Landingpage available in the following languages:
or select your TÜV Rheinland region / country website:

Fundamentals of Cyber Security - Phoenix

Fundamentals of Cyber Security

Phoenix Contact

Phoenix Contact Cyber Security GmbH is an accepted course provider of the TÜV Rheinland Cyber Security Training Program for Industrial Automation Control Systems (IACS) Training.

Within this program the training “Fundamentals of Cyber Security” is offered as a 3.5 days instructor led classroom course at different locations of Phoenix Contact in Europe. On request the training can also be held on-site at customer locations worldwide. The training is available in the following languages: German and English.

The goal of this training is to provide the knowledge necessary to successfully deal with the cyber security challenges in the context of architecture, specification, operation, management and maintenance of Industrial Automation and Control Systems (IACS).

Content

The training consists of the following eight modules:

  • Security Awareness
  • Standards, Frameworks and Guidelines
  • Networking Basics
  • TCP/IP Basics
  • Technical Cyber Security
  • Organizational Cyber Security
  • Effective Countermeasures
  • Further Aspects of Cyber Security

Examination

The training ends with a 90 minutes multiple-choice examination as defined by the TÜV Rheinland Cyber Security Training Program.

After participation in this training course and successful completion of the examination, participants will receive a written confirmation from TÜV Rheinland. This confirmation is a prerequisite to obtain a “CySec Specialist (TÜV Rheinland)” certificate of further advanced trainings of the TÜV Rheinland Cyber Security Training Program.

Participant Profile / Target Group

Technicians, engineers, developers, consultants and managers involved in design, development, maintenance, operations and management of IACS. In general all persons with a need to understand the requirements and objectives of cyber security in IACS.

Participation requirements: Basic knowledge of IACS, IT user knowledge

Agenda

Display all Hide all

Day 1

  • Course Overview
  • Security Awareness
  • Standards, Frameworks and Guidelines

Day 2

  • Networking Basics
  • TCP/IP Basics

Day 3

  • Technical Cyber Security
  • Effective Countermeasures

Day 4

  • Organizational Cyber Security
  • Further Aspects of Cyber Security
  • Examination

More information

For more details on schedules, costs and any other information about this training please get in contact with us.