Completed the 3 month course in Industrial Cyber Security run jointly by the University of Maryland and MxD.
In partnership with the University of Maryland-Baltimore County (UMBC), MxD has launched a program to provide cybersecurity training for current manufacturing workers called Cybersecurity for Manufacturing Operational Technology, or CyMOT.
CyMOT is the first program of its kind focused on increasing manufacturing workers’ knowledge of cybersecurity. It is designed for workers to complete in less than a quarter through a web-based format and will result in a certification in Manufacturing Cyber Systems Operation.
CyMOT: Improving Cybersecurity for Manufacturing Technology Schedule
Class is scheduled on Tuesday and Thursday evenings from 6:00pm – 9:30pm (EST)
Course 1: Cyber Fundamentals
Tuesday, May 17, 2022
Thursday, May 19, 2022
Tuesday, May 24, 2022
Thursday, May 26, 2020
Tuesday, May 31, 2022
Thursday, June 2, 2022
Course 2: Manufacturing Cyber Systems Operation
Tuesday, June 14, 2022
Thursday, June 16, 2022
Tuesday, June 21, 2022
Thursday, June 23, 2022
Tuesday, June 28, 2022
Thursday, June 30, 2022
Course 3: Operational Technology Cybersecurity
Tuesday, July 12, 2022
Thursday, July 14, 2022
Tuesday, July 19, 2022
Thursday, July 21, 2022
Tuesday, July 26, 2022
Thursday, July 28, 2022
Course1: CyMOT Cybersecurity Fundamentals.
Module 1 – Networking Fundamentals
Module 2 – Topologies and Models
Module 3 – Network Addressing
Module 4 – Major Protocols
Module 5 – Cryptography
Module 6 – Scanning and Protocol Analysis
Module 7 – Information Assurance Principles
Module 8 – Attack Vectors
Module 9 – System Hardening
Module 10 – Incident Respons
The Cybersecurity Fundamentals course will explore student how information systems communicate and exchange data and approach how to secure those systems. This course complements any networking and operating system foundations and paves the way for more advanced topics in manufacturing cybersecurity systems operation. It will prepare students for follow-on roles that contribute to the confidentiality, integrity, and availability of production/processing controls and communications that protect assets.
The course modules align with many of the NIST Cybersecurity Framework key role responsibilities for those charged with the identification of information system assets, their configurations, and proper cybersecurity architectures.
Following the same framework, students will learn to protect those information systems. Students will examine vulnerabilities and threats, monitoring preventative and detective controls, and recognizing supply chain risks. In the event of an incident, students will learn to provide initial analysis, respond, and assist in the containment, eradication, and recovery of information technology/operational technology data and environment.
The course is separated into ten modules. Earlier modules cover basic networking concepts, topologies, and standardized internetworking models. We focus attention on network infrastructure components and their functional. The course presents key standards organizations and governing bodies that influence today’s networks and their security. Later modules discuss the physical and logical methods for interconnecting systems and focus on the two foremost networking models: TCP/IP and DoD. Students examine actions and common protocols in use at each layer of the TCP/IP model. Further modules make distinctions between physical addressing and connection types and detail logical addressing with the dissection of IPv4 and IPv6 headers.
The course examines normal networking behaviors and discusses how attackers can manipulate common protocols to achieve malicious goals. We present wireless technologies beyond traditional Wi-Fi networks along with their Internet of Things (IoT) and Operational Technologies (OT) implications and influences. Students receive a brief overview of cryptographic methods to address securing data in transmission and at rest.
The course presents how and why cybersecurity professionals conduct scans with tools and the information that attackers can glean using the same tools. An Information Assurance Principles module presents the Top 20 Critical Security Controls and common security vulnerabilities to give students insight into cybersecurity best practices and where they can make recommendations to fortify their OT and IT systems.
The final portion of the course explores attack vectors and strategies to prepare students for current attack vectors. Students learn to think like threat actors to protect systems against them. Students will obtain an understanding of the incident response lifecycle and procedures.
3 Days / 20 Hours
Beginning information or operational technology students are prepared for this course. Previous experience with networking or system administration is helpful but not required. Previous production, technical support, or general business experience is preferred.
Modalities of Learning
Lecture and Module Assessments
Students will be assessed on the topics presented at the end of each module.
Students must pass with a combined average of 70% and attend at least 80% of the sessions.
No retakes will be given.
Student Profile Considerations
This course is suitable for those with:
Interest in continued development of IT and OT integration and modernized operations.
Fundamental knowledge of production/processing activities and industrial controls and communications.
Foundational knowledge of TCP/IP networking fundamentals.
NI+IN UCHIL Founder, CEO & Technical Evangelist