Price: $29,999.00

Length: 4 Weeks
Print Friendly, PDF & Email

Electric Grid Cybersecurity Master Certification Training Course

Electric Grid Cybersecurity Master Certification is a master course we call Electric Grid Cybersecurity Master Certification (EGCMC). It is our specialty! For more than 15 years, Tonex has led the way in producing the highest-quality cybersecurity conferences, seminars, workshops and courses designed exclusively for a variety of industries including the energy industry. The power grid, utilities and the smart grid seen very vulnerable to cyberattacks. Electric Grid Cybersecurity Master Certification (EGCMC) training course is the answer. Electricity New electric and smart grid technologies and frameworks introduce new classes of risk, most notably creating new attack vectors that can be exploited by cyber attack. Learn about security breaches, cybersecurity risks and the implementation of security protocols in critical energy and utility infrastructure sector, and how to analyze and prepare for critical infrastructure attacks.

Assess your utility, oil and gas, or alternative energy organization if you are ill prepared to deal with it. We offer customized cybersecurity training solutions and seek to help industry professionals make informed, intelligent decisions to strategically improve their position in today’s challenging cybersecurity environment.

With hundreds of public and private events every year, Tonex has a cybersecurity training solution for you. Learn about cybersecurity as a set of principles and practices designed to safeguard your IT, networking and power generation, control, distribution and other assets against threats.

Electric Grid Cybersecurity Master Certification course provides technical instruction on the protection of electric and smart grid systems using offensive and defensive methods. Tonex certifies individuals and provides various levels of active professional certification in electric power and smart grid. Tonex Electric Grid Cybersecurity Master Certification is the standard of excellence in electrical grid and smart grid management whether you are a practitioner, program or project manager, vendor or auditor. Learn and understand where and how cyber attacks could be launched, why they might work, and the reasons mitigation strategies will increase the cybersecurity posture of their control system networks.

Learn how to implement a multi-tiered cybersecurity risk management process using Tonex Cybersecurity Framework to protect electrical and smart grid infrastructure, operational capabilities, business units, and assets from Information Enterprise level, through the Component level, down to the field and Network and IT level.

Electric Grid Cybersecurity Master Certification (EGCMC), a high-intensity master certification training course, uses the latest techniques, tools, case studies and methods in a live, hands-on lab environment to conduct a simulated cyber attack and incident investigation. Outside of the laboratory exercises, the course also will also address legal, laws and ethical considerations, the foundations of digital forensic science within the context of electric grid, and emerging and hybrid smart grid technologies

Electric Grid Cybersecurity Master Certification training course is a combination of instructor lecture, hands-on lab exercises, case studies, instructor demonstrations, workshops, projects and simple exams to assess your knowledge and skills upon the completion of the course. Electric Grid Cybersecurity Master Certification (EGCMC) course is designed for professionals who specialize in managing and designing Electric and Smart Grid security solutions and providing management with risk-based guidance to meet organizational needs. Modules and domains contain:

  • Presentation, examples and case studies to be used to clarify points.
  • Short Lecture, Discussion and In-Class activities: The facilitators will engage participants in interactive conversation.
  • Individual Activity: Team members will work on action plans, sample project, worksheet, or tool and methodology evaluation.
  • Group Activity: Participants work in small teams for briefing.
  • Final Group Project and Cybersecurity Simulation

Electric Grid Cyberseucrity Master Certification (EGCMC) training course encompasses the following domains:

  • Cybersecurity Foundations
  • Network and Information Security Vulnerability and Migration
  • Access Control
  • Penetration Testing Methodologies
  • Hacking Forensic Investigation
  • Network Forensics Analysis
  • Risk Management Framework (RMF) Process
  • Law, Ethics and Legal Issues
  • Cyber Security Compliance
  • Cybersecurity Investigations

Benefits of Electric Grid Cyberseucrity Master Certification (EGCMC) training course certification to the Professional:

  • Demonstrates theoretical knowledge of network and information assurance applied to Electric and Smart Grid
  • Confirms commitment to Electric and Smart Grid Cybersecurity and  information assurance profession.

