Industrial Cybersecurity Training

Governance

Education and awareness are crucial for any program aimed at securing technology in operational  environments (OT, ICS, SCADA).

Focusing on education and creating a widespread understanding of security principles isn’t just about avoiding risks; it’s about ensuring that your organization’s critical operations are protected, compliant and trusted.

Armexa addresses this need by offering the International Society of Automation (ISA) suite of OT cybersecurity training courses, and customized training tailored to your company’s specific security policies, procedures, and job roles.

What We Offer

ISA Coursework ISA Training Partner Logo

Armexa is a licensed reseller of ISA courses based on internationally recognized ISA/IEC 62443 standards, including:

Diagram of ISA training offered by Armexa.  All info is listed also located in the text box below.

Volume discounts are available.  Further course descriptions below:

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32C)

This one-day course overview teaches you the basics of the ISA/IEC 62443 standards and how they can be applied. You will be introduced to the terminology, concepts and models, as well as the elements of creating a cybersecurity management program and how it should be applied to industrial automation and control systems.

Days: 1

List Price: $815

Introduction to Industrial Automation Security and the ISA/IEC 62443 Standards (IC32)

Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) provides a detailed look at how the ISA/IEC 62443 standards framework can be used to protect critical control systems. It also explores the procedural and technical differences between the security for traditional IT environments and those solutions appropriate for SCADA or plant floor environments. 

Days: 2

Certificate Exam: Certificate 1: ISA/IEC 62443 Cybersecurity Fundamentals Specialist

List Price: $2,000

Assessing the Cybersecurity of New or Existing IACS Systems (IC33)

Assessing the Cybersecurity of New or Existing IACS Systems (IC33) focuses on the first phase of the IACS Cybersecurity Lifecycle, as defined in ISA/IEC 62443-1-1 standard. Students will learn to identify and document IACS assets and perform a cybersecurity vulnerability and risk assessment to identify and understand the high-risk vulnerabilities that require mitigation.

Days: 2

Certificate Exam:Certificate 2: ISA/IEC 62443 Cybersecurity Risk Assessment Specialist

List Price: $2,915

IACS Cybersecurity Design & Implementation (IC34)
Industrial Automation Control System (IACS) Cybersecurity Design & Implementation (IC34) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This includes the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the assess phase.

Days: 2

Certificate Exam:Certificate 3: ISA/IEC 62443 Cybersecurity Design Specialist

List Price: $2,915

IACS Cybersecurity Operations & Maintenance (IC37)

IACS Cybersecurity Operations & Maintenance (IC37) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity implemented in the Design & Implementation phase. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of the implemented cybersecurity countermeasures.

Days: 2

Certificate Exam: Certificate 4: ISA/IEC 62443 Cybersecurity Maintenance Specialist

List Price: $2,915

Armexa Devoloped Training

OT Cyber HAZOP Risk Assessment Masterclass  Training Demo Graphic

This course offer an in-depth training on the Cyber HAZOP risk assessment methodology for OT system engineers, operators, and administrators who must manage cyber risks to operationsInquire for more info.

Expand for More Info: OT Cyber HAZOP Risk Assessment Masterclass

Vulnerabilities are not the same as risk, yet many companies base their OT security strategies on vulnerability assessments and the number of vulnerabilities discovered by detection tools.   

The course provides in-depth training on applying the Cyber HAZOP risk assessment methodology which has been proven for over a decade to be the leading consequence-based methodology for assessing the true risk of cyber incidents to operations and to express that risk in terms that senior leadership appreciates, such as health, safety, environment, financial, and business interruption. 

The Cyber HAZOP method, introduced in 2013, is the integration of process safety hazard analysis with cybersecurity threat modeling.  The methodology is fully aligned with the requirements in the global OT security standard, ISA/IEC 62443-3-2, “Security Risk Assessment for System Design”, and has been used to assess hundreds of OT systems around the globe in a wide variety of industries and applications.   

This course was developed for those responsible for managing OT cybersecurity risk at the corporate, plant level, or system level. It was created by the experts who pioneered the methodology, chaired the development of the ISA/IEC standard, and facilitated countless assessments.   

In this 2-day course, you will:  

  • Learn about industrial process and machine safety and how it relates to cybersecurity 
  • Understand OT cybersecurity standards and regulatory requirements regarding risk assessment and management   
  • Learn the Cyber HAZOP process for both greenfield and brownfield applications 
  • Be introduced to products and utilities that can be used to facilitate and accelerate the process 
  • Receive valuable templates, checklists, and other job aids to use after the class 
  • Participate in a “mock” Cyber HAZOP workshop 

Inquire for more info

Customized Corporate Technical Training

Turn Your Team Into Active OT Security Participants.

Education and awareness are crucial for any program aimed at securing technology in operational environments. Different roles bring different levels of awareness and buy-in when it comes to OT security.

We can create custom programs tailored to your company’s specific policies, standards, procedures, and applications to ensure the training is directly relevant to your team.

The delivery of this training can be fully customized to meet your site’s needs. We offer on-site, in-person sessions, virtually led classes, LMS modules that you can deploy within your organization, or a combination of these options.

—————————————————————————-

Why Armexa Stands Out

Focused Training for Enhanced Security

Our courses emphasize the importance of education and awareness at every organizational level. By offering training specific to different roles, we make sure everyone is equipped to contribute effectively to your cybersecurity efforts.

Recognized Expertise

The curriculum we use, developed with input from industry experts, including those at Armexa, is respected worldwide. It provides a structured learning journey for participants of different skill levels and job functions.

Practical Insights

Our trainers bring a wealth of practical experience, enhancing the course material with examples from real-life scenarios. This approach helps participants understand how to apply their learning in everyday situations.

A Tailored Approach

Our customized training goes beyond the standard curriculum, incorporating elements specific to your organization. This means that the training not only covers essential cybersecurity concepts but also addresses the unique aspects of your operations.

—————-

Empower Your Team to Actively Contribute to OT Security!

 Contact us to get started today.

Related Content

Enriching Security for a Major US Energy Company | Armexa

FEATURED

Case Study: US Energy Company Enriches Security Posture With OT Security Program Development

Discover how Armexa developed and implemented an enterprise-wide security program across 75 oil and gas facilities.

Discover how we can build digital resiliency into your OT infrastructure