Cybersecurity

Lead SCADA Security Manager

This four-day training develops the capability to assess risk in SCADA and broader Industrial Control Systems (ICS) environments and translate that risk into a practical protection program. Participants learn how SCADA, DCS, and PLC ecosystems differ from enterprise IT, how common ICS threats and vulnerabilities materialize, and how to design security architecture and controls that fit safety, availability, and operational constraints. The course emphasizes program design, network security architecture, implementation of ICS controls, incident management and continuity linkage, monitoring and measurement, and security testing practices adapted to SCADA systems.

4 days
in person, virtual live, self study, self study private coaching
Certified bypecb logo

What you'll gain

Understand SCADA/ICS threats, vulnerabilities, and risk drivers
Design a SCADA security program and supporting governance
Define network security architecture for SCADA systems
Implement controls and align incident and continuity practices

Next sessions

Upcoming dates you can join soon.

This course runs multiple times per year, onsite and online.

View sessions
Tentative
EN
31 Dec
Self-study
Virtual Live + Onsite

Key takeaways

  • Explain how SCADA/ICS security priorities differ from traditional IT security

  • Structure a SCADA security program with clear scope, governance, and risk ownership

  • Design segmentation and defensive architecture patterns that fit OT constraints

  • Operationalize incident management and link it to business continuity objectives

  • Run a testing approach that is safe for production ICS and produces actionable outcomes

Course Description

Loading content...

Course Details

  • Loading content...

Professional Testimonials

Henri perfectly filled in the gaps in our knowledge and tailored the course contents to our difficult schedules, many thanks !

Simon Baynes

BCMS manager

MSC MEDITERRANEAN SHIPPING COMPANY SA

Simon Baynes
Henri and Alexis conducted a focused, intensive four-day ISO/IEC 27001 Lead Implementer Course of immediate relevance to The Global Fund. Participants representing both IT and Risk are now better prepared to design and operationise a corporate ISMS.

Andreas Tamberg

Senior advisors enterprise risk management

The Global Fund

Andreas Tamberg
Overall enjoyable training. To the point end trainer kept clear focused.

Stephane Di Bari

Service operations manager

UNICC

Stephane Di Bari

Frequently Asked Questions

Get instant answers to common questions about this course from our expert trainers.

How is SCADA/ICS security different from traditional IT security?

SCADA/ICS security prioritizes safety and availability under operational constraints, so controls must be engineered to avoid disrupting physical processes.

In SCADA/ICS, security must be compatible with safe and continuous operations.

Expert Trainer

SCADAICSOT securityavailability+4 more

How do you scope a SCADA security program without disrupting operations?

Scope the program around critical functions, the most exposed access paths, and the changes that are safe to implement within OT operational constraints.

A SCADA program succeeds when scope matches operational reality.

Expert Trainer

program scopeSCADA security programgovernanceOT operations+3 more

Which SCADA network controls usually reduce risk the fastest?

Risk often drops fastest by tightening remote access, improving segmentation, and controlling pathways to engineering and administrative functions.

In SCADA, controlling pathways often matters more than adding tools.

Expert Trainer

network securitysegmentationremote accessSCADA architecture+3 more

How should security testing be performed in SCADA/ICS environments?

SCADA/ICS testing must be planned to avoid operational impact, using controlled methods, clear authorization, and safe scoping before any intrusive activity.

In SCADA, a good test is one that improves security without creating outages.

Expert Trainer

security testingpenetration testingICS safetyOT change windows+3 more

Who benefits most from this course, and who may not be a good fit?

It best fits professionals who influence SCADA/ICS risk decisions, architecture, or operations, while those seeking purely software-focused security skills may need a different path.

SCADA security is most effective when security and operations share a common model of risk.

Expert Trainer

target audiencerole fitSCADA engineersrisk managers+3 more

All sessions

Browse every upcoming session for this course.

1 sessions
Next session
31 Dec · Self-study · EN
Lead SCADA Security Manager
Tentative

Lead SCADA Security Manager

Session: EN
Materials: EN
31 Dec-31 Dec
4 jours
Virtual-Live + Onsite
Self-study
€ Contact us for pricing
pecb logo

We use cookies to improve your experience

Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.