What You’ll Learn:

  • Cybersecurity Foundation and its application to Electric and Smart Grid
  • Network and Information Security Vulnerability and Migration
  • Laws, directives and compliance requirements
  • Cyber Security Compliance
  • Current Electric and Smart Grid cyber threats and cybersecurity references
  • Electric and Smart Grid attack cycle perpetrated by malicious hackers
  • Electric and Smart Grid policy requirements
  • Best practices and strategies for securing the Electric and Smart Grid with multiple layer of defenses
  • Forensic and investigation challenges and incident response planning
  • Business Continuity and Disaster Recover
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Electric and Smart Grid Cybersecurity recommendations
  • Cryptographic solutions for securing communications and information

Who Needs to Attend

Cybersecurity professionals, including network engineers, telecom engineers, security analysts, Intel and policy analysts, security operations personnel, network administrators and operations, system integrators, security consultants.

Electric Grid Cybersecurity Master Certification training course provides recommended security requirements that may also be used by strategists, designers, implementers, and operators of the Electric and Smart Grid, in their job functions at, utilities, equipment manufacturers and for guidance to regulators.

Program Content Cybersecurity 101

  • Cybersecurity Principals
  • Cybersecurity Foundation Blocks
  • Cyber Security and the Electric Sector
  • Cyber Awareness Challenges for the Utility Communities
  • Power Grid and Cyber Attacks
  • Risks, threats, and vulnerabilities
  • Cryptography
  • Access Control
  • Mitigating the Risk of Cyber Attack on Power Grid Systems
  • Penetration Testing Methodologies

The Major Elements of the Electric and Smart Grid Cybersecurity

  • Information Technology
  • Industrial Control Systems
  • SCADA
  • Connectivity of critical infrastructure systems
  • Communications Infrastructure
  • Cybersecurity strategy
  • Risk-based cybersecurity framework

Cyber Attacks with Backdoors and Trojans

  • Malware
  • Trojans
  • Trojan Infection Mechanisms
  • Well-Known Trojans
  • Distribution Methods Wrappers
  • Trojan Autostart Methods
  • Covert Communications
  • Stealth Technique: Avoiding Detection
  • Backdoor Countermeasures
  • Malware Countermeasure
  • Anti-Spyware Software
  • Malware Countermeasure Practices

Electric and Smart Grid Cyberseucrity

  • Electric and Smart Grid Cybersecurity foundation
  • Key Concepts, Methodologies, Techniques and Tools
  • Cybersecurity challenges for utility operators
  • Cyber Controls
  • Access Controls
  • Encryption
  • Command Source Authentication
  • Electric Grid security standards and best practices
  • SCADA protocol security issues
  • Securing field communications
  • Security policy development
  • Access Control
  • Cryptography
  • User authentication and authorization
  • Analyzing and etecting cyber attacks on SCADA systems
  • Vulnerability assessment
  • Security Leadership and Management
  • Security Lifecycle Management
  • Security Compliance Management
  • Contingency Management
  • Law, Ethics and Incident Management

Electric Grid Security Architecture

  • Cybersecurity Standards
  • Electric and Smart Grid Cryptography and Key Management Issues
  • Cryptography and Key Management Solutions and Design Considerations
  • Cybersecurity for Electric and Smart Grid Systems
  • Cybersecurity Threats
  • Deliberate attacks
  • Disgruntled employees
  • Industrial espionage
  • Terrorists
  • Information infrastructure due to user errors
  • Equipment failures
  • Natural disasters
  • Electric Grid Communication and Network Security
  • Electric Grid Information Systems Security
  • Electric Grid Communication Architecture
  • Electric Grid Network Architecture
  • Protecting Electric Grid Communications and Networks
  • Security Controls and Policy Key Management
  • Practical Techniques for Analyzing Suspicious Network Traffic
  • Security Design Considerations and Associated Risks for Electric Grid
  • Electric Grid Physical Security Considerations
  • Assessing the Physical Security Requirements for Electric Grid
  • Integration of Physical Products and Systems
  • Cryptography Requirements
  • Electric Grid Business Continuity Planning (BCP)
  • Disaster Recovery Planning (DRP)
  • Access Control Systems and Methodology
  • Penetration Testing
  • Disaster Recovery
  • Digital Forensics
  • Network Forensics
  • Wireless Security
  • Secure Web Applications
  • Secure Windows, MAC OS, iOS, Android, Linux and Unix
  • Information Systems Security
  • Vulnerability Assessment
  • Security Leadership
  • Incident Handling and Reporting

