Print Friendly, PDF & Email

Cyber Security Training for Power Plants

Cyber Security Training for Power Plants is a 3-day crash course that provides both technical and strategic knowledge to help you fully leverage innovations and technical skills to manage risk mitigation proactively and predictive

Power plants and energy generation, transmission and distribution systems have increasingly depend on information network-reliant. Learn how cyber security becomes a critical pillar of the power plants and strategies and technologies to protect ICS/SCADA, EMS and network.

Cyber Security Training for Power Plants explores information and network security vulnerabilities applied to power plants and how to approach cyber security resilience as a complex system.

Who Should Attend

  • Engineers and other technical professionals
  • Cyber security analysts
  • Anyone who plan and design information and network cyber security
  • Power plant operation, administration, management, IT security, or network administration who might be impacted by the security of data and networks

What Will you Learn

  • Basics of Power plant cyber security systems engineering,principles to analyze, define, manage vulnerabilities and threats
  • Skills and knowledge of the principles of information and network security
and the power plant cyber defense
  • Cyber security  systems engineering processes are  applied to securing power plants and complex, connected power grid
  • Techniques and skills for analyzing and  evaluating power plant threats and risks initiated by foreign governments, terrorists, partners and anyone who is interconnected to the grid
  • Skills and knowledge to make proactive decisions to manage the impact of security breaches.
  • Tools to assess risk and threats
  • Design  a security plan
  • Effective cyber security frameworks for assessing and managing information and network security
  • Using tools to design a security plan and manage security incidents

Topics Covered

  • Information and NetworkSecurity Principles
  • Power Plants Vulnerabilities and Threats
  • Vulnerability of the Electric Grid
  • Carrying Out Cyberattacks
  • Known Indictment
  • What is a Malware?
  • Highly sophisticated, malicious programs
  • Worms and Super-Worms
  • Power Plants and Electrical Grid Cyberoperations
  • Sophisticated Cyberattack Techniques applied to power companies, water suppliers and transportation networks
  • Insertion of computer “worm” into the power facility
  • Extensive Reconnaissance of the Power System’s Networks
  • Stealing the credentials of system operators
  • How to switch off the breakers remotely
  • Distributed Denial of Service attacks, DDoS attacks
  • The malware designed for the power grid
  • ICS/industrial control systems Malware
  • Defensive technologies
  • Information Assurance Principles
  • Network Security Principles
  • Secure communication channels
  • IP and Wireless Security
  • ZIgBee, WiFi, Microwave, Cellular Security
  • Ethernet Security
  • ICS/SCADA Security including Protocols (DNP3, Modbus, etc.)
  • EMS/DMS Security
  • Web Security
  • Insider threats
  • Power Plant critical safety and security systems
  • Power Plants and Electrical Grid Digital Threats 101
  • Power Plants cyber Security Requirements.
  • NERC CIP Principles
  • Network-Centric Warfare Technologies
  • Cyber Security Systems, and Test and Evaluation
  • Malware  and Malware Analysis
  • Power Plants Penetration Testing
  • Risk Management Framework for Power Plants
  • Power Grid Digital Forensics
  • Cyber Risk Management for Power Plants
  • Digital Forensics Techniques for Power Plants, SCADA, ICS, EMS, Substations
  • Insider Threats
  • Cyber security and physical security plans
  • Detecting disturbances on the electrical grid
  • Every company operating nuclear power plants has an NRC-approved cyber security program.
  • First Line of Defense: Isolation
  • Deliberate interference with the regional electrical grid
  • Specific Measures Are in Place to Protect Safety
  • Key control systems
  • Network-based cyberattacks originating outside the plant
  • Enhanced and implemented strict controls over the use of portable media and equipment
  • What is Flame Malware?
  • Carrying out cyber espionage
  • Flame Attacks
  • Flame-infected Computers
  • Cyber security controls to protect equipment Protection of Stuxnet  Atacks
  • Shamoon or Disttrack
  • KillDisk Attacks
  • Heightened defenses against an insider threat
  • Intruder unauthorized access


  • Creating a contingency plan to shut down systems that have been infected, or invaded, by outsiders
  • Training and insider mitigation programs and behavioral observation

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.