ISA Pune Section is pleased to announce ISA/IEC 62443
certification training, in India!
We are offering the IC34+IC37 modules in this training as below –
ISA/IEC 62443 IACS Cybersecurity Design and Implementation (IC34 IN VILT) :
The second phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on
the activities associated with the design and implementation of IACS cybersecurity
countermeasures. This involves the selection of appropriate countermeasures based upon
their security level capability and the nature of the threats and vulnerabilities identified in the
Assess phase. This phase also includes cybersecurity acceptance testing of the integrated
solution, to validate countermeasures are properly implemented and that the IACS has
achieved the target security level.
This course will provide students with the information and skills to select and implement
cybersecurity countermeasures for a new or existing IACS to achieve the target security level
assigned to each IACS zone or conduit. Additionally, students will learn how to develop and
execute test plans to verify that the cybersecurity of an IACS solution has properly satisfied
the objectives in the cybersecurity requirements specification.
This course is part the ISA/IEC 62443 Cybersecurity Certificate Program. The next training course in
our program is, Assessing the Cybersecurity of New or Existing IACS Systems (IC37 IN)
IACS/IEC 62443 IACS Cybersecurity Operations and Maintenance(IC37 IN VILT):
The third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the
activities associated with the ongoing operations and maintenance of IACS cybersecurity. This
involves network diagnostics and troubleshooting, security monitoring and incident response, and
maintenance of cybersecurity countermeasures implemented in the Design & Implementation
phase. This phase also includes security management of change, backup, and recovery
procedures and periodic cybersecurity audits.
This course will provide students with the information and skills to detect and troubleshoot
potential cybersecurity events as well as the skills to maintain the security level of an operating
system throughout its lifecycle despite the challenges of every changing threat environment.