Electric and Smart Grid Vulnerabilities and Cyber Attacks                      

  • Protecting Critical assets and infrastructure
  • Telecommunications and Network Security
  • Information Security Governance
  • Risk Management
  • Operations Security
  • Business Continuity and Disaster Recovery Planning
  • Legal, Regulations, Investigations and Compliance
  • Physical and Environmental Security
  • Cryptography
  • Malicious Code and Activity
  • Monitoring and Analysis
  • Networks and Communications
  • Risk, Response and Recovery
  • Security Operations and Administration
  • Reverse Engineering
  • SCADA security
  • Cyber Attack Process
  • Attack tools and technology
  • Information security tools and technology
  • Mitigation and Prevention
  • Penetration Testing Methodologies
  • Forensics tools and technologies
  • Laws on Cyber Warfare
  • Network Attacks
  • Exploit Creation
  • Windows Architecture
  • Linux/Unix Architecture
  • Web and Mobile Application Vulnerabilities
  • Attacks on SCADA
  • Attacks on HMIs
  • Attacks on Control Servers
  • Attacks on Network Communications
  • Attacks on Remote Devices, RTUs and IED

Securing Electric and Smart Grid infrastructures

  • Incident Handling
  • Preparation
  • Identifying the core team
  • Instrumentation of the site and system
  • Identification
  • Signs of an incident
  • Documentation strategies
  • Containment and quarantine
  • Recovery
  • Actions
  • Responding to different types of incidents
  • Espionage
  • Inappropriate use
  • Incident record keeping
  • Legal acceptability
  • Incident follow-up
  • Failure Effects
  • System Shutdown
  • Power Quality Violation
  • Anomalous Operation
  • Normal Operation

Electric and Smart Grid Cyber Attack Analyses

  • Smart Grid System Model
  • Head End
  • Wireless Mesh
  • Neighborhood Model
  • Power System Model
  • Cyber Insider Threat
  • Security of Intelligent Electronic Devices (IED)
  • Defending Smart Grid Servers and Workstations
  • Identification and Authentication
  • Smart Grid Governance and Resources

Techniques to Secure IT and Networking Systems

  • Securing Hosts and Servers
  • Securing Communications
  • Tunnels
  • Securing Services
  • Email
  • FTP and Telnet
  • SSL and TLS
  • Gateway-to-Gateway VPN
  • Host-to-Gateway VPN
  • IP Security
  • Wireless Access Communication
  • Wireless Security
  • M2M Security

Authentication and Cryptographic

  • Authentication
  • Cryptosystems Password Authentication
  • Hash Functions
  • Kerberos Cryptographic
  • Symmetric Key Encryption
  • Asymmetric Encryption
  • Digital Signatures
  • PKI Components

Firewalls and Edge Devices

  • Trusted Zones
  • Devices
  • Routers
  • Firewalls
  • DMZ Hosts

   Business-to-Business (B2B) Networking and Communications

  • Configuration Management
  • Certification and Accreditation
  • Intrusion Detection and Prevention
  • Defense in Depth
  • Network Device Logging
  • Host Monitoring and Logging
  • Monitoring
  • Host-Based and Network-Based Differences
  • Policy Management
  • IDS and IPS
  • Encryption

Electric and Smart Grid Forensic Analysis

  • Incident Handling
  • Security Incident Response
  • Time and Reaction Sensitivity
  • Incident Handling Issues and Considerations
  • Response Procedures
  • Evidence
  • Logging
  • Log Analysis Tools
  • Active Ports and Sensors
  • Log Maintenance

Disaster Recovery and Business Continuity

  • Disaster Recovery Plan (DRP)
  • Creating a DRP
  • Recovery Strategies
  • High Availability Analysis
  • Business Continuity Planning
  • Cyber Evolution
  • Cyber Terrorism

Advanced Electric and Smart Grid Security Best Practices

  • Perimeter Protection
  • Intrusion Detection
  • Hacker Techniques, Exploits & Incident Handling
  • Securing Windows with the Critical Security Controls
  • Securing Linux/Unix
  • Continuous Monitoring and Security Operations
  • Cloud Security
  • Web App Penetration Testing and Ethical Hacking
  • M2M and IPv6 Essentials
  • Network Penetration Testing and Ethical Hacking
  • Pen Testing Skill Development
  • CyberCity Hands-on Kinetic Cyber Range Exercise
  • Implementing and Auditing the Critical Security Controls
  • Mobile Device Security and Ethical Hacking
  • Virtualization and Private Cloud Security
  • Wireless Ethical Hacking, Penetration Testing, and Defenses
  • Advanced Web App Penetration Testing and Ethical Hacking
  • Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
  • Advanced Exploit Development for Penetration Testers
  • Defending Web Applications Security
  • Developing Defensible Applications
  • Advanced Network Forensics and Analysis
  • Advanced Smartphone Forensics
  • IT Security Strategic Planning, Policy and Leadership
  • IT Project Management
  • Effective Communication
  • Incident Response Team Management
  • Auditing Networks, Perimeters, and Systems

Electric and Smart Grid Hacking Techniques, Exploits and Incident Handling

  • Information Security
  • Network Penetration Testing and Ethical Hacking
  • Intrusion Detection
  • Security Leadership
  • Reverse-Engineering
  • Malware Analysis Tools and Techniques
  • Computer Forensic Analysis and Incident Response
  • Log Management
  • Compliance, Security, Forensics, and Troubleshooting
  • Critical Security Controls
  • Planning, Implementing and Auditing
  • Operating System Forensic Analysis
  • Web App Penetration Testing and Ethical Hacking
  • Law of Data Security and Investigations
  • ICS and SCADA Security Essentials
  • Cyber Defense
  • Digital Forensics Incident Response
  • Physical Security
  • Lock and Key Systems
  • Physical Security Measures
  • Physical Security Planning and Implementation
  • Physical Security Virtual Environment Assessment
  • Storage Containers and Facilities

Creating Electric and Smart Grid Security Program

  • Secure Programming
  • Electric and Smart Grid Law, Ethics and Legal Issues
  • Investigation Process
  • Report Writing
  • Smart Grid Intrusion Detection System (IDS)
  • Analysis
  • Information Assurance
  • Behavioral patterns of malware
  • Files and registry keys
  • Networks
  • Phishing
  • Portable Electronic Devices
  • Removable Storage Media
  • Privileged User
  • Information Assurance Responsibilities
  • Smartphones and Tablets
  • Technical Implementation of Security Certification and Accreditation
  • Configuration to Standards
  • Incident Preparation & Response
  • Information Systems Security
  • Enforcing Security Policy
  • Automation, Auditing, and Forensics
  • System Processes and Services
  • Logs and Log Management
  • Smart Grid System Hardening
  • Databases and Historians

Cybersecurity Assessment, Project and Risk Management

  • Risk Management
  • CRAMM Process
  • Risk Management Lifecycle
  • Protected Assets
  • Quantitative Risk Assessment
  • Threat Determination Process
  • Risk Assessment
  • Lifecycle
  • Vulnerabilities
  • Policy
  • Assessment
  • Legal Issues
  • Policies, Guides, Standards, Procedures, and Controls
  • Security Policy Coverage Matrix

Workshops, Labs and Team Based Projects Developing Electric and Smart Grid Cyber Security Guidelines

  • Smart Grid Domains
  • Bulk Generation
  • Transmission
  • Operation
  • Distribution
  • Service Provider
  • Customer
  • Marketing
  • Secure Communication Flow
  • Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements

Developing Components of Electric and Smart Grid Cyber Security Strategy

  • Prevention
  • Detection
  • Response
  • Recovery
  • Generic Model of Risk
  • Threat
  • Vulnerability
  • Consequence
  • Risk
  • Security and privacy requirements elicitation and analysis

Practicing Information and Network Security

  • Networks and Protocols
  • Secure Operating Systems
  • Security Tools for Information Security
  • Information Assurance
  • Exploits and Exposures
  • Hackers and Crackers
  • Attack Methods
  • Social Engineering
  • Traffic Analysis
  • Responding to Threats and Attacks
  • Vulnerability Scanners
  • Penetration Testing
  • Structure of the Internet and TCP/IP
  • TCP/IP Model
  • Network Access Layer
  • Internet Layer
  • Host-to-Host Layer
  • Process Layer
  • Domain Name Service

Creating Cybersecurity Awareness

  • Social Engineering
  • Social Engineering Goals
  • What Makes Social Engineering Possible
  • Targets
  • Attacks
  • Phishing
  • Phishing via Email
  • Online Attacks
  • Statistical Data
  • Sources of Security Breaches
  • Preventing Social Engineering
  • Cyber Awareness: Policies and Procedures
  • Security Policy Topics
  • Social Media
  • Social Networking Sites

Working with Vulnerability Assessment and Tools

  • Vulnerabilities and Exploits
  • Vulnerability Assessment Tools
  • Application-Level Scanners
  • System-Level Scanners
  • System-Level Testing Tools
  • Open Source and Commercial Scanner s
  • Commercial Exploit Tools
  • Fuzz Testing
  • Preventing Exploits and Attacks
  • Patch Management
  • Common Vulnerabilities and Exposures
  • Alerts and Software
  • Vulnerability Research
  • Common Security Sites
  • Patch Management

Working Cyber Attacks Footprinting and Scanning

  • Footprinting
  • Gathering Information
  • Unearthing Initial Information
  • Internet Archive
  • People Search
  • Locations and Mapping
  • Job Boards
  • Financial Information
  • Google and Search Operators
  • Identifying the Target Network and Its Range
  • WHOIS Utility
  • DNS Online Search Tools
  • Traceroute
  • Footprinting Countermeasures
  • Detecting Live Systems
  • Bypassing Authentication
  • War Dialing
  • Wardriving
  • ICMP: Ping
  • Port Scanning
  • Performing TCP and UDP Scans
  • Port Numbers
  • TCP Flags
  • TCP ThreeWay Handshake
  • Port Scanning Techniques
  • TCP Full Connect Port Scan
  • TCP HalfOpen (SYN) Scanning
  • Nmap HalfOpen Scan
  • UDP Port Scan
  • Nmap Scan Types and Switches
  • Port Scanning Tools
  • OS Fingerprinting
  • Active Stack Fingerprinting
  • Passive Fingerprinting
  • Proxies and Anonymizers
  • Scanning Countermeasures

Electric and Smart Cyber Attacks Case Studies

  • Password Attacks
  • Privilege Escalation
  • Maintaining Access
  • Windows Authentication
  • SysKey Encryption
  • LAN Manager Password Encryption
  • Windows LAN Manager and NTLM Hashes
  • Linux Password Encryption
  • SAM Database Insecurities
  • Password Extraction Cracking
  • Password Cracking Techniques
  • Password Cracking Tools
  • LCP
  • Password Cracking Countermeasures
  • Covering Tracks
  • Principle of Exchange
  • Clearing the Logs
  • Hiding Tools, Files, and Programs
  • NTFS Alternate Data Streaming
  • Information Hiding: Methods
  • Steganography
  • Steganography Detection
  • Rootkits
  • Countermeasures: Rootkits

 Labs and Demos

  • Working with TCP/IP
  • Electric and Smart Grid Vulnerability Assessments
  • Social Engineering Attack Simulation
  • Phishing Simulation
  • Cyber Scanning Labs
  • Cyber Attacks and Passwords Demos
  • Backdoors Simulation
  • Authentication and Cryptography
  • Attacking Firewalls and IDS Simulation
  • Forensic Analysis
  • Creating Risk Assessment and Mitigation Techniques
  • Creating and Enforcing Security Policies
  • Creating a Disaster Recovery Plan
  • Creating a Business Continuity Plan

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.