Skip to main content

Industrial cybersecurity course

Do you work with industrial environments and want to learn more about cybersecurity?
John-André Bjørkhaug

John-André Bjørkhaug

Subject Matter Expert

+47 934 64 053 | john@netsecurity.no

Netsecurity has developed an extensive course catalog for industrial cybersecurity, covering everything from high-level fundamentals to advanced OT security topics. We recognise the complexity of this field and the unique requirements of different critical infrastructure sectors. That is why we tailor each course to the customer’s needs, ensuring that every session delivers 100% relevant and applicable learning material.

Our courses are also designed to suit different levels within your organisation—from C-level executives who need a clear understanding of OT cybersecurity for strategic decision-making, to OT security specialists who want to broaden and deepen their technical expertise.

All courses can be tailored

Pick and choose from our catalog based on your employees and experience. The courses can be held at the customer's premises, in classrooms at Netsecurity or remotely. Two instructors from Netsecurity will hold the course and we can adapt the content to the customer's needs.

Price per day 6000 NOK per day
Participants Minimum 6 participants
Course duration 1-2 days

Course holders

Daniel-Ourom-Swart portrait photo

Daniel Ourom-Swart

Head of OT

Netsecurity

Daniel has over eight years of experience in industrial cybersecurity and a background in security in high-risk industries. He works with risk analysis, security assessments and consultancy across critical infrastructure, focusing on strengthening the robustness and resilience of industrial systems.
Robert Rhind portrait image

Rob Rhind

OT Senior Subject Matter Expert

Netsecurity

With nearly 40 years in industrial control systems and cybersecurity, I have built my career on solving complex operational challenges in critical industries. My background spans control system engineering, commissioning and service interventions, which has led to a focus on industrial cybersecurity.

Module 1

Introduction to industrial cybersecurity environments

In module 1, you will get to know what an OT environment is and what is included in addition to what it underpins in our society. You will gain an understanding of important differences between IT and OT environments in terms of security. You will become familiar with what threat actors typically do and attack in OT environments during a review of real incidents.
  • Industrial environments

  • Key differences between IT and OT

  • General OT components and protocols

  • Threat actors and motivations

  • Industrial cyber security basics

  • Case studies of incidents

Module 2

Security management, risk and compliance for IACS

In Module 2, you will be introduced to typical frameworks used in OT environments, and specific to the industry you work in. Here we will take a deep dive into the IEC62443 standard, focusing on safety management, supplier requirements, risk assessment and technical requirements, respectively the 2-1, 2-4, 3-2 and 3-3 parts of IEC62443. This will give you the tools to improve safety in your business whether you are the owner, operator or supplier of a plant. You will get to know the different stakeholders in OT environments from a lifecycle perspective, giving you the tools you need to apply the standard in your daily work.
  • Overview of standards and frameworks

  • Methodologies for OT risk assessment

  • Security policies, roles and responsibilities

  • Security and maturity levels

  • Resource inventory and configuration management

  • Compliance monitoring and audit readiness

Module 3

IACS security architecture and network defense

In module 3, we give you the tools to work towards a safe and robust design, whether you are in the greenfield or brownfield phase. This is linked to the parts of IEC62443 mentioned above. In addition, we go through both pitfalls and opportunities.
  • OT architectural zones and channels

  • Remote access

  • Security for OT components

Module 4

ICS threat detection, incident management and recovery

In module 4, we look at how you can increase your detection, monitoring, incident management and recovery capabilities. We look at this in the context of preparedness and continuity, to ensure resilience. This includes prerequisites for success and pitfalls.
  • Logging, SIEM and principles for OT SOC

  • Incident management lifecycle in OT

Register your interest in our courses