Course Summary
This course provides in-depth knowledge on accessing, supporting, and maintaining critical systems, understanding NERC CIP regulatory requirements, and applying practical implementation strategies. Key topics include:
Identifying BES Cyber Systems and developing strategies to reduce their impact ratings
Gaining a clear understanding of NERC-defined terms and the applicability of CIP standards
Employing strategic methods for implementing and supporting related technologies
Managing ongoing tasks and employing strategies to maintain a robust CIP program
BES Cyber System Categorization
In-depth knowledge of Attachment 1 criteria, operational impacts, the NERC Functional Model, BES Reliability Operating Services, and BES Cyber Asset identification.
Configuration Change Management and Vulnerability Assessments
Proficiency in change management processes, configuration monitoring, vulnerability assessments, transient cyber assets, and removable media security.
Electronic Security Perimeter(s)
Expertise in electronic security perimeter architecture, external routable connectivity, access control rules, dial-up security, malicious communication detection, intermediate systems, interactive remote access, and multi-factor authentication.
Incident Reporting and Response Planning
Comprehensive understanding of incident response planning, including plan development, testing, exercises, and reporting procedures.
Information Protection
Skills in developing and managing information protection programs, encompassing classification, identification, protection, disposal, and reuse of sensitive data.
NERC CIP Terms and Definitions
Familiarity with key terms and definitions related to BES, NERC, and CIP standards.
Personnel & Training
Knowledge of cybersecurity awareness programs, training initiatives, personnel risk assessments, and access management protocols.
Physical Security of BES Cyber Systems
Understanding of physical security plans, access control measures, visitor management, maintenance, testing, monitoring, logging, and alerting systems for BES Cyber Systems.
Recovery Plans for BES Cyber Systems
Proficiency in creating, testing, and exercising recovery plans, as well as documenting recovery plan reporting.
Security Management Controls
Understanding the requirements for senior management, policy development, and compliance for low-impact facilities.
Standards Development
Familiarity with compliance monitoring, enforcement programs, requests for interpretation, standards authorization, urgent action requests, balloting, violation severity levels, and risk factors.
Standards Enforcement
Expertise in audit preparation, enforcement processes, reliability standards audit worksheets, reliability assurance initiatives, and internal controls evaluation.
System Security Management
Comprehensive knowledge of port and service management, patch management, malicious code prevention, system logging, authentication, account management, and strategies for monitoring and alerting.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT