualify for the badge. You get only one attempt at this comprehensive exam. There is no time limit. Good luck!

Upon successful completion of the comprehensive exam, you will receive instructions for how to redeem you ICS Security Foundations badge.

Click this link to view the validation details for this badge.

Badging