20220728 – @MxD CyMOT: Improving Cybersecurity for Manufacturing Technology

Completed the 3 month course in Industrial Cyber Security run jointly by the University of Maryland and MxD.

In partnership with the University of Maryland-Baltimore County (UMBC), MxD has launched a program to provide cybersecurity training for current manufacturing workers called Cybersecurity for Manufacturing Operational Technology, or CyMOT. 

  • Decorative Icon

    CyMOT is the first program of its kind focused on increasing manufacturing workers’ knowledge of cybersecurity. It is designed for workers to complete in less than a quarter through a web-based format and will result in a certification in Manufacturing Cyber Systems Operation.

CyMOT: Improving Cybersecurity for Manufacturing Technology Schedule

Class is scheduled on Tuesday and Thursday evenings from 6:00pm – 9:30pm (EST)

 

Course 1: Cyber Fundamentals

Tuesday, May 17, 2022

Thursday, May 19, 2022

Tuesday, May 24, 2022

Thursday, May 26, 2020

Tuesday, May 31, 2022

Thursday, June 2, 2022

 

Course 2: Manufacturing Cyber Systems Operation

Tuesday, June 14, 2022

Thursday, June 16, 2022

Tuesday, June 21, 2022

Thursday, June 23, 2022

Tuesday, June 28, 2022

Thursday, June 30, 2022

 

Course 3: Operational Technology Cybersecurity

Tuesday, July 12, 2022

Thursday, July 14, 2022

Tuesday, July 19, 2022

Thursday, July 21, 2022

Tuesday, July 26, 2022

Thursday, July 28, 2022

Course1: CyMOT Cybersecurity Fundamentals.

Course Schedule

Module 1 – Networking Fundamentals

Module 2 – Topologies and Models

Module 3 – Network Addressing

Module 4 – Major Protocols

Module 5 – Cryptography

Module 6 – Scanning and Protocol Analysis

Module 7 – Information Assurance Principles

Module 8 – Attack Vectors

Module 9 – System Hardening

Module 10 – Incident Respons

Course Objective

The Cybersecurity Fundamentals course will explore student how information systems communicate and exchange data and approach how to secure those systems. This course complements any networking and operating system foundations and paves the way for more advanced topics in manufacturing cybersecurity systems operation. It will prepare students for follow-on roles that contribute to the confidentiality, integrity, and availability of production/processing controls and communications that protect assets.

The course modules align with many of the NIST Cybersecurity Framework key role responsibilities for those charged with the identification of information system assets, their configurations, and proper cybersecurity architectures.

Following the same framework, students will learn to protect those information systems. Students will examine vulnerabilities and threats, monitoring preventative and detective controls, and recognizing supply chain risks. In the event of an incident, students will learn to provide initial analysis, respond, and assist in the containment, eradication, and recovery of information technology/operational technology data and environment.

Course Description

The course is separated into ten modules. Earlier modules cover basic networking concepts, topologies, and standardized internetworking models. We focus attention on network infrastructure components and their functional. The course presents key standards organizations and governing bodies that influence today’s networks and their security. Later modules discuss the physical and logical methods for interconnecting systems and focus on the two foremost networking models: TCP/IP and DoD. Students examine actions and common protocols in use at each layer of the TCP/IP model. Further modules make distinctions between physical addressing and connection types and detail logical addressing with the dissection of IPv4 and IPv6 headers.

The course examines normal networking behaviors and discusses how attackers can manipulate common protocols to achieve malicious goals. We present wireless technologies beyond traditional Wi-Fi networks along with their Internet of Things (IoT) and Operational Technologies (OT) implications and influences. Students receive a brief overview of cryptographic methods to address securing data in transmission and at rest.

The course presents how and why cybersecurity professionals conduct scans with tools and the information that attackers can glean using the same tools. An Information Assurance Principles module presents the Top 20 Critical Security Controls and common security vulnerabilities to give students insight into cybersecurity best practices and where they can make recommendations to fortify their OT and IT systems.

The final portion of the course explores attack vectors and strategies to prepare students for current attack vectors. Students learn to think like threat actors to protect systems against them. Students will obtain an understanding of the incident response lifecycle and procedures.

Course Length

3 Days / 20 Hours

Course Prerequisites

Beginning information or operational technology students are prepared for this course. Previous experience with networking or system administration is helpful but not required. Previous production, technical support, or general business experience is preferred.

Modalities of Learning

Lecture and Module Assessments

Evaluation Methodology

 

Students will be assessed on the topics presented at the end of each module.

Completion Requirements

Students must pass with a combined average of 70% and attend at least 80% of the sessions.

Retake Policy

No retakes will be given.

Student Profile Considerations

This course is suitable for those with:

Interest in continued development of IT and OT integration and modernized operations.

Fundamental knowledge of production/processing activities and industrial controls and communications.

Foundational knowledge of TCP/IP networking fundamentals.

NI+IN UCHIL Founder, CEO & Technical Evangelist
nitin.uchil@numorpho.com

,

Leave a Reply

%d bloggers like this: